SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Towards a Trustworthy Privacy
in Pervasive Video Surveillance Systems

Antoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Puig, Antonia Paniza

                        Universitat Rovira i Virgili
                       Universitat de les Illes Balears
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
UNESCO Chair in Data Privacy

    Universal Declaration of Human Rights (1948)
      – “No one shall be subjected to arbitrary interference with
        his privacy, family, home or correspondence, nor to
        attacks upon his honour and reputation. Everyone has
        the right to the protection of the law against such
        interference or attacks”
    Data privacy technologies are about technically
    enforcing the above right in the information society



Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
UNESCO Chair in Data Privacy

    Unfortunately…
      – Lack of awareness of the population on the existing
        privacy threats (profiling, tracking, etc.)
      – Large companies and the “Big Brother” effect
      – Lack of comprehensive legislation




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
UNESCO Chair in Data Privacy

    Chair aims and goals
      – Promote the adoption of privacy-preserving
        technologies by governments and private sectors
        (telecoms, banks, etc.)
      – Raise the public awareness of the need and the right to
        preserve the privacy of the individuals
      – Promote cross-national research on privacy technologies
    We are mainly focused on technologies



Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Privacy in Video Surveillance

    Example scenario
                                                                                     Pre
                         surveillance                                             processing
                           camera



                                                                              Identification

                                                                             Video Processing Module
                                                                                Content
                                                                               protection
                                        Information System




                                                             Security Management Module




                                                User

                                                                        Trusted Manager
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Privacy in Video Surveillance

    Pervasive technology scenario                                                                                                                                                                                                    surveillance
                                                                                                                                                                                                                                                                                                                                  Pre
                                                                                                                                                                                                                                                                                                                               processing
                                                                                                                                                                                                                                       camera


                                                                                                                                                                                 Pre
                                                                                                                   surveillance                                               processing
                                                                                                                     camera                                                                                                                                                                                                Identification

                                                                                                                                                                          Identification                                                                                                                                Video Processing Module
                                                                                                                                                                         Video Processing Module
                                                                                                                                                                                                                                                                                                                             Content
                                                                                                                                                                            Content
                                                                                                                                                                           protection                                                                                                                                       protection
        surveillance
                                                                          Pre                                                     Information System                                                                                                       Information System
                                                                       processing
          camera


                                                                                                                                                       Security Management Module
                                                                Identification

                                                               Video Processing Module                                                                                                                                                                                                      Security Management Module
                                                                      Content                                                             User
                                                                     protection
                       Information System
                                                                                                                                                                    Trusted Manager



                                               Security Management Module                                                                                                                                                                                              User

                                                                                                                                                                                                                                                                                                                   Trusted Manager
                               User

                                                          Trusted Manager




                                                                                                                                                                                                                                                                                                         Pre
                                                                                                                                                                                                                                            surveillance                                              processing
                                                                                                                                                                                                                                              camera

                                                                                                Pre
                                surveillance                                                 processing
                                  camera                                                                                                                                                                                                                                                          Identification

                                                                                                                                                                                                                                                                                                 Video Processing Module
                                                                                         Identification                                                                                                                                                                                             Content
                                                                                                                                                                                                                                                                                                   protection
                                                                                         Video Processing Module                                                                                                                                            Information System

                                                                                            Content
                                                                                           protection
                                                Information System                                                                                                                                                 Pre
                                                                                                                                                   surveillance                                                 processing                                                       Security Management Module
                                                                                                                                                     camera


                                                                        Security Management Module
                                                                                                                                                                                                            Identification                                          User

                                                                                                                                                                                                           Video Processing Module                                                          Trusted Manager
                                                        User                                                                                                                                                  Content
                                                                                                                                                                                                             protection
                                                                                                                                                                  Information System
                                                                                    Trusted Manager



                                                                                                                                                                                           Security Management Module




                                                                                                                                                                          User

                                                                                                                                                                                                      Trusted Manager




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Privacy in Video Surveillance

    Typical “privacy” technologies in VS
      – Face/people detection
      – Blurring/Encryption
    But…
      – Are people notified they are being recorded?
      – Is the access to the raw/encrypted data correctly
        managed?
      – Do the video processing techniques really ensure privacy
        of individuals?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Trustworthy ICT?

    The goal of VS is security
    Security vs privacy...
      – Is people happy while being monitored?
      – Does people feel safe while being under surveillance?




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Trustworthy ICT?

