5,379 Hits in 3.9 sec

Access control, confidentiality and privacy for video surveillance databases

Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
2006 Proceedings of the eleventh ACM symposium on Access control models and technologies - SACMAT '06  
Next we discussed an access control model and accedes control algorithms for confidentiality. Finally we discuss privacy preserving video surveillance.  ...  In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection.  ...  SUMMARY AND DIRECTIONS In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed an access control model and algorithms for confidentiality.  ... 
doi:10.1145/1133058.1133061 dblp:conf/sacmat/ThuraisinghamLBFK06 fatcat:jibx3krrgrgllmz6iv6g55ueme

Security and Privacy in Video Surveillance: Requirements and Challenges [chapter]

Qasim Mahmood Rajpoot, Christian Damsgaard Jensen
2014 IFIP Advances in Information and Communication Technology  
In this paper, we present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify  ...  or in storage) and on authorizing access to this data.  ...  Similar to the above-mentioned security requirements, there exist several solutions regarding access control mechanisms for online and other payment-based video databases such as [32] [33] [34] .  ... 
doi:10.1007/978-3-642-55415-5_14 fatcat:f6kz6nj6avg5vomqvygrwkp2da

A systematic approach towards user-centric privacy and security for smart camera networks

Thomas Winkler, Bernhard Rinner
2010 Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras - ICDSC '10  
Privacy and security are topics that are often overlooked or considered as an afterthought. With the digitalization of visual surveillance, data can easily be stored and accessed.  ...  This raises the question how confidential data can be protected, authenticity and integrity can be ensured and access can be restricted.  ...  Secure video streaming ensures confidentiality, integrity, authenticity and freshness of image data. Furthermore, multi-level privacy protection and per-level access control are supported.  ... 
doi:10.1145/1865987.1866009 dblp:conf/icdsc/WinklerR10 fatcat:gchxvvtc3vdmlesuwxkwwyt4ue

Video Forensics in Cloud Computing: The Challenges & Recommendations

Manal Al-Rawahi, E.A.Edirisinghe
2015 Zenodo  
In particular we discuss the requirements of a legally acceptable video forensic system, study the current security and privacy challenges of cloud based computing systems and make recommendations for  ...  Forensic analysis of large video surveillance datasets requires computationally demanding processing and significant storage space.  ...  We would like to thank Dr.Olaf Maennel for providing helpful feedbacks and suggestions.  ... 
doi:10.5281/zenodo.3968805 fatcat:u4nb4trlufa3vfa3uhtpoy2jey

Surveillance Privacy Protection [chapter]

Nikki Gulzar, Basra Abbasi, Eddie Wu, Anil Ozbal, WeiQi Yan
2013 Intelligent Multimedia Surveillance  
In addition, this chapter also emphasizes the importance of tools, data sets and databases that are being developed to enable surveillance privacy.  ...  The objective of this chapter is to evaluate what types of surveillance, privacy and protection measures are being implemented, how information is being used and what rights individuals have over this.  ...  Secure database. • Access control. Authorized access to the original copy of video.  ... 
doi:10.1007/978-3-642-41512-8_5 fatcat:3fz4bftl35gp3gynsmy6mvirl4

Privacy and Security in Video Surveillance [chapter]

Thomas Winkler, Bernhard Rinner
2013 Intelligent Multimedia Surveillance  
For a long time it was accepted that the potential benefits of video surveillance go hand in hand with a loss of personal privacy.  ...  However, with the on-board processing capabilities of modern embedded systems it becomes possible to compensate this privacy loss by making security and privacy protection inherent features of video surveillance  ...  Acknowledgements This work was performed as part of the project TustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks 1 .  ... 
doi:10.1007/978-3-642-41512-8_3 fatcat:iz6rshr4cfdgvbo4pmq3brpkt4

Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain [article]

Alem Fitwi, Yu Chen
2021 arXiv   pre-print
The BC-based solution creates an environment auspicious for creating decentralized, reliable SACs and storage sites with secure and privacy-aware sharing of stored surveillance videos across SAC nodes  ...  Wherefore, this paper proposes a Secure and Privacy-preserving Stored surveillance video sharing (SePriS) mechanism for authorized users/nodes based on smart contracts, blockchain (BC), and the enciphering  ...  In our proposal, the smart contract is tailored for better handling of the privacy and confidentiality issues.  ... 
arXiv:2104.05617v1 fatcat:zb42p46ktjhldcmufpatpswyyy

Privacy by Design at Population Data BC: a case study describing the technical, administrative, and physical controls for privacy-sensitive secondary use of personal information for research in the public interest

