Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.9.1779

A Study on the Surveillance Camera System for Privacy Protection  

Moon, Hae-Min (조선대학교 정보통신공학과)
Pan, Sung-Bum (조선대학교 제어계측로봇공학과)
Abstract
Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.
Keywords
surveillance system; privacy protection; scrambling; RFID;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Tansuriyavong, and S. I. Hanaki, "Privacy protection by concealing persons in circumstantial video image," In Proc. Perceptive User Interfaces, pp. 1-4, 2001
2 F. Matusek, and R. Reda, "Efficient secure storage of privacy enhanced video surveillance data in intelligent video surveillance systems," In Proc. IEEE Int. Symposium on Computer and Information Sciences, vol. 23, pp. 1-5, Oct. 2008
3 F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, and T. Ebrahimi, "Privacy enabling technology for video surveillance," In Proc. SPIE Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6250, May 2006
4 L. Bourdev, and J. Brandt, "Robust object detection via soft cascade," In Proc. of IEEE Conf. Computer Vision and Pattern Recognition, vol. 2, pp. 236-243, June 2005   DOI
5 D. Comaniciu, V. Ramesh, and P. Meer, "Kernel-based object tracking," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 25, no. 5, pp. 564-575, 2003   DOI   ScienceOn
6 I. Matthews, T. Ishikawa, and S. Baker, "The template update problem," IEEE Trans. Pattern Analysis Machine Intelligence, vol. 26, no. 6, pp. 810-815, 2004   DOI   ScienceOn
7 문해민, 김종구, 임성진, 반성범, "프라이버시 보호기능을 제공하는 RFID 기반 감시카메라 시스템에 관한 연구," 정보통신분야학회 합동학술대회, pp. 235-237, Nov. 2008
8 I. Martinez-Ponte, X. Desurmont, J. Meessen, and J. Delaigle, "Robust human face hiding ensuring privacy," In Proc. Int. Workshop on Image Analysis for Multimedia Interactive Services, 2005
9 I. Kitahara, K. Kogure, and N. Hagita, "Stealth vision for protecting privacy," In Proc. Int. Conf. Pattern Recognition, vol. 4, pp. 404-407, 2004
10 A. Westin, "Privacy and freedom," New York: Atheneum, 1967
11 I. Kitahara, "Interactive video surveillance by using environmental and mobile cameras," IEEE Automation Congress, pp. 1-6, Oct. 2008
12 M. Langheinrich, "Privacy invasions in ubiquitous computing," In Proc. Workshop on Socially-Informed Design of Privacy Enhancing Solutions in Ubiquitous Computing, Oct. 2002
13 R. Venkatesh Babu, and A. Makur, "Object-based surveillance video compression using foreground motion compensation," IEEE Control, Automation Robotics and Vision, pp. 1-6, Dec. 2006
14 이철호, "Privacy protection and RFID," 한국콘텐츠학회 2006 추계종합학술대회 논문집, vol. 4, pp. 443-446, 2006
15 Y. Chang, R. Yan, D. Chen, and J. Yang, "People identification with limited labels in privacy-protected video," In Proc. IEEE Int. Conf. Multimedia and Expo, pp. 1005-1008, July 2006
16 J. Schiff, M. Meingast, Deirdre K. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in real-time to address privacy concerns," IEEE Intelligent Robots and Systems, pp. 971-978, Oct. 2007
17 F. Dufaux, and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168-1174, Aug. 2008   DOI   ScienceOn