Please use this identifier to cite or link to this item: https://doi.org/10.1007/s11042-012-1207-9
DC FieldValue
dc.titleW3-privacy: Understanding what, when, and where inference channels in multi-camera surveillance video
dc.contributor.authorSaini, M.
dc.contributor.authorAtrey, P.K.
dc.contributor.authorMehrotra, S.
dc.contributor.authorKankanhalli, M.
dc.date.accessioned2014-07-04T03:10:39Z
dc.date.available2014-07-04T03:10:39Z
dc.date.issued2014
dc.identifier.citationSaini, M., Atrey, P.K., Mehrotra, S., Kankanhalli, M. (2014). W3-privacy: Understanding what, when, and where inference channels in multi-camera surveillance video. Multimedia Tools and Applications 68 (1) : 135-158. ScholarBank@NUS Repository. https://doi.org/10.1007/s11042-012-1207-9
dc.identifier.issn13807501
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/77944
dc.description.abstractHuge amounts of video are being recorded every day by surveillance systems. Since video is capable of recording and preserving an enormous amount of information which can be used in many applications, it is worth examining the degree of privacy loss that might occur due to public access to the recorded video. A fundamental requirement of privacy solutions is an understanding and analysis of the inference channels than can lead to a breach of privacy. Though inference channels and privacy risks are well studied in traditional data sharing applications (e.g., hospitals sharing patient records for data analysis), privacy assessments of video data have been limited to the direct identifiers such as people's faces in the video. Other important inference channels such as location (Where), time (When), and activities (What) are generally overlooked. In this paper we propose a privacy loss model that highlights and incorporates identity leakage through multiple inference channels that exist in a video due to what, when, and where information. We model the identity leakage and the sensitive information separately and combine them to calculate the privacy loss. The proposed identity leakage model is able to consolidate the identity leakage through multiple events and multiple cameras. The experimental results are provided to demonstrate the proposed privacy analysis framework. © 2012 Springer Science+Business Media, LLC.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/s11042-012-1207-9
dc.sourceScopus
dc.subjectAnonymity
dc.subjectEvents
dc.subjectModeling
dc.subjectPrivacy
dc.subjectSurveillance
dc.subjectVideo
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1007/s11042-012-1207-9
dc.description.sourcetitleMultimedia Tools and Applications
dc.description.volume68
dc.description.issue1
dc.description.page135-158
dc.description.codenMTAPF
dc.identifier.isiut000329243600009
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.