    Is technology reliable?
      – “The degree to which a trustor has a justifiable belief
        that the trustee will provide the expected function or
        service”
    Technology problems? Owner misbehaviors?
      – Are individuals protected by the law? Lack of legislation
        can certainly slow down the social acceptance of ICT
    Social acceptance vs. User collaboration
      – Web 2.0 trust is based on collaboration of users

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
(I) Technology: algorithms and platform

    Trusted Platform Module chips
      – Can be used to build a plethora of trustable devices
      – For instance, trustworthy cameras
      – But they could be hacked...

                                                                             Pre
                                     surveillance                            processing
                                     camera



                                                                          Identification

                                                                        Video Processing Module

                                                                          Content
                                                                          protection
                                              Information System




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
(I) Technology: algorithms and platform

    In the case of VS, computer vision techniques...
      – Must work in real time. If the technique needs some
        temporary storage of the raw video, a security leak of
        the information system can compromise the privacy of
        the individuals.
      – Must perform well in terms of accuracy. (i) Must detect
        ALL the ROIs (e.g. Faces). (ii) Should not need human
        supervision.




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
(I) Technology: algorithms and platform

    Fortunately...
      – There are techniques to detect ROIs in realtime
      – And capable of detecting them correctly!
    But...
      – Camera conditions are essential: fixed cameras, good
        illumination conditions, etc.
      – Some of the literature does not tackle these issues!
      – Some of the proposals blur ROIs in the pixel domain and
        raw video is stored and accessible to authorized users.

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
(I) Technology: algorithms and platform

    The platform must fulfil some properties, namely
      – Confidentiality, authenticity, integrity
      – Security Access
           Symmetric
           Encryption

                      Public Key
                     Cryptography                                                                 Video Processing Module



                                                         Information System
  Trusted Certification
       Authorities                                                            Security Management Module




                        Secure Logging                        User

                                                                                        Trusted Manager
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Law enforcement

    Directive 95/46/EC on the protection of individuals
    with regard to the processing of personal data and
    on the free movement of such data
      – Any information relating to an identified or identifiable
        natural person can be seen as personal data
      – A picture can be considered personal data if it allows
        identification of individuals




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Law enforcement

    Spanish legislation
      – Surveillance must be advertised
      – The owner must take the necessary precautions to
        ensure the safety of the images and prevent alteration,
        loss or unauthorized access
      – Data cannot be released to third parties


                      Does the owner
                     behave properly?
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Law enforcement

    A trust score for VS
                       IMAGE PROTECTION                                 DATA ACCESS

                                                           High trust + notification
                   High trust. ROIs are                    In case of identification
                   hidden, no supervision /
                   no real time                            High trust. Anyone accesses
                                                           the protected data, auhorized
                                                           users access original data.

                  Low trust. ROIs are hidden,              Low trust. Only
                  but human supervision is                 authorized users can
                  needed / no real time                    access ALL THE DATA
                  No trust. ROIs are not                   No trust. Anyone can
                  hidden                                   access the original data

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Law enforcement




                         IMAGE PROTECTION LOW

                         DATA ACCESS HIGH

                         Data is protected and sent to
                         SECURITAS. Original data
                         is only available to police.

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Content

    UNESCO Chair in Data Privacy
    Privacy in Video Surveillance
    Trustworthy ICT?
    (I) Technology: algorithms and platform
    (II) Law enforcement
    (III) User collaboration
    Discussion


Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
User collaboration

    User collaboration is natural in state-of-art internet
    services:
      – Collaborative recommendation systems
      – Collaborative privacy techniques: Instead of trusting a
        third party, users collaborate to gain privacy.
    It is interesting that users are informed upon being
    recorded by VS systems




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
User collaboration

    Smartphone and web application
         surveillance
           camera


                                    Tag
                                   Validate           Server            Database
             User
           Application             Inform



