Privacy protection vs. utility in visual data An objective evaluation framework

被引:19
|
作者
Erdelyi, Adam [1 ]
Winkler, Thomas [2 ]
Rinner, Bernhard [1 ]
机构
[1] Alpen Adria Univ, Klagenfurt & Lakeside Labs, Inst Networked & Embedded Syst, Klagenfurt, Austria
[2] Ams AG, Tobelbader Str 30, A-8141 Premstaetten, Austria
关键词
Visual privacy; Video surveillance; Privacy evaluation framework; Privacy/utility trade-off; TRACKING;
D O I
10.1007/s11042-016-4337-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous and networked sensors impose a huge challenge for privacy protection which has become an emerging problem of modern society. Protecting the privacy of visual data is particularly important due to the omnipresence of cameras, and various protection mechanisms for captured images and videos have been proposed. This paper introduces an objective evaluation framework in order to assess such protection methods. Visual privacy protection is typically realised by obfuscating sensitive image regions which often results in some loss of utility. Our evaluation framework assesses the achieved privacy protection and utility by comparing the performance of standard computer vision tasks, such as object recognition, detection and tracking on protected and unprotected visual data. The proposed framework extends the traditional frame-by-frame evaluation approach by introducing two new approaches based on aggregated and fused frames. We demonstrate our framework on eight differently protected video-sets and measure the trade-off between the improved privacy protection due to obfuscating captured image data and the degraded utility of the visual data. Results provided by our objective evaluation method are compared with an available state-of-the-art subjective study of these eight protection techniques.
引用
收藏
页码:2285 / 2312
页数:28
相关论文
共 50 条
  • [41] Privacy, data protection and emerging sciences and technologies: towards a common framework
    Friedewald, Michael
    Wright, David
    Gutwirth, Serge
    Mordini, Emilio
    INNOVATION-THE EUROPEAN JOURNAL OF SOCIAL SCIENCE RESEARCH, 2010, 23 (01) : 61 - 67
  • [42] Privacy Protection of Power Business Transaction Data Based on Blockchain Framework
    Zhao B.
    Chen Z.
    Yan L.
    Wang D.
    Xuan J.
    Jiang H.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2021, 45 (17): : 20 - 26
  • [43] The future of data protection: Gold standard vs. global standard
    Mantelero, Alessandro
    COMPUTER LAW & SECURITY REVIEW, 2021, 40
  • [44] Statistical vs. Visual Data Generation in Hand Gesture Recognition
    Ibrahim, Ahmed
    Kashef, Rasha
    2012 SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES'2012), 2012, : 163 - 169
  • [45] COMPARISON OF SUBJECTIVE SLEEP POSITION PREFERENCE VS. OBJECTIVE AMBULATORY DATA
    Rosenthal, L.
    Dolan, D. C.
    SLEEP, 2009, 32 : A387 - A387
  • [46] A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract)
    Xie, Shangyu
    Mohammady, Meisam
    Wang, Han
    Wang, Lingyu
    Vaidya, Jaideep
    Hong, Yuan
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1549 - 1550
  • [47] Comparing the Utility of Robust vs. Sparse Energy Storage Data Sets
    Thompson, Joe
    Willard, Steve
    Painter, Albert
    Shah, Saumil
    Etringer, Andrew
    Crawford, Alasdair
    2024 IEEE ELECTRICAL ENERGY STORAGE APPLICATION AND TECHNOLOGIES CONFERENCE, EESAT, 2024,
  • [48] Data Subjects vs. People's Data: Competing Discourses of Privacy and Power in Modern Russia
    Lokot, Tetyana
    MEDIA AND COMMUNICATION, 2020, 8 (02): : 314 - 322
  • [49] A Hybrid Protection Method to Enhance Data Utility while Preserving the Privacy of Medical Patients Data Publishing
    Jeba, Shermina
    BinJubier, Mohammed
    Ismail, Mohd Arfian
    Krishnan, Reshmy
    Nair, Sarachandran
    Narasimhan, Girija
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 808 - 821
  • [50] Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System
    Gajmal, Yogesh M.
    Udayakumar, R.
    INFORMATION SECURITY JOURNAL, 2022, 31 (04): : 451 - 465