Research Article
Adaptive Transformation for Robust Privacy Protection in Video Surveillance
Table 1
A comparison of the proposed work with the existing works.
| | The work | Implicit identity leakage channels used? | Utility/privacy tradeoff? | Approach adopted |
| | Boyle et al. [1] | No | No | GO | | Senior et al. [3] | No | No | SO | | Moncrieff et al. [11] | No | No | SO | | Fidaleo et al. [4] | No | No | SO | | Wickramasuriya et al. [5] | No | No | SO | | Koshimizu et al. [6] | No | No | SO | | Spindler et al. [12] | No | No | SO | | Thuraisingham et al. [7] | No | No | SO | | Carrillo et al. [8] | No | No | SO | | Paruchuri et al. [9] | No | No | SO | | Qureshi [10] | No | No | SO | | Saini et al. [2] | Yes | No | No transformation | | Proposed work | Yes | Yes | SO and GO |
|
|
SO: selective obfuscation; GO: global operations.
|