U.S. patent application number 10/989760 was filed with the patent office on 2006-05-18 for system and practice for surveillance privacy-protection certification and registration.
Invention is credited to Arun Hampapur, Sharathchandra Pankanti, Andrew William Senior.
Application Number | 20060104444 10/989760 |
Document ID | / |
Family ID | 36386287 |
Filed Date | 2006-05-18 |
United States Patent
Application |
20060104444 |
Kind Code |
A1 |
Hampapur; Arun ; et
al. |
May 18, 2006 |
System and practice for surveillance privacy-protection
certification and registration
Abstract
There is provided an apparatus for the certification of privacy
compliance. The apparatus includes a registry of at least one of
enrolled video surveillance operators, approved surveillance
hardware devices, approved surveillance software programs, approved
surveillance system installers, and approved entities that manage
surveillance systems. The apparatus further includes a registry
searcher, in signal communication with the registry, for receiving
queries to the registry, and for determining whether at least one
of a particular surveillance operator, a particular surveillance
hardware device, a particular surveillance software program, a
particular surveillance system installer, and a particular entity
that manages a particular surveillance system is on the registry
based on a given query.
Inventors: |
Hampapur; Arun; (Norwalk,
CT) ; Pankanti; Sharathchandra; (Rego Park, NY)
; Senior; Andrew William; (New York, NY) |
Correspondence
Address: |
KEUSEY, TUTUNJIAN & BITETTO, P.C.
20 CROSSWAYS PARK NORTH, SUITE 210
WOOBURY
NY
11797
US
|
Family ID: |
36386287 |
Appl. No.: |
10/989760 |
Filed: |
November 16, 2004 |
Current U.S.
Class: |
380/210 |
Current CPC
Class: |
G08B 13/19686
20130101 |
Class at
Publication: |
380/210 |
International
Class: |
H04N 7/167 20060101
H04N007/167 |
Claims
1. An apparatus for the certification of privacy compliance,
comprising: a registry of at least one of enrolled video
surveillance operators, approved surveillance hardware devices,
approved surveillance software programs, approved surveillance
system installers, and approved entities that manage surveillance
systems; and a registry searcher, in signal communication with the
registry, for receiving queries to the registry, and for
determining whether at least one of a particular surveillance
operator, a particular surveillance hardware device, a particular
surveillance software program, a particular surveillance system
installer, and a particular entity that manages a particular
surveillance system is on the registry based on a given query.
2. The apparatus of claim 1, wherein the registry of enrolled video
surveillance operators also includes a list of at least one of
hardware, software, installers, and management entities used by the
operator.
3. The apparatus of claim 1, wherein the registry searcher searches
the registry for a given item of interest based on publicly
displayed identification codes included in the queries.
4. The apparatus of claim 1, wherein the enrolled video
surveillance operators are pre-committed to comply with at least
one code of privacy preserving practice.
5. The apparatus of claim 1, wherein the registry further includes
information regarding compliance with the at least one code of
privacy preserving practice as verified by a designated compliance
verifying entity.
6. A privacy protection verification system, comprising: a
compliance device for receiving at least one test stream from a
privacy protection system, evaluating the at least one test stream
with respect to at least one category of privacy intrusive data
corresponding to a privacy protection goal, and outputting a
measure of compliance of the at least one test stream with respect
to the privacy protection goal; and a memory device for storing the
privacy intrusive data.
7. The system of claim 6, wherein said compliance device is further
for receiving an alternative compliance data from an alternate
source and using the alternative compliance data as a baseline for
comparison against the at least one test stream during an
evaluation of the at least one test stream.
8. The system of claim 6, wherein said compliance device performs
face detection on the at least one test stream.
9. The system of claim 6, wherein said compliance device performs
biometric identification on the at least one test stream.
10. The system of claim 9, wherein the biometric identification is
based on at least one of race, gender, age, face, ear, iris, and
gate.
11. The system of claim 6, further comprising a database of
biometric data, in signal communication with said compliance
device, for use in identifying candidates found in the at least one
test stream.
