Download presentation
Presentation is loading. Please wait.
Published byAnneleen Jacobs Modified over 6 years ago
1
A New Technology for Video Surveillance Cameron Serles
Privacy AND Security A New Technology for Video Surveillance Cameron Serles
2
Agenda Video Surveillance Surveillance Vs. Privacy How and Why Privacy
A Privacy Enabling Technology Conclusion
3
Video Surveillance is On the Rise
Public Safety (Public and Private Surveillance) Corporate Data Security (Employee Monitoring) Marketing / Network Monitoring (Analytics) Device Location Tracking Customer Service Transactions Customer Profiling (Marketing) Access Control / Security (Biometrics) Public and Private Spaces, including open areas (such as streets, parks, open air venues) and enclosed facilities (such as malls, office towers, airports, train stations, subway platforms, buses and trains, court houses, etc.) are areas that various law enforcement agencies or facility managers would like put under video surveillance.
4
Why Worry About Privacy?
“The Era of Ubiquitous Data Availability is Clearly Upon Us, and If Privacy is to Survive, then We must Change the Paradigm to Adapt to this Ever-Changing Environment” Dr. Ann Cavoukian, Privacy Commissioner of Ontario
5
Privacy – a Positive Sum Solution
Prevailing View (Zero Sum) Privacy is Regarded as an Impediment to Innovation, Desired Goals New Approach (Positive Sum) Privacy Measures are Added to Surveillance Systems to not Weaken Functionality, but to Enhance the Overall Design. Source: Cavoukian, Ann Privacy by Design
6
Surveillance Vs. Privacy
Many Jurisdictions Have Implemented Privacy Laws, e.g. Ontario Privacy Traditionally Viewed as Obstacle to Surveillance Restrictive to Law Enforcement Required Notification of Subjects Restricted Placement
7
The Need for Privacy General Population Governments
Aware of Being Videoed Growing Unease about Privacy Governments Getting More Involved Privacy Commissioners Established The problem however, is that the general population is concerned about violations of their privacy Not only would some people object to having their face being in a video, there is the potential, with video cameras equipped with tilt/pan/zoom controls, for operators of video surveillance equipment to obtain inappropriate images of the general public.
8
How to Achieve Privacy? Privacy-Enhancing Technologies
Proactively Build it into the Model Minimize Unnecessary Collection of Data Strengthen Data Security Empower Individuals to Exercise Control over their Own Information Privacy-Enhancing Technologies
9
Benefits of Implementing Privacy-Enhancing Techniques
Minimizes Unnecessary Disclosure Empowers Individuals to Manage Own Data Enhances Security of Data Helps Promote Widespread Adoption of Technology
10
How to Implement in Video?
Need to Address the Valid Concerns of the Public When Their Face or Identity is Recorded: What is the Purpose of Recording? What is the Recourse in the Event of Misuse?
11
The Solution: Privacy Protected Surveillance
Step 1: Visual objects (e.g. Faces) are Detected and Tracked
12
The Solution: Privacy Protected Surveillance
Step 2: Visual objects (e.g. Faces) are Removed from the Video
13
The Solution: Privacy Protected Surveillance
Step 3: Removed Content Encrypted into a Separate Video Frame
14
The Solution: Privacy Protected Surveillance
Step 4: “Faceless” Video Can Then be Displayed, Recorded, Transmitted
15
The Solution: Privacy Protected Surveillance
Step 5: Allow “Empowered” Authority to Reverse Process, Restore Faces with Key
16
The Process For Video Privacy Encryption
Raw Images From Camera Images with ID Removed Images to be Restored Software or Hardware “Key” Restored Video
17
Face Detection and Tracking
Video Clip Example #1 Face Detection and Tracking
19
Object Removal and Encryption
Video Clip Example #2 Object Removal and Encryption
21
Object De-Encoding with Passcode
Video Clip Example #3 Object De-Encoding with Passcode
23
Objects Suitable for Removal
Face Identity Full Body Identity License Plates Commercial Signs
24
Benefits of Such an Approach
Shape And/Or Content Can be Encrypted Rest of Image is Still Visible to Viewer Video Can Still be Monitored for Unauthorized Activity If Legitimate Reason Exists to De-Encode Content, Empowered Person can Reverse Process on a Remote Device
25
Project Timetable Concept for Encryption/De-Encryption Technology Developed at University of Toronto Technology Being Commercialized, with Beta Version Due Out in 2010 Initial Customer Launch Early 2011
26
Target System Configuration
IC or Circuit Board with Encryption Algorithm, Integrated into Camera Secondary Processor, e.g. PC, for De-Encoding
27
Conclusion Video Surveillance Continues to Grow
Privacy Becoming a Necessity in Surveillance Activities Governments Are Motivated to Ensure the Public’s Privacy Privacy-Enabling Technologies Being Developed to Ensure Privacy in Surveillance Video
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.