Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems Antoni Mart´ ınez-Ballest´ e , Hatem A. Rashwan , Dom` enec Puig and Antonia Paniza Fullana Department of Computer Engineering and Maths, Universitat Rovira i Virgili, Tarragona, Spain {antoni.martinez,domenec.puig}@urv.cat, hatem.rashwan@ieee.org Department of Civil Law, Universitat de les Illes Balears, Palma, Spain antonia.paniza@uib.es Abstract—The consideration of security and privacy is a linchpin of the social acceptance of pervasive technology. This paper paves the way to the development of trustworthy pervasive video surveillance systems, by emphasizing the need to properly combine different aspects that current systems do not manage. In particular, in this paper we propose the combination of the following issues into a common framework: proper people identification mainly based on computer vision techniques, content protection not only by using convenient cryptographic techniques, but also law enforcement and user cooperation in order to get feedback with regard to the whole video surveillance system. Furthermore, an analysis focused on the current computer vision techniques used for people identification is presented. Finally, a score to measure the trust offered by video surveil- lance systems is proposed. I. I NTRODUCTION In the last years, the enormous advance of Information and Communication Technologies (ICT) has paved the way to a solid Information Society: on the one hand, a plethora of services are offered throughout Internet; on the other, millions of users are continuously pouring tons of information (pictures, videos, opinions, etc.), using a variety of devices. The information is stored in servers which are interconnected and, hence, accessible from any point of the Internet. Moreover, computer scientists have developed techniques of information gathering and analysis. Hence, data are analyzed as they circulate and, consequently, a huge quantity of knowledge is generated. Despite of all the advantages clearly offered by ICT, pervasive computation and connection of ubiquitous com- puting devices (computers, smartphones, RFID readers, video cameras, etc.) may transform Information Society into a Dataveillance Society [1], [2]. As stated in the Universal Declaration of Human Rights [3], “No one shall be subjected to arbitrary interference with his privacy”. Moreover, the European Convention on Human Rights [4], states that “There shall be no interference by a public authority with the exercise of this right”. A. Privacy in Video Surveillance Pervasive video surveillance systems inherently jeopar- dize the privacy of people: identities and activities can be easily retrieved from pictures and videos. Certainly, people permits being surveilled in the name of security: homeland Fig. 1. An example video surveillance scenario. security, prevention of crime, etc. However, people dislike being monitored during their everyday activities. In the last decade, video surveillance has evolved from CCTV being monitored by authorized people to complex and intercon- nected pervasive video cameras, whose recorded content is streamed over a network, processed and datamined so as to extract knowledge. This fact facilitates the profiling of citizens and favors the “Big Brother” effect. Figure 1 presents an example video surveillance sce- nario. It consists of two cameras placed in a corridor. These cameras record digital video and perform some pre- processing (e.g. decrease frame rate, lossy compression of video). This video is sent to an Information System: a set of computers capable of storing, analyzing and granting access to the data. This video is handled by a Video Processing Module: on the one hand, the Identification sub- module detects faces with the aim of identifying people moving through the corridor. On the other, the Content Protection sub-module blurs the detected faces in order to preserve the privacy of the identified people. To that end, the video stream is analyzed to find Regions of Interest (ROIs, e.g. faces), which are tracked in time into records, corresponding to a single object (i.e. person). These records are analyzed to determine the identity of the object (i.e. The Second IEEE International Workshop on Social Implications of Pervasive Computing 2012, Lugano (23 March 2012) 978-1-4244-9529-0/12/$31.00 ©2012 IEEE 914