Share Email Print

Proceedings Paper

A utility-driven surveillance approach to trade-off security and privacy
Author(s): C. Lloyd; T. Mannucci; H. Bouma; K. Schutte; A. Huizing
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has important legal and ethical implications, not least for individuals right to privacy. In this paper, we describe a technological approach to balance the two competing goals of system efficacy and privacy. We describe a methodology for constructing a “goal-function” that reflects the operators preferences for detection performance and anonymity. This goal function is combined with an image-processing system that provides tracking and threat assessment functionality and a decision-making framework that assesses the potential value gained by providing the operator with de-anonymized images. The framework provides a probabilistic approach combining user preferences, world state model, possible user actions and threat mitigation effectiveness, and suggests the user action with the largest estimated utility. We show results of operating the system in a perimeter-protection scenario

Paper Details

Date Published: 7 October 2019
PDF: 19 pages
Proc. SPIE 11166, Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies III, 111660S (7 October 2019); doi: 10.1117/12.2533741
Show Author Affiliations
C. Lloyd, TNO (Netherlands)
T. Mannucci, TNO (Netherlands)
H. Bouma, TNO (Netherlands)
K. Schutte, TNO (Netherlands)
A. Huizing, TNO (Netherlands)

Published in SPIE Proceedings Vol. 11166:
Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies III
Henri Bouma; Radhakrishna Prabhu; Robert James Stokes; Yitzhak Yitzhaky, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?