12. A method for the certification of privacy compliance,
comprising the steps of: maintaining a registry of at least one of
enrolled video surveillance operators, approved surveillance
hardware devices, approved software programs, approved surveillance
system installers, and approved entities that manage surveillance
systems; and providing access to the registry via queries directed
to the registry to determine if at least one of a particular
surveillance operator, a particular surveillance hardware device, a
particular surveillance software program, a particular surveillance
system installer, and a particular entity that manages a particular
surveillance system is on the registry.
13. The method of claim 12, wherein the registry of enrolled video
surveillance operators also includes a list of at least one of
hardware, software, installers, and management entities used by the
operator.
14. The method of claim 12, wherein said step of providing access
to the registry utilizes publicly displayed identification codes to
search the registry for a given code of interest.
15. The method of claim 12, wherein the enrolled video surveillance
operators are pre-committed to comply with at least one code of
privacy preserving practice.
16. The method of claim 12, wherein the registry further includes
information regarding compliance with the at least one code of
privacy preserving practice as verified by a designated compliance
verifying entity.
17. A program storage device readable by machine, tangibly
embodying a program of instructions executable by the machine to
perform method steps for the certification of privacy compliance as
recited in claim 12.
18. A method for privacy protection verification, comprising the
steps of: receiving at least one test stream from a privacy
protection system; evaluating the at least one test stream with
respect to at least one category of privacy intrusive data
corresponding to a privacy protection goal; and outputting a
measure of compliance of the at least one test stream with respect
to the privacy protection goal.
19. The method of claim 18, further comprising the steps of:
receiving an alternative compliance data from an alternate source;
and using the alternative compliance data as a baseline for
comparison against the at least one test stream during an
evaluation of the at least one test stream.
20. The method of claim 18, wherein said evaluating step comprises
the step of performing face detection on the at least one test
stream.
21. The method of claim 18, wherein said evaluating step comprises
the step of performing biometric identification on the at least one
stream.
22. The method of claim 21, wherein the biometric identification is
based on at least one of race, gender, age, face, ear, iris, gate,
and anthropometric measurements.
23. The method of claim 18, further comprising the step of storing
a database of biometric data for use in identifying candidates
found in the at least one test stream.
24. The method of claim 18, wherein said evaluating step is
performed by a human following objective instructions.
25. The method of claim 18, wherein the at least one test stream
corresponds to one of a surveillance device and a surveillance
system, and said evaluating step further comprises the step of
performing a random check on a fraction of surveillance operations
and modes of operation corresponding to the one of the surveillance
device and the surveillance system.
26. The method of claim 18, wherein the at least one test stream
corresponds to one of a surveillance device and a surveillance
system, and the method further comprises the step of providing a
capability for at least one of an owner of the one of the
surveillance device and the surveillance system, a compliance
verifying entity, and a subject of the one of the surveillance
device and the surveillance system to perform a separate evaluation
of the one of the surveillance device and the surveillance
system.
27. The method of claim 26, wherein the separate evaluation
involves verifying that a software function under evaluation
matches a pre-approved software function.
28. A program storage device readable by machine, tangibly
embodying a program of instructions executable by the machine to
perform method steps for privacy protection verification as recited
in claim 18.
29. A method for privacy protection verification, comprising the
steps of: reviewing a surveillance product that is associated with
a pre-specified level of claimed privacy protection; and certifying
whether the surveillance product meets the pre-specified level of
claimed privacy protection.
30. The method of claim 29, wherein said reviewing and certifying
steps are performed by a single entity.
31. The method of claim 29, wherein the surveillance product
includes at least one of a design of the surveillance product,
hardware corresponding to the surveillance product, software
corresponding to the surveillance product, and any combination
thereof.
32. The method of claim 29, wherein said certifying step provides a
public certification of the surveillance product.
33. The method of claim 29, wherein said reviewing step is at least
one of automated and manually performed.
34. The method of claim 29, wherein said reviewing step comprises
the step of statistical spot checking the surveillance product by a
human.
35. A program storage device readable by machine, tangibly
embodying a program of instructions executable by the machine to
perform method steps for privacy protection verification as recited
in claim 29.
Description
FIELD OF THE INVENTION
[0001] The present invention generally relates to video
surveillance and, more particularly, to privacy protection in video
surveillance systems.
BACKGROUND OF THE INVENTION
[0002] As sensor technologies improve and data processing and
transmission capabilities improve and become more widespread, the
potential for intrusions on private citizens' privacy is also
increased. One area of particular sensitivity for privacy intrusion
is the rapid increase in video surveillance. It has been shown that
there are technological means available for preventing certain
kinds of privacy intrusion with video surveillance equipment, and
reducing the effectiveness or effects of other privacy intrusion.
Some ways to prevent and/or reduce the effects of certain types of
privacy intrusion are described in U.S. Patent Application Serial
No. 2003/0231769, entitled "Application Independent System, Method,
and Architecture for Privacy protection, Enhancement, Control, and
Accountability in Imaging Service Systems", filed on Jun. 18, 2002,
commonly assigned to the assignee herein, and incorporated by
reference herein in its entirety. These methods include the
re-rendering or summarization of surveillance video so that only
certain details are presented (those required for the task, such as
the number and location of people in the camera field of view)
while hiding other details (e.g., the appearance and, hence, race,
age, gender of those people). The deployment of such privacy
protection schemes may be encouraged by public opinion or even
legislated in certain jurisdictions and for certain purposes.
[0003] Accordingly, it would be desirable and highly advantageous
to have further methods and apparatus for providing privacy
protection in video surveillance systems that enable the public to
ascertain that such privacy protection is in place.
SUMMARY OF THE INVENTION
[0004] These and other drawbacks and disadvantages of the prior art
are addressed by the present invention, which is directed to
privacy protection in video surveillance systems.
[0005] According to an aspect of the present invention, there is
provided an apparatus for the certification of privacy compliance.
The apparatus includes a registry of at least one of enrolled video
surveillance operators, approved surveillance hardware devices,
approved surveillance software programs, approved surveillance
system installers, and approved entities that manage surveillance
systems. The apparatus further includes a registry searcher, in
signal communication with the registry, for receiving queries to
the registry, and for determining whether at least one of a
particular surveillance operator, a particular surveillance
hardware device, a particular surveillance software program, a
particular surveillance system installer, and a particular entity
that manages a particular surveillance system is on the registry
based on a given query.
[0006] According to another aspect of the present invention, there
is provided a privacy protection verification system. The system
includes a compliance device for receiving at least one test stream
from a privacy protection system, evaluating the at least one test
stream with respect to at least one category of privacy intrusive
data corresponding to a privacy protection goal, and outputting a
measure of compliance of the at least one test stream with respect
to the privacy protection goal.
[0007] According to yet another aspect of the present invention,
there is provided a method for the certification of privacy
compliance. The method includes the step of maintaining a registry
of at least one of enrolled video surveillance operators, approved
surveillance hardware devices, approved software programs, approved
surveillance system installers, and approved entities that manage
surveillance systems. The method further includes the step of
providing access to the registry via queries directed to the
registry to determine if at least one of a particular surveillance
operator, a particular surveillance hardware device, a particular
surveillance software program, a particular surveillance system
installer, and a particular entity that manages a particular
surveillance system is on the registry.
[0008] According to an additional aspect of the present invention,
there is provided a method for privacy protection verification. The
method includes the steps of receiving at least one test stream
from a privacy protection system, evaluating the at least one test
stream with respect to at least one category of privacy intrusive
data corresponding to a privacy protection goal, and outputting a
measure of compliance of the at least one test stream with respect
to the privacy protection goal.
[0009] According to a further aspect of the present invention,
there is provided a method for privacy protection verification. The
method includes the steps of reviewing a surveillance product that
is associated with a pre-specified level of claimed privacy
protection, and certifying whether the surveillance product meets
the pre-specified level of claimed privacy protection.