C. Pencarrick Hertzman, N. Meagher, K. M. McGrail
2013 JAMIA Journal of the American Medical Informatics Association  
This case study was authored by CPH and co-authored by KMM and NM.  ...  Principle Six: transparency through independent verification Access controls of core systems as well as the SRE allow for auditing o flogs, which along with the video surveillance provide data stewards  ...  Respect for user privacy - keep it user-centric Access controls with logging and regular auditing  ... 
doi:10.1136/amiajnl-2012-001011 pmid:22935136 pmcid:PMC3555322 fatcat:ul4rcpkxprajfkuripvzg6ddze

Towards a Pervasive Access Control within Video Surveillance Systems [chapter]

Dana Al Kukhun, Dana Codreanu, Ana-Maria Manzat, Florence Sedes
2013 Lecture Notes in Computer Science  
The proposed solution was implemented and tested in a video surveillance use case.  ...  In this paper, we apply an access control layer on top of the LINDO architecture that takes into consideration the user's context and situation and recommends alternative resources to the user when he  ...  Only the objects which have roles associated to are extracted from the multimedia contents. [19] studied the confidentiality and privacy issues in the context of a video surveillance system.  ... 
doi:10.1007/978-3-642-40511-2_20 fatcat:6u7wnqjggndyzev6q7i5wom7p4

Enabling Video Privacy through Computer Vision

A. Senior, S. Pankanti, A. Hampapur, L. Brown, Ying-Li Tian, A. Ekin, J. Connell, Chiao Fe Shu, M. Lu
2005 IEEE Security and Privacy  
The technology has been implemented in the form of a privacy console that manages operator access to different versions of the video-derived data according to access control lists.  ...  In this paper we describe a technology for protecting privacy in video systems.  ...  Video surveillance can readily be used as a tool for state control and oppression.  ... 
doi:10.1109/msp.2005.65 fatcat:yjxflptaznblvoqm2vpdogqche

Humpty Dumpty Was Wrong - Consistency in Meaning Matters: Some Definitions of Privacy, Publicity, Secrecy, and Other Family Members

Gary T. Marx
2016 Secrecy and Society  
Yet surveillance can also be the means of protecting privacy (biometric identification and audit trails, video cameras that film those with access to sensitive reverse-the subject has an obligation to  ...  and surveillance may be mass (broadly) directed, as with TV ads and video cameras in a public square.  ... 
doaj:049cfbad99bb4a37a111b0019f3e6bb6 fatcat:yjmg4sqeb5dmrpr33kgq36feie

I Always Feel Like Somebody's Watching Me: Student Perceptions of Library Data Privacy

Megan Palmer, Amie Freeman, Jade Geary
2020 South Carolina libraries  
As librarians, we recognize the importance of privacy and confidentiality for allowing patrons to learn and explore without unnecessary barriers or fear of repercussions.  ...  We asked for audience engagement as we discussed future directions including a survey on student perceptions of data privacy in libraries.  ...  In fact, one library administrator who was responsible for the implementation of a video surveillance initiative, when asked about the proper role of video surveillance in libraries, commented in 2014  ... 
doi:10.51221/sc.scl.2020.4.1.9 fatcat:j7gg2zazrnfldmyztzwh672tmq

The pursuit of citizens' privacy: a privacy-aware smart city is possible

Antoni Martinez-Balleste, Pablo Perez-martinez, Agusti Solanas
2013 IEEE Communications Magazine  
Privacy in Video Surveillance -Pervasive video surveillance systems inherently endanger the privacy of people: identities and activities can easily be retrieved from pictures and videos.  ...  Also video surveillance entails location privacy.  ... 
doi:10.1109/mcom.2013.6525606 fatcat:c3ialdolvjcjtponpfmxejvccq

Visual Surveillance within the EU General Data Protection Regulation: A Technology Perspective

Mamoona N. Asghar, Nadia Kanwal, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao
2019 IEEE Access  
for visual surveillance data.  ...  The paper surveys the existing market-based data protection solutions and provides suggestions for the development of GDPR-compliant Data Protection-by-Design video surveillance systems.  ...  ACKNOWLEDGMENTS We would like to thank the reviewers for their valuable comments in improving the quality of the article and in enhancing the readability and usefulness of our manuscript.  ... 
doi:10.1109/access.2019.2934226 fatcat:rbs4au7iyzdd7mfscho6xk6sna

CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia

Jinsu Kim, Namje Park, Geonwoo Kim, Seunghun Jin
2019 Electronics  
However, the surveillance environments face the risks of privacy exposure, which necessitates secure countermeasures.  ...  Video meta-data, in particular, contain various types of personal information that is analyzed based on big data and are thus fraught with high levels of confidentiality breaches.  ...  It would be necessary to separate the implementation of access control, i.e., file and data access authority from the administrator's end (insiders, etc.) vs. plain-text-data verification authority on  ... 
doi:10.3390/electronics8040412 fatcat:nn2veb4e3zhfpod5nlhdwg63da
« Previous Showing results 1 — 15 out of 5,379 results