ANONYMOUS SUBJECT IDENTIFICATION IN PRIVACY-AWARE VIDEO SURVEILLANCE

被引:5
作者
Luo, Ying [1 ]
Ye, Shuiming [1 ]
Cheung, Sen-ching S. [1 ]
机构
[1] Univ Kentucky, Ctr Visualizat & Virtual Environm, Lexington, KY 40507 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010) | 2010年
关键词
Anonymous Subject Identification; Privacy Protection; Video Surveillance; k-Anonymous Quantization;
D O I
10.1109/ICME.2010.5583561
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been recently proposed to identify selected individuals and redact their images in the surveillance video. To identify individuals, the best known approach is to use biometric signals as they are immutable and highly discriminative. If misused, these characteristics of biometrics can seriously defeat the goal of privacy protection. In this paper, we propose an anonymous subject identification system based on homomorphic encryption (HE). It matches the biometric signals in encrypted domain to provide anonymity to users. To make the HE-based protocols computationally scalable, we propose a complexity-privacy tradeoff called k-Anonymous Quantization (kAQ) which narrows the plaintext search to a small cell before running the intensive encrypted-domain processing within the cell. We validate a key assumption in kAQ that privacy is better preserved by grouping biometric patterns far apart into the same cell. We also improve the matching success rate by replacing the original bounding boxes with epsilon-balls as basic units for grouping. Experimental results on a public iris biometric database demonstrate the validity of our framework.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 13 条
[1]  
Berger A. M., 2000, US patent, Patent No. [6, 067, 399, 6067399]
[2]  
DEVORE J, 1991, CO MONTEREY CALIFORN, P704
[3]   On the similarity of identical twin fingerprints [J].
Jain, AK ;
Prabhakar, S ;
Pankanti, S .
PATTERN RECOGNITION, 2002, 35 (11) :2653-2663
[4]   A study of identical twins' palmprints for personal verification [J].
Kong, Adams Wai-Kin ;
Zhang, David ;
Lu, Guangming .
PATTERN RECOGNITION, 2006, 39 (11) :2149-2156
[5]  
Masek L., 2003, The School of Computer Science and Software Engineering
[6]   Preserving privacy by de-identifying face images [J].
Newton, EM ;
Sweeney, L ;
Malin, B .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (02) :232-243
[7]  
Schiff J, 2007, 2007 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS, VOLS 1-9, P977
[8]  
Stanley J., 2003, Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society
[9]  
TAN T, 2005, CHINESE ACAD SCI I A
[10]  
WICKRAMASURIYA J, 2004, ACM INT C MULT NEW Y