[0010] These and other aspects, features and advantages of the
present invention will become apparent from the following detailed
description of exemplary embodiments, which is to be read in
connection with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The present invention may be better understood in accordance
with the following exemplary figures, in which:
[0012] FIG. 1 is a block diagram illustrating an environment in
which the present invention may be applied, according to an
illustrative embodiment of the present invention;
[0013] FIG. 2 is a flow diagram illustrating a method for privacy
registration according to an illustrative embodiment of the present
invention; and
[0014] FIG. 3 is a flow diagram illustrating a method for
automatically testing compliance of a video system with a
pre-determined privacy preserving standard, according to an
illustrative embodiment of the present invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0015] The present invention is directed to privacy protection in
video surveillance systems.
[0016] The present description illustrates the principles of the
present invention. It will thus be appreciated that those skilled
in the art will be able to devise various arrangements that,
although not explicitly described or shown herein, embody the
principles of the invention and are included within its spirit and
scope.
[0017] All examples and conditional language recited herein are
intended for pedagogical purposes to aid the reader in
understanding the principles of the invention and the concepts
contributed by the inventor to furthering the art, and are to be
construed as being without limitation to such specifically recited
examples and conditions.
[0018] Moreover, all statements herein reciting principles,
aspects, and embodiments of the invention, as well as specific
examples thereof, are intended to encompass both structural and
functional equivalents thereof. Additionally, it is intended that
such equivalents include both currently known equivalents as well
as equivalents developed in the future, i.e., any elements
developed that perform the same function, regardless of
structure.
[0019] Thus, for example, it will be appreciated by those skilled
in the art that the block diagrams presented herein represent
conceptual views of illustrative circuitry embodying the principles
of the invention. Similarly, it will be appreciated that any flow
charts, flow diagrams, state transition diagrams, pseudocode, and
the like represent various processes which may be substantially
represented in computer readable media and so executed by a
computer or processor, whether or not such computer or processor is
explicitly shown.
[0020] The functions of the various elements shown in the figures
may be provided through the use of dedicated hardware as well as
hardware capable of executing software in association with
appropriate software. When provided by a processor, the functions
may be provided by a single dedicated processor, by a single shared
processor, or by a plurality of individual processors, some of
which may be shared. Moreover, explicit use of the term "processor"
or "controller" should not be construed to refer exclusively to
hardware capable of executing software, and may implicitly include,
without limitation, digital signal processor ("DSP") hardware,
read-only memory ("ROM") for storing software, random access memory
("RAM"), and non-volatile storage.
[0021] Other hardware, conventional and/or custom, may also be
included. Similarly, any switches shown in the figures are
conceptual only. Their function may be carried out through the
operation of program logic, through dedicated logic, through the
interaction of program control and dedicated logic, or even
manually, the particular technique being selectable by the
implementer as more specifically understood from the context.
[0022] In the claims hereof, any element expressed as a means for
performing a specified function is intended to encompass any way of
performing that function including, for example, a) a combination
of circuit elements that performs that function or b) software in
any form, including, therefore, firmware, microcode or the like,
combined with appropriate circuitry for executing that software to
perform the function. The invention as defined by such claims
resides in the fact that the functionalities provided by the
various recited means are combined and brought together in the
manner which the claims call for. Applicant thus regards any means
that can provide those functionalities as equivalent to those shown
herein.
[0023] FIG. 1 is a block diagram illustrating an environment 100 in
which the present invention may be applied, according to an
illustrative embodiment of the present invention. The environment
100 includes a video surveillance system 110, a privacy protecting
system 120, a pattern recognition system 130, and a compliance
device 140. In the illustrative embodiment of FIG. 1, the video
surveillance system 110 is intended to be a conventional video
surveillance system and the privacy protecting system 120 is
intended to implement privacy protecting measures with respect to
any video input thereto from the video surveillance system. It is
to be appreciated that in other embodiments of the present
invention, the privacy protecting system 120 may be included as
part of the video surveillance system 110 (e.g., in the case that
the video surveillance system 110 is claimed to have privacy
protecting features that are to be verified for compliance).
Moreover, it is to be further appreciated that the present
invention is not limited to privacy preservation with respect to
only video and, thus, other types of information and/or media
including, e.g., audio, may also be utilized by the present
invention, while maintaining the spirit of the present invention.
The pattern recognition system 130 recognizes patterns in an input
stream (video and/or audio, etc.), and an output of the pattern
recognition system 130 may be used by the compliance device 140 to
determine compliance with a pre-specified privacy preserving
policy, law, and/or so forth, and may further optionally specify a
degree of compliance. While the pattern recognition system 130 and
the compliance device 140 are shown as separate elements in FIG. 1,
in other embodiments of the present invention, these two elements
may be implemented as one single element.
[0024] Information relating to compliance of the privacy protecting
system 120 may be stored in one or more registries 188 (hereinafter
"registry"). The registry 188 is searched using a registry searcher
177. The registry searcher 177 conducts searches of the registry
188 based on, e.g., user submitted queries as described in further
detail herein below. One or more networks 199 (hereinafter
"network") provide access to the registry 188 via the registry
searcher 177. That is, user submitted queries are provided to the
registry searcher 177 via the network 199. It is to be appreciated
that the registry 188 and the registry searcher 177 may be part of
the compliance device 140, may be part of another device, or may be
a standalone device.
[0025] The registry searcher 177 may be used to search the registry
188 by an individual that desires to know whether or not the
privacy protecting system 120 (or any other system or device to be
tested) complies with any policy preserving standards, etc. The
registry 188 may store, e.g., information relating whether a
particular device/system is in compliance and, optionally, to what
degree of compliance. Thus, for example, a user with a wired or
wireless device 167 may be capable of accessing a registry 188 via
the network 199 to determine compliance. The user may check from
home via the Internet or any other way as readily contemplated by
one of ordinary skill in the art while maintaining the spirit of
the present invention. The registry searcher 177 receives user
queries and determines, e.g., whether a given device, device
operator, and/or so forth is listed on the registry 188 based on a
given query. As an example, the registries 188 may be implemented
in memories on a computer, with the registry searcher 177 being a
software program on the same or a different computer for parsing a
query and using information extracted there from to match with
information in the registry 188. Of course, given the teachings of
the present invention provided herein, other configurations and
implementations may also be employed while maintaining the spirit
of the present invention.
[0026] It is to be appreciated that, in the illustrative embodiment
of FIG. 1, the video surveillance system 110 and the privacy
protecting system 120 are operated by a first entity such as the
owner of the site at which the video surveillance system 110 is
installed. Further, the pattern recognition system 130, and the
compliance device 140 are operated by a second entity that is
tasked with compliance verification. Moreover, the registry and the
registry searcher may also be operated by the second entity.
Optionally, another entity may be tasked with maintaining the
certification/verification results obtained by the second
entity.
[0027] It is to be further appreciated that the means of
communication between the privacy protecting system 120 and the
rest of the world may be isolated to prevent tampering with the
privacy protecting system 120 and so forth. Moreover, other
elements of environment 100 may be similarly or otherwise protected
from tampering, hacking, unauthorized access, and so forth.
[0028] It is to be yet further appreciated that any of the elements
above including, but not limited to, the privacy protecting system
120, the pattern recognition system 130, and the compliance device
140 may be implemented as general purpose or special purpose
computers have one or more processors, one or more memories, one or
more user interfaces, and so forth. Given the teachings of the
present invention provided herein, one of ordinary skill in the
related art will contemplate these and various other elements for
implementing the present invention while maintaining the spirit of
the present invention.
[0029] At the heart of any privacy preserving scheme must be a
policy that guides what is and/or is not permissible within the
scheme. Such guidelines may be issued by a government agency, in
the form of laws (e.g., UK Data Protection Act) or guidelines
(e.g., Swiss Federal Privacy Commissioner), or may be unilaterally
issued by a non-governmental body or service operator (c.f.,
Australian Biometrics Institute Privacy Code). It is expected that
many entities will have codes with similar principles. It is to be
appreciated that the present invention may be employed with any
type of privacy preserving standards including, but not limited to,
laws, policies adopted by entities including governments and
subdivisions thereof, corporations, businesses, organizations, and
so forth. It is to be appreciated that the preceding types of
privacy preserving standards are merely illustrative and, thus,
other types of privacy preserving standards may also be employed in
accordance with the present invention while maintaining the spirit
of the present invention.
[0030] There are a number of levels on which video surveillance
systems can be certified as complying with privacy guidelines.
Hardware and software manufacturers may wish to have prototype
designs registered with the certification body. For instance, a
PrivacyCam has been proposed, which is a self-contained unit that
implements certain video privacy protection algorithms. The
PrivacyCam is further described by Senior et al., in "Blinkering
Surveillance: Enabling Video Privacy through Computer Vision", IBM
Research Report, RC22886 (WO308-109), Computer Science, Aug. 28,
2003, the disclosure of which is incorporated by reference herein
in its entirety. The certification body may inspect the hardware
design and/or software source code or conduct testing of the
privacy protection device (in the manner of, e.g., Underwriters
Laboratories) to ascertain the degree of privacy protection that
the device or software affords and to detect its robustness against
standard circumvention techniques.
[0031] After such assessment the device could be registered and
listed in a registry. Moreover, the listing of a particular
assessed device in the registry may also optionally specify a
degree of compliance with the organization's privacy policy. For
example, meeting a threshold level of privacy protection may
entitle a particular device to simply a listing and, if the
threshold level is exceeded, then the degree of compliance (above
the threshold) may be specified. Further, conditions on a specified
level of compliance may be used when the threshold is not met. Of
course, given the teachings of the present invention provided
herein, other arrangements may also be employed with respect to
specifying a degree of compliance, while maintaining the spirit of
the present invention.
[0032] Enrollment (also referred to herein as "registration") in a
privacy certification scheme may be voluntary or compulsory.
[0033] FIG. 2 is a flow diagram illustrating a method for privacy
registration according to an illustrative embodiment of the present
invention. It is to be appreciated that the method of FIG. 2 is
merely illustrative and, thus, given the teachings of the present
invention provided herein, other approaches may also be employed
with respect to privacy registration that maintain the spirit of
the present invention.
[0034] The design specification and/or a sample of a particular
surveillance device are provided to a certification body (step
210). It is to be appreciated that while the method of FIG. 2 is
described with respect to a "particular surveillance device", a
complete system or any element or combination of elements thereof
may also be registered (evaluated for compliance, and so forth) in
accordance with the principles of the present invention while
maintaining the scope of the present invention. The certification
body examines the design specification and/or sample of the
particular surveillance device for privacy protection compliance
(step 220). The certification body grants certification, if
warranted, to the particular surveillance device, with possible
conditions on the certification depending upon the mode of
operation (step 230). For example, a device may only comply with,
e.g., a particular privacy preserving standard, when the device is
operated in a certain way or in a certain mode of operation and, if
operated in a different way or in a different mode of operation may
not comply with the standard or may achieve a lesser level of
certification. A customer commissions the use of the particular
surveillance device, e.g., either specifically or as included in a
system, and the particular surveillance device is then installed
for use (step 240). The customer registers the installation with
the certification body and publicly publishes a registration number
assigned by the certification body to the particular surveillance
device as installed (step 250). A citizen observes the surveillance
installation and looks-up the registration number with the
certification body (step 260). The certification body verifies
compliance with any corresponding standards, laws, and/or claimed
codes of privacy preserving practice (step 270). The citizen, the
installing entity, or some other entity may submit complaints to
the certification body (280), e.g., via the network 199. The
complaints may then be listed on one of the registries 188 for
future use by the certification body, the entity commissioning the
particular surveillance device, other citizens, and/or so forth.
The word "complaints" is intended to include, but not be limited
to, the following: voluntarily registering non-complying devices,
reporting installed non-complying devices (e.g., that were
previously certified as in compliance), and so forth.
[0035] Regarding entities that operate video surveillance systems,
such entities may wish to claim and advertise compliance with a
particular organization's privacy policy or some other privacy
preserving policy. For example, an approach similar to TRUSTe may
be utilized, wherein entities subscribe to the organization's code
of practice and privacy policy, and the organization polices
compliance in a variety of manners.
[0036] Such policing could be implemented by first identifying that
the hardware and/or software in use is indeed capable of preserving
privacy. Inspections could also be carried out to verify that a
particular device/system/subsystem/etc. (hereinafter device) was
installed in a compliant manner and that the device is being run in
a compliant manner (that privacy features were turned on, the staff
trained appropriately, the staff actually complying with codes of
practice, and so forth).
[0037] Inspections could be voluntary, to enable an entity to claim
a fully certified level of compliance, or could be at the
instigation of the organization, particularly when compliance has
been challenged by a third party. Moreover, inspections could be
implemented at pre-specified and/or random times.
[0038] To achieve credibility with the public and those observed by
the surveillance system, mechanisms need to be available for people
to verify and challenge the compliance of entities with the
code.
[0039] A public registry could be made open that lists those
entities that have enrolled in the scheme. A more detailed registry
could list specific installations (branches or sites of the entity)
that were claimed/deemed to be compliant. An even more detailed
registry could list the actual specific devices.
[0040] A member of the public could verify compliance by searching
the registry (e.g., on a web site) using a number of mechanisms.
For example, searching may be conducted based on an entity's name,
location (GPS coordinates, address, and so forth), unique IDs
(unique IDs would be issued on registration), and so forth. It is
to be appreciated that the preceding mechanisms for searching the
registry are merely illustrative and, given the teachings of the
present invention provided herein, other mechanisms for searching
the registry may also be employed while maintaining the spirit of
the present invention.
[0041] In the case of unique IDs, the unique IDs could be printed
on notices, such as those required by law in many countries for
CCTV installations. The ID could identify the installation and/or
the specific device. Moreover, the ID could identify the entity
that had the specific device installed and/or the entity tasked
with verifying compliance. Individuals searching the registry would
be able to see the level of compliance and whether that compliance
had been verified. Moreover, other parameters may also be able to
be ascertained from the registry including, but not limited to, how
recently the compliance was verified, whether the organization had
any outstanding complaints, and so forth. It is to be appreciated
that the preceding other parameters are merely illustrative and,
thus, other parameters may also be employed while maintaining the
spirit of the present invention.
[0042] The unique IDs would also form a mechanism for individuals
to request personal data. For instance, it is required by UK Data
protection law that an individual may request any video of the
individual captured by a CCTV system, by specifying the time and
location.
[0043] In many cases, verification of a surveillance system
necessarily will have to be carried out by expert human operators.
However, it is to be appreciated that the present invention is not
limited to human verification of compliance with privacy preserving
policies and, thus, automatic verification or a combination of
human and automatic verification may also be employed in accordance
with the present invention while maintaining the spirit of the
present invention.
[0044] Hardware inspection might use formal computing methods to
prove that a program or piece of hardware is incapable of
preserving privacy-intrusive information (e.g., due to design
limitations, due to mis-configuration, and so forth). Of course, in
some circumstances, it may be preferable to have a human verifying
a manufacturer's claim of effectiveness, a task that may require
expert knowledge.
[0045] One of many areas that may be automated is in determining if
a video-re-rendering system is sufficiently strong. The present
invention provides a method and system for determining if privacy
protection is effective based on a pattern recognition system and
test video sequences (see FIG. 3 herein below). The pattern
recognition system is one that can detect the type of information
that is considered "privacy intrusive" for the application. For
example, the pattern recognition system may include and/or identify
any of the following: a person detector, a face/gender/race/gait
recognition system, a moving object detector, a vehicle licence
plate reader, and so forth. It is to be appreciated that the
present invention is not limited to detecting the preceding types
of patterns and, thus, other types of patterns relating to privacy
(including privacy intrusion) may also be employed while
maintaining the spirit of the present invention. A set of
surveillance video files including sensitive information (e.g.,
information that is to be protected (e.g., identity, etc.) is
collected and provided to the pattern recognition system. In this
case, the set of surveillance video files were obtained from a
video surveillance system that has been claimed to meet a
pre-specified privacy preserving policy. Accordingly, the set of
surveillance video files has been already subject to privacy
preserving measures prior to being fed to the pattern recognition
system. The pattern recognition system attempts to identify
patterns of interest relating to the sensitive information in the
set of surveillance video files. This same video is then fed into a
compliance device that determines compliance and optionally
associates a degree of compliance with a particular device under
test) and the number of successful detections/identifications by
the pattern recognition system is a measure of the failure of the
system to protect privacy. For example, the more people that are
identified means that their privacy was not preserved if the
equipment was intended to only specify a number of people in a
given area irrespective of their identity. Naturally, failure of
the pattern recognition system is not proof of the system's
success, which preferably but not necessarily should be judged by a
human. For example, a system that produces no output may well pass
the test, but would be useless. Simple tricks might defeat a known
pattern recognition system (e.g. turning down the brightness,
introducing jitter, blurring slightly) while still preserving
privacy-intrusive information. Thus, human or machine overseeing of
the process is preferred.
[0046] FIG. 3 is a flow diagram illustrating a method for
automatically testing compliance of a video system with a
pre-determined privacy preserving standard, according to an
illustrative embodiment of the present invention. In the case of
FIG. 3, a privacy protecting system is used to modify or otherwise
implement privacy preserving measures on a raw video from a
conventional surveillance video system (i.e., a surveillance video
system that does not have privacy preserving capabilities).
[0047] Raw video from, e.g., a surveillance video system, is fed
into a pattern recognition system (e.g., a person detector) (step
310). People are detected by the person detector and are enrolled
into a database (step 320). The raw video is then fed into a
privacy protecting system to implement privacy protecting measures
(step 330). That is, the privacy protecting system has been claimed
to meet a pre-specified privacy preserving policy with any input
video provided thereto. "Privacy protected" people (as protected by
the privacy protecting system) are detected or attempted to be
detected by the person detector (step 340). The recognition of the
"privacy protected" people, which were enrolled into the database
at step 320, is tested based on at least a result of step 340 (step
350). The testing performed at step 350 may be implemented, e.g.,
with the addition of imposters.
[0048] These and other features and advantages of the present
invention may be readily ascertained by one of ordinary skill in
the pertinent art based on the teachings herein. It is to be
understood that the teachings of the present invention may be
implemented in various forms of hardware, software, firmware,
special purpose processors, or combinations thereof.
[0049] Most preferably, the teachings of the present invention are
implemented as a combination of hardware and software. Moreover,
the software is preferably implemented as an application program
tangibly embodied on a program storage unit. The application
program may be uploaded to, and executed by, a machine comprising
any suitable architecture. Preferably, the machine is implemented
on a computer platform having hardware such as one or more central
processing units ("CPU"), a random access memory ("RAM"), and
input/output ("I/O") interfaces. The computer platform may also
include an operating system and microinstruction code. The various
processes and functions described herein may be either part of the
microinstruction code or part of the application program, or any
combination thereof, which may be executed by a CPU. In addition,
various other peripheral units may be connected to the computer
platform such as an additional data storage unit and a printing
unit.
[0050] It is to be further understood that, because some of the
constituent system components and methods depicted in the
accompanying drawings are preferably implemented in software, the
actual connections between the system components or the process
function blocks may differ depending upon the manner in which the
present invention is programmed. Given the teachings herein, one of
ordinary skill in the pertinent art will be able to contemplate
these and similar implementations or configurations of the present
invention.
[0051] Although the illustrative embodiments have been described
herein with reference to the accompanying drawings, it is to be
understood that the present invention is not limited to those
precise embodiments, and that various changes and modifications may
be effected therein by one of ordinary skill in the pertinent art
without departing from the scope or spirit of the present
invention. All such changes and modifications are intended to be
included within the scope of the present invention as set forth in
the appended claims.
* * * * *