Trusting the Computer in Computer Vision: A Privacy-Affirming Framework

被引:10
作者
Chen, Andrew Tzer-Yeu [1 ]
Biglari-Abhari, Morteza [1 ]
Wang, Kevin I-Kai [1 ]
机构
[1] Univ Auckland, Dept Elect & Comp Engn, Embedded Syst Res Grp, Auckland, New Zealand
来源
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) | 2017年
关键词
SURVEILLANCE; VIDEO; IMAGES;
D O I
10.1109/CVPRW.2017.178
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of surveillance cameras continues to increase, ranging from conventional applications such as law enforcement to newer scenarios with looser requirements such as gathering business intelligence. Humans still play an integral part in using and interpreting the footage from these systems, but are also a significant factor in causing unintentional privacy breaches. As computer vision methods continue to improve, we argue in this position paper that system designers should reconsider the role of machines in surveillance, and how automation can be used to help protect privacy. We explore this by discussing the impact of the human-in-the-loop, the potential for using abstraction and distributed computing to further privacy goals, and an approach for determining when video footage should be hidden from human users. We propose that in an ideal surveillance scenario, a privacy-affirming framework causes collected camera footage to be processed by computers directly, and never shown to humans. This implicitly requires humans to establish trust, to believe that computer vision systems can generate sufficiently accurate results without human supervision, so that if information about people must be gathered, unintentional data collection is mitigated as much as possible.
引用
收藏
页码:1360 / 1367
页数:8
相关论文
共 34 条
[1]  
[Anonymous], 2014, P 2014 ACM INT JOINT
[2]  
Barhm Mukhtaj S., 2011, Modern Approaches in Applied Intelligence. Proceedings 24th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2011), P511, DOI 10.1007/978-3-642-21827-9_52
[3]  
Bignami Francesca., 2007, CHICAGO J INT LAW VO, V8, P233
[4]  
Birnstill P, 2013, 2013 10TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS 2013), P318, DOI 10.1109/AVSS.2013.6636659
[5]  
Blazevic M., 2015, CROAT COMP VIS WORKS, P9
[6]  
Brin D., 1999, TRANSPARENT SOC WILL
[7]   On the Hardware/Software Design and Implementation of a High Definition Multiview Video Surveillance System [J].
Chan, S. C. ;
Zhang, Shuai ;
Wu, Jia-Fei ;
Tan, Hai-Jun ;
Ni, J. Q. ;
Hung, Y. S. .
IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (02) :248-262
[8]  
DeCew J., 2018, The Stanford Encyclopedia of Philosophy
[9]  
Hornberg A., 2006, HDB MACHINE VISION, P703
[10]   The Case for Offload Shaping [J].
Hu, Wenlu ;
Amos, Brandon ;
Chen, Zhuo ;
Ha, Kiryong ;
Richter, Wolfgang ;
Pillai, Padmanabhan ;
Gilbert, Benjamin ;
Harkes, Jan ;
Satyanarayanan, Mahadev .
16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15), 2015, :51-56