Show simple item record

dc.contributor.authorRibaric, Slobodan
dc.contributor.authorAriyaeeinia, Aladdin
dc.contributor.authorPavesic, Nikola
dc.date.accessioned2018-01-30T22:22:04Z
dc.date.available2018-01-30T22:22:04Z
dc.date.issued2016-09-30
dc.identifier.citationRibaric , S , Ariyaeeinia , A & Pavesic , N 2016 , ' De-identification for privacy protection in multimedia content : A survey ' , Signal Processing: Image Communication , vol. 47 , pp. 131-151 . https://doi.org/10.1016/j.image.2016.05.020
dc.identifier.issn0923-5965
dc.identifier.otherPURE: 11644573
dc.identifier.otherPURE UUID: 466f4deb-9e08-4772-a766-8d5a64d8fa6c
dc.identifier.otherScopus: 84974716062
dc.identifier.urihttp://hdl.handle.net/2299/19652
dc.descriptionThis document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.
dc.description.abstractPrivacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.en
dc.format.extent21
dc.language.isoeng
dc.relation.ispartofSignal Processing: Image Communication
dc.rightsEmbargoed
dc.subjectBiometric identifiers
dc.subjectDe-identification
dc.subjectMultimedia
dc.subjectNon-biometric identifiers
dc.subjectPrivacy
dc.subjectSoft biometric identifiers
dc.subjectSoftware
dc.subjectSignal Processing
dc.subjectComputer Vision and Pattern Recognition
dc.subjectElectrical and Electronic Engineering
dc.titleDe-identification for privacy protection in multimedia content : A surveyen
dc.contributor.institutionUniversity of Hertfordshire
dc.description.statusPeer reviewed
dc.date.embargoedUntil2017-06-01
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=84974716062&partnerID=8YFLogxK
dc.description.versiontypeFinal Accepted Version
dcterms.dateAccepted2016-09-30
rioxxterms.versionAM
rioxxterms.versionofrecordhttps://doi.org/10.1016/j.image.2016.05.020
rioxxterms.licenseref.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
rioxxterms.licenseref.startdate2017-06-01
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue
herts.date.embargo2017-06-01
herts.rights.accesstypeEmbargoed


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record