HOME

TheInfoList



OR:

Visual privacy is the relationship between collection and dissemination of visual information, the
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
, and the legal issues surrounding them. These days
digital camera A digital camera, also called a digicam, is a camera that captures photographs in Digital data storage, digital memory. Most cameras produced today are digital, largely replacing those that capture images on photographic film or film stock. Dig ...
s are ubiquitous. They are one of the most common sensors found in electronic devices, ranging from
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s to tablets, and laptops to
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
cams. However,
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and trust implications surrounding it limit its ability to seamlessly blend into computing environment. In particular, large-scale camera networks have created increasing interest in understanding the advantages and disadvantages of such deployments. It is estimated that over 7 million
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
cameras deployed in the UK. Due to increasing security concerns, camera networks have continued to proliferate across other countries such as the United States. While the impact of such systems continues to be evaluated, in parallel, tools for controlling how these camera networks are used and modifications to the images and video sent to end-users have been explored.


Forms of Visual Data

Visual Privacy is often typically applied to particular technologies including: *
Closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
(CCTVs) * Visual sensor network (Also referred to as Camera Networks) *
Camera phone A camera phone is a mobile phone that is able to capture photographs and often record video using one or more built-in digital cameras. It can also send the resulting image wirelessly and conveniently. The first commercial phone with a color c ...
* Smart homes


Technologies enhancing visual privacy

Different forms of technologies are explored to enhance or preserve privacy while providing information collected from camera networks. Most of these solutions rely upon the target application and try to accomplish it in a privacy-preserving manner: * "Respectful Cameras" is a solution that automatically obscures the faces of observed people in video by overlaying a colored dot over the face of the individual. This technology tracks colored markers, worn by individuals, and then infers the location of a face by an offset from the marker. * Google Streetview uses automatic
face detection Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection also refers to the psychological process by which humans locate and attend to faces in a visual scene ...
to blur all faces in the city of Manhattan. * Eptascape has a product which provides automatic people tracking and provides privacy-enabled surveillance. * Cardea is a context-aware visual privacy protection mechanism that protects bystanders' visual privacy in photos according to their context-dependent privacy preferences, using
face recognition A facial recognition system is a technology potentially capable of matching a human face from a digital image or a Film frame, video frame against a database of faces. Such a system is typically employed to authenticate users through ID verif ...
and context computing techniques. *
Thermal A thermal column (or thermal) is a rising mass of buoyant air, a convective current in the atmosphere, that transfers heat energy vertically. Thermals are created by the uneven heating of Earth's surface from solar radiation, and are an example ...
and
depth camera Range imaging is the name for a collection of techniques that are used to produce a 2D image showing the distance to points in a scene from a specific point, normally associated with some type of sensor device. The resulting range image has pix ...
s are used in person detection and people counting. * Privacy-preserving Lens design consists of the joint optimization of optics and algorithms to perform vision tasks like human pose estimation and action recognition. Visual privacy hence encompasses privacy aware and privacy preserving systems which factor in the compute design choices, privacy policies regarding data-sharing in a collaborative and distributive environment and data ownership itself. At times privacy and trust are interlinked especially for the adoption and wide-scale acceptance of any technology. Having a fair and accurate
computer vision Computer vision tasks include methods for image sensor, acquiring, Image processing, processing, Image analysis, analyzing, and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical ...
model goes a long way into ensuring the prior two. A lot of developers are also now inculcating perspectives from privacy by design. These include but are not limited to processing all user sensitive data on the edge client device, decreasing data retentivity, and ensuring that the data is not used for anything it is not intended for.


See also

*
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...


References

{{reflist


External links


Unblinking: New Perspectives on Visual Privacy in the 21st Century
Privacy