Team for Research in
Ubiquitous Secure Technology

Privacy in Camera Networks, A Technical Perspective
Marci Meingast, Sameer Pai, Stephen Wicker, Shankar Sastry

Citation
Marci Meingast, Sameer Pai, Stephen Wicker, Shankar Sastry. "Privacy in Camera Networks, A Technical Perspective". UCB Technical Report UCB/EECS-2007-94, July 2007.

Abstract
The prevalence of camera networks in public places has increased substantially over the last ten years. This is in part due to improved vision algorithms and the development of simple, less expensive cameras. With this increased prevalence, a number of privacy concerns have been raised. Particular concern has focused on the level of detailed information that image data provides and the real time operation of most camera networks. In response to these concerns, policies and best practices have been suggested. In this paper we look at current deployment policies and suggest technical solutions that enhance privacy awareness. We propose the use of system design measures, such as validation codes and online notices. We also look at different levels of data abstraction that can be performed using computer vision techniques, and characterize the information these methods provide about the scene, allowing practitioners to determine which data must be used for to support the network mission as well as the information that can be withheld. We provide experimental results on these measures and suggest open areas of research.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Marci Meingast, Sameer Pai, Stephen Wicker, Shankar Sastry.
    <a href="http://www.truststc.org/pubs/325.html"
    >Privacy in Camera Networks, A Technical
    Perspective</a>, <i>UCB Technical Report
    UCB/EECS-2007-94</i>, July 2007.
  • Plain text
    Marci Meingast, Sameer Pai, Stephen Wicker, Shankar Sastry.
    "Privacy in Camera Networks, A Technical
    Perspective". <i>UCB Technical Report
    UCB/EECS-2007-94</i>, July 2007.
  • BibTeX
    @article{MeingastPaiWickerSastry07_PrivacyInCameraNetworksTechnicalPerspective,
        author = {Marci Meingast and Sameer Pai and Stephen Wicker
                  and Shankar Sastry},
        title = {Privacy in Camera Networks, A Technical Perspective},
        journal = {UCB Technical Report UCB/EECS-2007-94},
        month = {July},
        year = {2007},
        abstract = {The prevalence of camera networks in public places
                  has increased substantially over the last ten
                  years. This is in part due to improved vision
                  algorithms and the development of simple, less
                  expensive cameras. With this increased prevalence,
                  a number of privacy concerns have been raised.
                  Particular concern has focused on the level of
                  detailed information that image data provides and
                  the real time operation of most camera networks.
                  In response to these concerns, policies and best
                  practices have been suggested. In this paper we
                  look at current deployment policies and suggest
                  technical solutions that enhance privacy
                  awareness. We propose the use of system design
                  measures, such as validation codes and online
                  notices. We also look at different levels of data
                  abstraction that can be performed using computer
                  vision techniques, and characterize the
                  information these methods provide about the scene,
                  allowing practitioners to determine which data
                  must be used for to support the network mission as
                  well as the information that can be withheld. We
                  provide experimental results on these measures and
                  suggest open areas of research. },
        URL = {http://www.truststc.org/pubs/325.html}
    }
    

Posted by Sameer Pai on 30 Mar 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.