{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:00:15Z","timestamp":1763748015559,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:00:00Z","timestamp":1559260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"<jats:p>Preserving the privacy of people in video surveillance systems is quite challenging, and a significant amount of research has been done to solve this problem in recent times. Majority of existing techniques are based on detecting bodily cues such as face and\/or silhouette and obscuring them so that people in the videos cannot be identified. We observe that merely hiding bodily cues is not enough for protecting identities of the individuals in the videos. An adversary, who has prior contextual knowledge about the surveilled area, can identify people in the video by exploiting the implicit inference channels such as behavior, place, and time. This article presents an anonymous surveillance system, called Watch Me from Distance (WMD), which advocates for outsourcing of surveillance video monitoring (similar to call centers) to the long-distance sites where professional security operators watch the video and alert the local site when any suspicious or abnormal event takes place. We find that long-distance monitoring helps in decoupling the contextual knowledge of security operators. Since security operators at the remote site could turn into adversaries, a trust computation model to determine the credibility of the operators is presented as an integral part of the proposed system. The feasibility study and experiments suggest that the proposed system provides more robust measures of privacy yet maintains surveillance effectiveness.<\/jats:p>","DOI":"10.1145\/3312574","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T12:28:42Z","timestamp":1559824122000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Watch Me from Distance (WMD)"],"prefix":"10.1145","volume":"15","author":[{"given":"Pradeep K.","family":"Atrey","sequence":"first","affiliation":[{"name":"College of Engineering and Applied Sciences, University at Albany, State University of New York, Albany, NY, USA"}]},{"given":"Bakul","family":"Trehan","sequence":"additional","affiliation":[{"name":"Department of Applied Computer Science, University of Winnipeg, Winnipeg, MB, Canada"}]},{"given":"Mukesh K.","family":"Saini","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology, Ropar, India"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3074-7"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0649-1"},{"volume-title":"Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 511--521","author":"Barhm M.","key":"e_1_2_1_3_1","unstructured":"M. Barhm , N. Qwasmi , F. Qureshi , and K. El Khatib . 2011. Negotiating privacy preferences in video surveillance systems . In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 511--521 . M. Barhm, N. Qwasmi, F. Qureshi, and K. El Khatib. 2011. Negotiating privacy preferences in video surveillance systems. In Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 511--521."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457450.2457452"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"volume-title":"Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics. 1--5.","author":"Chaudhari J.","key":"e_1_2_1_6_1","unstructured":"J. Chaudhari , S. Cheung , and M. V. Venkatesh . 2007. Privacy protection for life-log video . In Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics. 1--5. J. Chaudhari, S. Cheung, and M. V. Venkatesh. 2007. Privacy protection for life-log video. In Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics. 1--5."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/75427"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S.-C. S. Cheung M. V. Venkatesh J. K. Paruchuri J. Zhao and T. Nguyen. 2009. Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance A. Senior (Ed.). Springer London 11--33.  S.-C. S. Cheung M. V. Venkatesh J. K. Paruchuri J. Zhao and T. Nguyen. 2009. Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance A. Senior (Ed.). Springer London 11--33.","DOI":"10.1007\/978-1-84882-301-3_2"},{"issue":"58","key":"e_1_2_1_9_1","first-page":"2","article-title":"2016. Service models for cloud computing: Video surveillance as a service (VSaaS)","volume":"9","author":"Dasic P.","year":"2016","unstructured":"P. Dasic , J. Dasic , and B. Crvenkovic . 2016. Service models for cloud computing: Video surveillance as a service (VSaaS) . Bull. Transilv. Univ. Brasov I 9 ( 58 ), 2 ( 2016 ), 83--90. P. Dasic, J. Dasic, and B. Crvenkovic. 2016. Service models for cloud computing: Video surveillance as a service (VSaaS). Bull. Transilv. Univ. Brasov I 9 (58), 2 (2016), 83--90.","journal-title":"Bull. Transilv. Univ. Brasov I"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-007-0077-z"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.883948"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1026799.1026809"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1406476"},{"key":"e_1_2_1_14_1","volume-title":"Learning multisensor confidence using a reward-and-punishment mechanism","author":"Hossain M. A.","year":"2009","unstructured":"M. A. Hossain , P. K. Atrey , and A. El Saddik . 