Research Article
Adaptive Transformation for Robust Privacy Protection in Video Surveillance
Table 1
A comparison of the proposed work with the existing works.
| The work | Implicit identity leakage channels used? | Utility/privacy tradeoff? | Approach adopted |
| Boyle et al. [1] | No | No | GO | Senior et al. [3] | No | No | SO | Moncrieff et al. [11] | No | No | SO | Fidaleo et al. [4] | No | No | SO | Wickramasuriya et al. [5] | No | No | SO | Koshimizu et al. [6] | No | No | SO | Spindler et al. [12] | No | No | SO | Thuraisingham et al. [7] | No | No | SO | Carrillo et al. [8] | No | No | SO | Paruchuri et al. [9] | No | No | SO | Qureshi [10] | No | No | SO | Saini et al. [2] | Yes | No | No transformation | Proposed work | Yes | Yes | SO and GO |
|
|
SO: selective obfuscation; GO: global operations.
|