Privacy protection vs. utility in visual data An objective evaluation framework

被引:19
|
作者
Erdelyi, Adam [1 ]
Winkler, Thomas [2 ]
Rinner, Bernhard [1 ]
机构
[1] Alpen Adria Univ, Klagenfurt & Lakeside Labs, Inst Networked & Embedded Syst, Klagenfurt, Austria
[2] Ams AG, Tobelbader Str 30, A-8141 Premstaetten, Austria
关键词
Visual privacy; Video surveillance; Privacy evaluation framework; Privacy/utility trade-off; TRACKING;
D O I
10.1007/s11042-016-4337-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous and networked sensors impose a huge challenge for privacy protection which has become an emerging problem of modern society. Protecting the privacy of visual data is particularly important due to the omnipresence of cameras, and various protection mechanisms for captured images and videos have been proposed. This paper introduces an objective evaluation framework in order to assess such protection methods. Visual privacy protection is typically realised by obfuscating sensitive image regions which often results in some loss of utility. Our evaluation framework assesses the achieved privacy protection and utility by comparing the performance of standard computer vision tasks, such as object recognition, detection and tracking on protected and unprotected visual data. The proposed framework extends the traditional frame-by-frame evaluation approach by introducing two new approaches based on aggregated and fused frames. We demonstrate our framework on eight differently protected video-sets and measure the trade-off between the improved privacy protection due to obfuscating captured image data and the degraded utility of the visual data. Results provided by our objective evaluation method are compared with an available state-of-the-art subjective study of these eight protection techniques.
引用
收藏
页码:2285 / 2312
页数:28
相关论文
共 50 条
  • [21] Protection of Privacy in Big Data using SDD Framework with DNN
    Prasad, B. Ravi
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 998 - 1001
  • [22] UtilityAware: A framework for data privacy protection in e-health
    Moqurrab, Syed Atif
    Naeem, Tariq
    Malik, M. Shoaib
    Fayyaz, Asim Ali
    Jamal, Asif
    Srivastava, Gautam
    INFORMATION SCIENCES, 2023, 643
  • [23] Optimizing Privacy, Utility, and Efficiency in a Constrained Multi-Objective Federated Learning Framework
    Kang, Yan
    Gu, Hanlin
    Tang, Xingxing
    He, Yuanqin
    Zhang, Yuzhu
    He, Jinnan
    Han, Yuxing
    Fan, Lixin
    Chen, Kai
    Yang, Qiang
    ACM Transactions on Intelligent Systems and Technology, 2024, 15 (06)
  • [24] Data line surge protection: fact vs. fiction
    Fowler, J
    COMMUNICATIONS NEWS, 1998, 35 (03): : 44 - +
  • [25] Survey: the effects of disclosing general data vs. location data on customer privacy
    Hassoon, Imad Ali
    Jasim, Anwar Chitheer
    Tapus, Nicolae
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [26] Smart city development: Data sharing vs. data protection legislations
    Joyce, Aaron
    Javidroozi, Vahid
    CITIES, 2024, 148
  • [27] Objective vs. Subjective Evaluation of Speakers with and without Complete Dentures
    Haderlein, Tino
    Bocklet, Tobias
    Maier, Andreas
    Noeth, Elmar
    Knipfer, Christian
    Stelzle, Florian
    TEXT, SPEECH AND DIALOGUE, PROCEEDINGS, 2009, 5729 : 170 - +
  • [28] Prosody Evaluation as a Diagnostic Process: Subjective vs. Objective Measurements
    Albert Rilliard
    Véronique Aubergé
    International Journal of Speech Technology, 2003, 6 (4) : 409 - 418
  • [29] Utility Meets Privacy: A Critical Evaluation of Tabular Data Synthesizers
    Hoellig, Julian
    Geierhos, Michaela
    IEEE ACCESS, 2025, 13 : 44497 - 44509
  • [30] Evaluation Mechanism of Privacy Protection on Dynamic Data Targeted at Data Partition
    Zhou, Zhongmin
    Shi, Yuliang
    Zhang, Honglei
    Cui, Lizhen
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1524 - 1529