2009. Learning multisensor confidence using a reward-and-punishment mechanism . IEEE Trans. Instrum. Meas . 58, 5 ( 2009 ), 1525--1534. M. A. Hossain, P. K. Atrey, and A. El Saddik. 2009. Learning multisensor confidence using a reward-and-punishment mechanism. IEEE Trans. Instrum. Meas. 58, 5 (2009), 1525--1534."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/240080.240295"},{"volume-title":"Proceedings of the 2nd International Conference on Frontiers of Sensors Technologies. 435--439","author":"Khan I. R.","key":"e_1_2_1_16_1","unstructured":"I. R. Khan , A. Hassan , S. Ahsan , S. Alshomrani , and G. Iqbal . 2017. Remote surveillance with reduced transmission overhead . In Proceedings of the 2nd International Conference on Frontiers of Sensors Technologies. 435--439 . I. R. Khan, A. Hassan, S. Ahsan, S. Alshomrani, and G. Iqbal. 2017. Remote surveillance with reduced transmission overhead. In Proceedings of the 2nd International Conference on Frontiers of Sensors Technologies. 435--439."},{"volume-title":"Proceedings of the International Conference on Pattern Recognition. 404--407","author":"Kitahara I.","key":"e_1_2_1_17_1","unstructured":"I. Kitahara , K. Kogure , and N. Hagita . 2004. Stealth vision for protecting privacy . In Proceedings of the International Conference on Pattern Recognition. 404--407 . I. Kitahara, K. Kogure, and N. Hagita. 2004. Stealth vision for protecting privacy. In Proceedings of the International Conference on Pattern Recognition. 404--407."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077587.1644596"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995586"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012206"},{"volume-title":"Proceedings of the IEEE International Conference on Multimedia 8 Expo. 60--65","author":"Saini M. K.","key":"e_1_2_1_21_1","unstructured":"M. K. Saini , P. K. Atrey , S. Mehrotra , S. Emmanuel , and M. S. Kankanhalli . 2010. Privacy modeling in video data publication . In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 60--65 . M. K. Saini, P. K. Atrey, S. Mehrotra, S. Emmanuel, and M. S. Kankanhalli. 2010. Privacy modeling in video data publication. In Proceedings of the IEEE International Conference on Multimedia 8 Expo. 60--65."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2186957"},{"volume-title":"Proceedings of the 2007 IEEE\/RSJ International Conference on Intelligent Robots and Systems. 971--978","author":"Schiff J.","key":"e_1_2_1_23_1","unstructured":"J. Schiff , M. Meingast , D. K. Mulligan , S. Sastry , and K. Goldberg . 2007. Respectful cameras: Detecting visual markers in real-time to address privacy concerns . In Proceedings of the 2007 IEEE\/RSJ International Conference on Intelligent Robots and Systems. 971--978 . J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Goldberg. 2007. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Proceedings of the 2007 IEEE\/RSJ International Conference on Intelligent Robots and Systems. 971--978."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2106250"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2816-x"},{"volume-title":"Proceedings of the International Symposium on Biometrics and Security Technologies. 256--262","author":"Song B.","key":"e_1_2_1_26_1","unstructured":"B. Song , Y. Tian , and B. Zhou . 2014. Design and evaluation of remote video surveillance system on private cloud . In Proceedings of the International Symposium on Biometrics and Security Technologies. 256--262 . B. Song, Y. Tian, and B. Zhou. 2014. Design and evaluation of remote video surveillance system on private cloud. In Proceedings of the International Symposium on Biometrics and Security Technologies. 256--262."},{"key":"e_1_2_1_27_1","volume-title":"Technical Report 14\/98, Police Scientific Development Branch","author":"Wallace E.","year":"1988","unstructured":"E. Wallace and C. Diffley . 1988 . CCTV Control Room Ergonomics . Technical Report 14\/98, Police Scientific Development Branch , Hertfordshire, UK . E. Wallace and C. Diffley. 1988. CCTV Control Room Ergonomics. Technical Report 14\/98, Police Scientific Development Branch, Hertfordshire, UK."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027537"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing","volume":"3","author":"Zhang W.","unstructured":"W. Zhang , S.-C. S. Cheung , and M. Chen . 2005. Hiding privacy information in video surveillance system . In Proceedings of the IEEE International Conference on Image Processing , Vol. 3 . II--868--71. W. Zhang, S.-C. S. Cheung, and M. Chen. 2005. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3. II--868--71."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312574"}},"subtitle":["A Privacy-Preserving Long-Distance Video Surveillance System"],"short-title":[],"issued":{"date-parts":[[2019,5,31]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3312574"],"URL":"https:\/\/doi.org\/10.1145\/3312574","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2019,5,31]]},"assertion":[{"value":"2018-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}