2012
DOI: 10.1007/s11042-012-1207-9
|View full text |Cite
|
Sign up to set email alerts
|

W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(37 citation statements)
references
References 31 publications
0
37
0
Order By: Relevance
“…To prevent any breach of privacy, we currently use images of low resolution so that people's faces are not easily recognizable. For a more comprehensive approach towards privacy, the identity leakage model [29] could be used to calculate the privacy loss due to the face identity as well as the various side-channels. Furthermore, adaptive robust privacy protection methods [30] could be incorporated into our proposed framework.…”
Section: Discussionmentioning
confidence: 99%
“…To prevent any breach of privacy, we currently use images of low resolution so that people's faces are not easily recognizable. For a more comprehensive approach towards privacy, the identity leakage model [29] could be used to calculate the privacy loss due to the face identity as well as the various side-channels. Furthermore, adaptive robust privacy protection methods [30] could be incorporated into our proposed framework.…”
Section: Discussionmentioning
confidence: 99%
“…For measuring the level of privacy, the failure rates of automatic face recognition methods (PCA [53], LDA [8], LBP [1]) were considered, while the accuracy rate of a face detector (Viola-Jones [54]) were used to measure intelligibility. In these experiments only faces were considered, which is insufficient for proper privacy protection taking into account the above mentioned privacy by context approach or the secondary (implicit) privacy channels described by Saini et al [46]. Our paper focuses on establishing an objective evaluation framework by exploiting various evaluator functions to measure privacy and utility in various aspects.…”
Section: Related Workmentioning
confidence: 99%
“…[30][31][32] Next, we provide a review of the existing subjective evaluation (Sec. 2.1) and objective evaluation methods (Sec.…”
Section: Related Workmentioning
confidence: 99%
“…30,34 Saini et al 31 computed privacy loss using a model that incorporated the face detection and face recognition measures in addition to the scene contextual knowledge and some implicit identity inference information. In another work, 32 privacy loss was modeled using only the scene contextual knowledge and implicit identity inference information. While interesting contributions, the above works are target dependent as they assume presence of a specific target type ("face") in the image data and rely also on the performance of detection and recognition algorithms used.…”
Section: Objective Evaluationmentioning
confidence: 99%
See 1 more Smart Citation