The document discusses achieving trustworthy privacy in pervasive video surveillance systems. It covers: (1) Using computer vision algorithms and trusted hardware to process video in real-time while protecting privacy; (2) The need for laws governing data access and image protection; (3) How user collaboration through tagging and notification could help validate privacy protections. The goal is to balance security, privacy, and social acceptance of these surveillance technologies.
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
1. Towards a Trustworthy Privacy
in Pervasive Video Surveillance Systems
Antoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Puig, Antonia Paniza
Universitat Rovira i Virgili
Universitat de les Illes Balears
2. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
3. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
4. UNESCO Chair in Data Privacy
Universal Declaration of Human Rights (1948)
– “No one shall be subjected to arbitrary interference with
his privacy, family, home or correspondence, nor to
attacks upon his honour and reputation. Everyone has
the right to the protection of the law against such
interference or attacks”
Data privacy technologies are about technically
enforcing the above right in the information society
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
5. UNESCO Chair in Data Privacy
Unfortunately…
– Lack of awareness of the population on the existing
privacy threats (profiling, tracking, etc.)
– Large companies and the “Big Brother” effect
– Lack of comprehensive legislation
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
6. UNESCO Chair in Data Privacy
Chair aims and goals
– Promote the adoption of privacy-preserving
technologies by governments and private sectors
(telecoms, banks, etc.)
– Raise the public awareness of the need and the right to
preserve the privacy of the individuals
– Promote cross-national research on privacy technologies
We are mainly focused on technologies
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
7. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
8. Privacy in Video Surveillance
Example scenario
Pre
surveillance processing
camera
Identification
Video Processing Module
Content
protection
Information System
Security Management Module
User
Trusted Manager
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
9. Privacy in Video Surveillance
Pervasive technology scenario surveillance
Pre
processing
camera
Pre
surveillance processing
camera Identification
Identification Video Processing Module
Video Processing Module
Content
Content
protection protection
surveillance
Pre Information System Information System
processing
camera
Security Management Module
Identification
Video Processing Module Security Management Module
Content User
protection
Information System
Trusted Manager
Security Management Module User
Trusted Manager
User
Trusted Manager
Pre
surveillance processing
camera
Pre
surveillance processing
camera Identification
Video Processing Module
Identification Content
protection
Video Processing Module Information System
Content
protection
Information System Pre
surveillance processing Security Management Module
camera
Security Management Module
Identification User
Video Processing Module Trusted Manager
User Content
protection
Information System
Trusted Manager
Security Management Module
User
Trusted Manager
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
10. Privacy in Video Surveillance
Typical “privacy” technologies in VS
– Face/people detection
– Blurring/Encryption
But…
– Are people notified they are being recorded?
– Is the access to the raw/encrypted data correctly
managed?
– Do the video processing techniques really ensure privacy
of individuals?
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
11. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
12. Trustworthy ICT?
The goal of VS is security
Security vs privacy...
– Is people happy while being monitored?
– Does people feel safe while being under surveillance?
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
13. Trustworthy ICT?
Is technology reliable?
– “The degree to which a trustor has a justifiable belief
that the trustee will provide the expected function or
service”
Technology problems? Owner misbehaviors?
– Are individuals protected by the law? Lack of legislation
can certainly slow down the social acceptance of ICT
Social acceptance vs. User collaboration
– Web 2.0 trust is based on collaboration of users
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
14. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
15. (I) Technology: algorithms and platform
Trusted Platform Module chips
– Can be used to build a plethora of trustable devices
– For instance, trustworthy cameras
– But they could be hacked...
Pre
surveillance processing
camera
Identification
Video Processing Module
Content
protection
Information System
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
16. (I) Technology: algorithms and platform
In the case of VS, computer vision techniques...
– Must work in real time. If the technique needs some
temporary storage of the raw video, a security leak of
the information system can compromise the privacy of
the individuals.
– Must perform well in terms of accuracy. (i) Must detect
ALL the ROIs (e.g. Faces). (ii) Should not need human
supervision.
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
17. (I) Technology: algorithms and platform
Fortunately...
– There are techniques to detect ROIs in realtime
– And capable of detecting them correctly!
But...
– Camera conditions are essential: fixed cameras, good
illumination conditions, etc.
– Some of the literature does not tackle these issues!
– Some of the proposals blur ROIs in the pixel domain and
raw video is stored and accessible to authorized users.
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
18. (I) Technology: algorithms and platform
The platform must fulfil some properties, namely
– Confidentiality, authenticity, integrity
– Security Access
Symmetric
Encryption
Public Key
Cryptography Video Processing Module
Information System
Trusted Certification
Authorities Security Management Module
Secure Logging User
Trusted Manager
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
19. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
20. Law enforcement
Directive 95/46/EC on the protection of individuals
with regard to the processing of personal data and
on the free movement of such data
– Any information relating to an identified or identifiable
natural person can be seen as personal data
– A picture can be considered personal data if it allows
identification of individuals
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
21. Law enforcement
Spanish legislation
– Surveillance must be advertised
– The owner must take the necessary precautions to
ensure the safety of the images and prevent alteration,
loss or unauthorized access
– Data cannot be released to third parties
Does the owner
behave properly?
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
22. Law enforcement
A trust score for VS
IMAGE PROTECTION DATA ACCESS
High trust + notification
High trust. ROIs are In case of identification
hidden, no supervision /
no real time High trust. Anyone accesses
the protected data, auhorized
users access original data.
Low trust. ROIs are hidden, Low trust. Only
but human supervision is authorized users can
needed / no real time access ALL THE DATA
No trust. ROIs are not No trust. Anyone can
hidden access the original data
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
23. Law enforcement
IMAGE PROTECTION LOW
DATA ACCESS HIGH
Data is protected and sent to
SECURITAS. Original data
is only available to police.
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
24. Content
UNESCO Chair in Data Privacy
Privacy in Video Surveillance
Trustworthy ICT?
(I) Technology: algorithms and platform
(II) Law enforcement
(III) User collaboration
Discussion
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
25. User collaboration
User collaboration is natural in state-of-art internet
services:
– Collaborative recommendation systems
– Collaborative privacy techniques: Instead of trusting a
third party, users collaborate to gain privacy.
It is interesting that users are informed upon being
recorded by VS systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
26. User collaboration
Smartphone and web application
surveillance
camera
Tag
Validate Server Database
User
Application Inform
web Web interface
browser
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
27. User collaboration
Smartphone and web application
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems