![]() | This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Visual privacy is the relationship between collection and dissemination of visual information, the expectation of privacy, and the legal issues surrounding them. These days digital cameras are ubiquitous. They are one of the most common sensors found in electronic devices, ranging from smartphones to tablets, and laptops to surveillance cams. However, privacy and trust implications surrounding it limit its ability to seamlessly blend into computing environment. In particular, large-scale camera networks have created increasing interest in understanding the advantages and disadvantages of such deployments. It is estimated that over 7 million CCTV cameras deployed in the UK. [1] Due to increasing security concerns, camera networks have continued to proliferate across other countries such as the United States. While the impact of such systems continues to be evaluated, in parallel, tools for controlling how these camera networks are used and modifications to the images and video sent to end-users have been explored.
Visual Privacy is often typically applied to particular technologies including:
Different forms of technologies are explored to enhance or preserve privacy while providing information collected from camera networks. Most of these solutions rely upon the target application and try to accomplish it in a privacy-preserving manner:
Visual privacy hence encompasses privacy aware and privacy preserving systems which factor in the compute design choices, [8] privacy policies regarding data-sharing in a collaborative and distributive environment and data ownership itself. At times privacy and trust are interlinked especially for the adoption and wide-scale acceptance of any technology. Having a fair and accurate computer vision model goes a long way into ensuring the prior two. A lot of developers are also now inculcating perspectives from privacy by design. These include but are not limited to processing all user sensitive data on the edge client device, decreasing data retentivity, and ensuring that the data is not used for anything it is not intended for.