                                     web                   Web interface
                                   browser




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
User collaboration

    Smartphone and web application




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
DISCUSSION




Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Mais conteúdo relacionado

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

  • 1. Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems Antoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Puig, Antonia Paniza Universitat Rovira i Virgili Universitat de les Illes Balears
  • 2. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 3. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 4. UNESCO Chair in Data Privacy Universal Declaration of Human Rights (1948) – “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks” Data privacy technologies are about technically enforcing the above right in the information society Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 5. UNESCO Chair in Data Privacy Unfortunately… – Lack of awareness of the population on the existing privacy threats (profiling, tracking, etc.) – Large companies and the “Big Brother” effect – Lack of comprehensive legislation Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 6. UNESCO Chair in Data Privacy Chair aims and goals – Promote the adoption of privacy-preserving technologies by governments and private sectors (telecoms, banks, etc.) – Raise the public awareness of the need and the right to preserve the privacy of the individuals – Promote cross-national research on privacy technologies We are mainly focused on technologies Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 7. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 8. Privacy in Video Surveillance Example scenario Pre surveillance processing camera Identification Video Processing Module Content protection Information System Security Management Module User Trusted Manager Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 9. Privacy in Video Surveillance Pervasive technology scenario surveillance Pre processing camera Pre surveillance processing camera Identification Identification Video Processing Module Video Processing Module Content Content protection protection surveillance Pre Information System Information System processing camera Security Management Module Identification Video Processing Module Security Management Module Content User protection Information System Trusted Manager Security Management Module User Trusted Manager User Trusted Manager Pre surveillance processing camera Pre surveillance processing camera Identification Video Processing Module Identification Content protection Video Processing Module Information System Content protection Information System Pre surveillance processing Security Management Module camera Security Management Module Identification User Video Processing Module Trusted Manager User Content protection Information System Trusted Manager Security Management Module User Trusted Manager Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 10. Privacy in Video Surveillance Typical “privacy” technologies in VS – Face/people detection – Blurring/Encryption But… – Are people notified they are being recorded? – Is the access to the raw/encrypted data correctly managed? – Do the video processing techniques really ensure privacy of individuals? Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 11. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 12. Trustworthy ICT? The goal of VS is security Security vs privacy... – Is people happy while being monitored? – Does people feel safe while being under surveillance? Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 13. Trustworthy ICT? Is technology reliable? – “The degree to which a trustor has a justifiable belief that the trustee will provide the expected function or service” Technology problems? Owner misbehaviors? – Are individuals protected by the law? Lack of legislation can certainly slow down the social acceptance of ICT Social acceptance vs. User collaboration – Web 2.0 trust is based on collaboration of users Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 14. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 15. (I) Technology: algorithms and platform Trusted Platform Module chips – Can be used to build a plethora of trustable devices – For instance, trustworthy cameras – But they could be hacked... Pre surveillance processing camera Identification Video Processing Module Content protection Information System Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 16. (I) Technology: algorithms and platform In the case of VS, computer vision techniques... – Must work in real time. If the technique needs some temporary storage of the raw video, a security leak of the information system can compromise the privacy of the individuals. – Must perform well in terms of accuracy. (i) Must detect ALL the ROIs (e.g. Faces). (ii) Should not need human supervision. Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 17. (I) Technology: algorithms and platform Fortunately... – There are techniques to detect ROIs in realtime – And capable of detecting them correctly! But... – Camera conditions are essential: fixed cameras, good illumination conditions, etc. – Some of the literature does not tackle these issues! – Some of the proposals blur ROIs in the pixel domain and raw video is stored and accessible to authorized users. Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 18. (I) Technology: algorithms and platform The platform must fulfil some properties, namely – Confidentiality, authenticity, integrity – Security Access Symmetric Encryption Public Key Cryptography Video Processing Module Information System Trusted Certification Authorities Security Management Module Secure Logging User Trusted Manager Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 19. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 20. Law enforcement Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data – Any information relating to an identified or identifiable natural person can be seen as personal data – A picture can be considered personal data if it allows identification of individuals Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 21. Law enforcement Spanish legislation – Surveillance must be advertised – The owner must take the necessary precautions to ensure the safety of the images and prevent alteration, loss or unauthorized access – Data cannot be released to third parties Does the owner behave properly? Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 22. Law enforcement A trust score for VS IMAGE PROTECTION DATA ACCESS High trust + notification High trust. ROIs are In case of identification hidden, no supervision / no real time High trust. Anyone accesses the protected data, auhorized users access original data. Low trust. ROIs are hidden, Low trust. Only but human supervision is authorized users can needed / no real time access ALL THE DATA No trust. ROIs are not No trust. Anyone can hidden access the original data Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 23. Law enforcement IMAGE PROTECTION LOW DATA ACCESS HIGH Data is protected and sent to SECURITAS. Original data is only available to police. Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 24. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration Discussion Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 25. User collaboration User collaboration is natural in state-of-art internet services: – Collaborative recommendation systems – Collaborative privacy techniques: Instead of trusting a third party, users collaborate to gain privacy. It is interesting that users are informed upon being recorded by VS systems Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 26. User collaboration Smartphone and web application surveillance camera Tag Validate Server Database User Application Inform web Web interface browser Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 27. User collaboration Smartphone and web application Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  • 28. DISCUSSION Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems