{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:09:51Z","timestamp":1774631391402,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Video surveillance and analytics solutions based on Artificial Intelligence (AI) are increasingly being deployed across industries, including academia. There are a number of use-cases for campus-wide video analytics applications. Detecting events of interest in real-time and generating alerts is a core requirement for such applications, making them both network and compute intensive. Thus, the underlying framework needs to be resource optimized in terms of latency, compute and storage requirements for a multitude of video applications. Increasingly privacy concerns have been voiced against the pervasive deployment of video analytics-based applications. Thus, protecting the privacy of students and staff in a campus setting shall be a major design consideration for such systems going forward. This paper presents a resource optimized and privacy preserving framework for campus-wide video analytics applications. Several use-cases are presented and early results from the deployment of the proposed framework establish its feasibility and effectiveness.<\/jats:p>","DOI":"10.1007\/s40747-022-00783-w","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T03:31:49Z","timestamp":1656041509000},"page":"161-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications"],"prefix":"10.1007","volume":"9","author":[{"given":"Ankur","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Purnendu","family":"Prabhat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"issue":"5","key":"783_CR1","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00138-008-0152-0","volume":"19","author":"N Haering","year":"2008","unstructured":"Haering N, Venetianer PL, Lipton A (2008) The evolution of video surveillance: an overview. Mach Vis Appl 19(5):279\u2013290","journal-title":"Mach Vis Appl"},{"key":"783_CR2","doi-asserted-by":"crossref","unstructured":"Dey S, Chakraborty A, Naskar S, Misra P (2012) Smart city surveillance: Leveraging benefits of cloud data stores. In: 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp 868\u2013876. IEEE","DOI":"10.1109\/LCNW.2012.6424076"},{"key":"783_CR3","doi-asserted-by":"crossref","unstructured":"Ajiboye SO, Birch P, Chatwin C, Young R. Hierarchical video surveillance architecture: A chassis for video big data analytics and exploration. In: Video Surveillance and Transportation Imaging Applications 2015, vol. 9407, p. 94070 (2015). International Society for Optics and Photonics","DOI":"10.1117\/12.2083937"},{"key":"783_CR4","unstructured":"jetson_tx1_whitepaper.pdf. https:\/\/www.nvidia.com\/content\/tegra\/embedded-systems\/pdf\/jetson_tx1_whitepaper.pdf. (Accessed on 01\/21\/2022)"},{"key":"783_CR5","unstructured":"Video will account for 82% of all internet traffic by 2022, Cisco says. [Online; accessed 21. Jan. 2022] (2018). https:\/\/www.fiercevideo.com\/video\/video-will-account-for-82-all-internet-traffic-by-2022-cisco-says"},{"key":"783_CR6","unstructured":"Service Provider. Cisco. [Online; accessed 21. Jan. 2022] (2021). https:\/\/www.cisco.com\/c\/en\/us\/solutions\/service-provider\/index.html"},{"key":"783_CR7","unstructured":"Surveillance Camera Statistics: Which City has the Most CCTV Cameras? [Online; accessed 21. Jan. 2022] (2021). https:\/\/www.comparitech.com\/vpn-privacy\/the-worlds-most-surveilled-cities"},{"key":"783_CR8","unstructured":"UITP. [Online; accessed 21. Jan. 2022] (2022). https:\/\/www.uitp.org\/publications\/international-trends-in-video-surveillance"},{"key":"783_CR9","unstructured":"Ivanova I (2019) Video surveillance in U.S. described as on par with China. [Online; accessed 21. Jan. 2022]. https:\/\/www.cbsnews.com\/news\/the-u-s-uses-surveillance-cameras-just-as-much-as-china"},{"key":"783_CR10","unstructured":"The Video Surveillance Report (2020). https:\/\/www.ifsecglobal.com\/resources\/the-video-surveillance-report-2020\/. (Accessed on 01\/21\/2022)"},{"key":"783_CR11","unstructured":"O\u2019Carroll E (2019) Face off? Americans fear privacy loss to recognition software. Christian Science Monitor"},{"key":"783_CR12","unstructured":"Facial Recognition Map - Surfshark. [Online; accessed 21. Jan. 2022] (2022). https:\/\/surfshark.com\/facial-recognition-map"},{"key":"783_CR13","unstructured":"Civil society initiative for a ban on biometric mass surveillance practices. [Online; accessed 21. Jan. 2022] (2022). https:\/\/europa.eu\/citizens-initiative\/initiatives\/details\/2021\/000001_en"},{"key":"783_CR14","unstructured":"BBC NEWS $$\\vert $$ England $$\\vert $$ Merseyside $$\\vert $$ Peeping tom CCTV workers jailed. [Online; accessed 21. Jan. 2022] (2006). http:\/\/news.bbc.co.uk\/1\/hi\/england\/merseyside\/4609746.stm"},{"key":"783_CR15","unstructured":"Leaked camera footage from S\u2019pore homes sold online: Change passwords to deter hacking. [Online; accessed 21. Jan. 2022] (2020). https:\/\/mothership.sg\/2020\/10\/hacked-camera-footage-singapore-leaked"},{"key":"783_CR16","unstructured":"iVideon Russian-based video surveillance solution leaked data, hundreds of thousands of records exposed. [Online; accessed 21. Jan. 2022] (2018). https:\/\/securityaffairs.co\/wordpress\/72424\/data-breach\/ivideon-data-leak.html"},{"key":"783_CR17","unstructured":"Exposed Video Streams: How Hackers Abuse Surveillance Cameras - Security News - Trend Micro SG. [Online; accessed 21. Jan. 2022] (2022). https:\/\/www.trendmicro.com\/vinfo\/sg\/security\/news\/internet-of-things\/exposed-video-streams-how-hackers-abuse-surveillance-cameras"},{"key":"783_CR18","unstructured":"Henriquez, M.: Verkada breach exposed live feeds of 150,000 surveillance cameras inside schools, hospitals and more. Security Magazine (2021)"},{"key":"783_CR19","unstructured":"Ali M, Anjum A, Rana O, Zamani AR, Balouek-Thomert D, Parashar M (2020) Res: Real-time video stream analytics using edge enhanced clouds. IEEE Transactions on Cloud Computing"},{"key":"783_CR20","doi-asserted-by":"crossref","unstructured":"Wang S, Zhang C, Shu Y, Liu Y (2019) Live video analytics with fpga-based smart cameras. In: Proceedings of the 2019 Workshop on Hot Topics in Video Analytics and Intelligent Edges, pp. 9\u201314","DOI":"10.1145\/3349614.3356027"},{"issue":"9","key":"783_CR21","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.3390\/s19092048","volume":"19","author":"J Barth\u00e9lemy","year":"2019","unstructured":"Barth\u00e9lemy J, Verstaevel N, Forehead H, Perez P (2019) Edge-computing video analytics for real-time traffic monitoring in a smart city. Sensors 19(9):2048","journal-title":"Sensors"},{"key":"783_CR22","doi-asserted-by":"crossref","unstructured":"Jiang J, Ananthanarayanan G, Bodik P, Sen S, Stoica I (2018) Chameleon: scalable adaptation of video analytics. In: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pp. 253\u2013266","DOI":"10.1145\/3230543.3230574"},{"key":"783_CR23","unstructured":"Canel C, Kim T, Zhou G, Li C, Lim H, Andersen DG, Kaminsky M, Dulloor SR (2019) Scaling video analytics on constrained edge nodes. arXiv preprint arXiv:1905.13536"},{"key":"783_CR24","doi-asserted-by":"crossref","unstructured":"Xu R, Nikouei SY, Chen Y, Polunchenko A, Song S, Deng C, Faughnan TR (2018) Real-time human objects tracking for smart surveillance at the edge. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE","DOI":"10.1109\/ICC.2018.8422970"},{"issue":"9","key":"783_CR25","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez JR, Chaaraoui AA, Fl\u00f3rez-Revuelta F (2015) Visual privacy protection methods: A survey. Expert Syst Appl 42(9):4177\u20134195","journal-title":"Expert Syst Appl"},{"key":"783_CR26","doi-asserted-by":"crossref","unstructured":"Bentafat E, Rathore MM, Bakiras S (2020) A practical system for privacy-preserving video surveillance. In: International Conference on Applied Cryptography and Network Security, pp. 21\u201339 . Springer","DOI":"10.1007\/978-3-030-57878-7_2"},{"key":"783_CR27","doi-asserted-by":"crossref","unstructured":"Das A, Degeling M, Wang X, Wang J, Sadeh N, Satyanarayanan M (2017) Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1387\u20131396. IEEE","DOI":"10.1109\/CVPRW.2017.181"},{"issue":"4","key":"783_CR28","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/JIOT.2019.2954804","volume":"7","author":"C Neff","year":"2019","unstructured":"Neff C, Mendieta M, Mohan S, Baharani M, Rogers S, Tabkhi H (2019) Revamp 2 t: Real-time edge video analytics for multicamera privacy-aware pedestrian tracking. IEEE Internet Things J 7(4):2591\u20132602","journal-title":"IEEE Internet Things J"},{"issue":"3s","key":"783_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3209659","volume":"14","author":"J Wang","year":"2018","unstructured":"Wang J, Amos B, Das A, Pillai P, Sadeh N, Satyanarayanan M (2018) Enabling live video analytics with a scalable and privacy-aware framework. ACM Trans Multimed Comput Commun Appl (TOMM) 14(3s):1\u201324","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"783_CR30","doi-asserted-by":"crossref","unstructured":"Du W, Li A, Zhou P, Niu B, Wu D (2021) Privacyeye: A privacy-preserving and computationally efficient deep learning-based mobile video analytics system. IEEE Trans Mob Comput","DOI":"10.1109\/TMC.2021.3050458"},{"key":"783_CR31","doi-asserted-by":"crossref","unstructured":"Xu M, Zhu M, Liu Y, Lin FX, Liu X (2018) Deepcache: Principled cache for mobile deep vision. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 129\u2013144","DOI":"10.1145\/3241539.3241563"},{"key":"783_CR32","unstructured":"Bannister A (2019) The video surveillance report 2019. https:\/\/www.ifsecglobal.com\/video-surveillance\/the-video-surveillance-report-2019\/. (Accessed on 01\/25\/2022)"},{"key":"783_CR33","unstructured":"Video-surveillance | European Data Protection Supervisor. https:\/\/edps.europa.eu\/data-protection\/data-protection\/reference-library\/video-surveillance_en. (Accessed on 01\/25\/2022)"},{"key":"783_CR34","unstructured":"Buy the Latest Jetson Products | NVIDIA Developer. https:\/\/developer.nvidia.com\/buy-jetson. (Accessed on 01\/25\/2022)"},{"key":"783_CR35","unstructured":"NVIDIA Jetson Nano Developer Kit | NVIDIA Developer. https:\/\/developer.nvidia.com\/embedded\/jetson-nano-developer-kit. (Accessed on 01\/25\/2022)"},{"key":"783_CR36","unstructured":"NVIDIA TensorRT | NVIDIA Developer. https:\/\/developer.nvidia.com\/tensorrt. (Accessed on 01\/25\/2022)"},{"key":"783_CR37","unstructured":"ONNX | Home. https:\/\/onnx.ai\/. (Accessed on 01\/25\/2022)"},{"issue":"4","key":"783_CR38","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"783_CR39","unstructured":"Zhu J-J, Xiong Y-K, Lu X, Liu H-F (2015) Image processing device and method for determining a similarity between two images. Google Patents. US Patent 9,076,066"},{"issue":"1","key":"783_CR40","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0304-3991(87)90010-6","volume":"21","author":"M Van Heel","year":"1987","unstructured":"Van Heel M (1987) Similarity measures between images. Ultramicroscopy 21(1):95\u2013100","journal-title":"Ultramicroscopy"},{"key":"783_CR41","doi-asserted-by":"crossref","unstructured":"Silva EA, Panetta K, Agaian SS (2007) Quantifying image similarity using measure of enhancement by entropy. In: Mobile Multimedia\/Image Processing for Military and Security Applications 2007, vol. 6579, p. 65790. International Society for Optics and Photonics","DOI":"10.1117\/12.720087"},{"key":"783_CR42","doi-asserted-by":"crossref","unstructured":"Zhang S, Zhu X, Lei Z, Shi H, Wang X, Li SZ (2017) Faceboxes: A cpu real-time face detector with high accuracy. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp 1\u20139. IEEE","DOI":"10.1109\/BTAS.2017.8272675"},{"key":"783_CR43","doi-asserted-by":"crossref","unstructured":"Chen D, Ren S, Wei Y, Cao X, Sun J (2014) Joint cascade face detection and alignment. In: European Conference on Computer Vision, pp 109\u2013122 . Springer","DOI":"10.1007\/978-3-319-10599-4_8"},{"key":"783_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cviu.2015.03.015","volume":"138","author":"S Zafeiriou","year":"2015","unstructured":"Zafeiriou S, Zhang C, Zhang Z (2015) A survey on face detection in the wild: past, present and future. Comput Vis Image Underst 138:1\u201324","journal-title":"Comput Vis Image Underst"},{"issue":"2","key":"783_CR45","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s10462-018-9650-2","volume":"52","author":"A Kumar","year":"2019","unstructured":"Kumar A, Kaur A, Kumar M (2019) Face detection techniques: a review. Artif Intell Rev 52(2):927\u2013948","journal-title":"Artif Intell Rev"},{"key":"783_CR46","doi-asserted-by":"crossref","unstructured":"Zhou Y, Liu D, Huang T (2018) Survey of face detection on low-quality images. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp 769\u2013773. IEEE","DOI":"10.1109\/FG.2018.00121"},{"key":"783_CR47","unstructured":"GitHub - tesseract-ocr\/tesseract: Tesseract Open Source OCR Engine (main repository). https:\/\/github.com\/tesseract-ocr\/tesseract. (Accessed on 01\/26\/2022)"},{"key":"783_CR48","unstructured":"YOLO: Real-Time Object Detection. https:\/\/pjreddie.com\/darknet\/yolo\/. (Accessed on 01\/26\/2022)"},{"key":"783_CR49","doi-asserted-by":"crossref","unstructured":"Azhar MIH, Zaman FHK, Tahir NM, Hashim H (2020) People tracking system using deepsort. In: 2020 10th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp 137\u2013141. IEEE","DOI":"10.1109\/ICCSCE50387.2020.9204956"},{"issue":"10","key":"783_CR50","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503","journal-title":"IEEE Signal Process Lett"},{"key":"783_CR51","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 815\u2013823","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"783_CR52","unstructured":"Buy a Raspberry Pi 3 Model B+ - Raspberry Pi. https:\/\/www.raspberrypi.com\/products\/raspberry-pi-3-model-b-plus\/. (Accessed on 01\/26\/2022)"},{"key":"783_CR53","unstructured":"Motion. https:\/\/motion-project.github.io\/motion_config.html. (Accessed on 01\/26\/2022)"},{"key":"783_CR54","unstructured":"XAMPP Installers and Downloads for Apache Friends. https:\/\/www.apachefriends.org\/index.html. (Accessed on 01\/26\/2022)"},{"key":"783_CR55","unstructured":"Raspberry Pi Documentation - Raspberry Pi OS. https:\/\/www.raspberrypi.com\/documentation\/computers\/os.html. (Accessed on 01\/26\/2022)"},{"key":"783_CR56","unstructured":"Jetson Linux | NVIDIA Developer. https:\/\/developer.nvidia.com\/embedded\/linux-tegra. (Accessed on 01\/26\/2022)"},{"key":"783_CR57","unstructured":"The CentOS Project. https:\/\/www.centos.org\/. (Accessed on 01\/26\/2022)"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00783-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00783-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00783-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:47:13Z","timestamp":1677091633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00783-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["783"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00783-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,24]]},"assertion":[{"value":"3 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}