Privacy Violation by CCTV in Public Places

  • Ali Mohammed Ali Alwahaibi
  • Nasser Al Musalhi Department of Computer Engineering, Cyprus International University, Nicosia, North Cyprus, TURKEY Mersin 99258
  • Wan Azlan Wan Hassan
  • Latifah Abd Latib
  • Mohammed Almamari
Keywords: CCTV, Chi-Square formula, Privacy violation


Nowadays, due to increased attention to security and policy, the public wants to check whether their surroundings are safe and secure. Cyber threats and cyberattacks are becoming more common as technology advances. The purpose of this paper was to investigate whether the placement of CCTV cameras in public places can jeopardize users' privacy. Our methodology is to select random images from the proposed dataset and then observe and classify the privacy violations in certain positions of CCTV in different places, such as ATMs, libraries, and schools. applying the chi-square formula to evaluate and get the p-value of the violation. Our indicator is set to 2% for the violation acceptance margin. The research yielded a 66.5% violation rate, and we conclude that the CCTV position can jeopardize the privacy of users in various locations.



[1] Y.-L. Wu, Y.-H. Tao, and C.-J. Chang, “A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom,” J. Inf. Optim. Sci., vol. 38, no. 1, pp. 173–196, 2017, doi: 10.1080/02522667.2016.1220076.
[2] M. Birnhack, L. Perry-Hazan, and S. German Ben-Hayun, “CCTV surveillance in primary schools: normalisation, resistance, and children’s privacy consciousness,” Oxford Rev. Educ., vol. 44, no. 2, pp. 204–220, 2018, doi: 10.1080/03054985.2017.1386546.
[3] D. G. D. Advincula, K. A. P. Altura, E. B. Blancaflor, E. C. P. C. Castillo, G. B. Rubiano, and A. M. D. Tobias, “Risk Assessment of an installed CCTV System in an Open Market Place,” ACM Int. Conf. Proceeding Ser., pp. 455–461, 2022, doi: 10.1145/3535782.3535842.
[4] S. Mamonov and M. Koufaris, “The impact of exposure to news about electronic government surveillance on concerns about government intrusion, privacy self-efficacy, and privacy protective behavior,” J. Inf. Priv. Secur., vol. 12, no. 2, pp. 56–67, 2016, doi: 10.1080/15536548.2016.1163026.
[5] F. Jaime, A. Maña, Z. Ma, C. Wagner, D. Hovie, and M. Bossuet, “Building a privacy accountable surveillance system,” Model. 2015 - 3rd Int. Conf. Model. Eng. Softw. Dev. Proc., pp. 646–654, 2015, doi: 10.5220/0005401606460654.
[6] P. Korshunov, C. Araimo, F. De Simone, C. Velardo, J. Dugelay, and T. Ebrahimi, “EVALUATION OF VISUAL PRIVACY FILTERS IMPACT ON VIDEO SURVEILLANCE INTELLIGIBILITY Multimedia Signal Processing Group , Institute of Electrical Engineering , EPFL , Switzerland , Multimedia Department , EURECOM , France ,” pp. 150–151, 2012.
[7] S. Hong and S. Jeong, “The Analysis of CCTV Hacking and Security Countermeasure Technologies: Survey,” J. Converg. Inf. Technol., vol. 8, no. 6, pp. 129–134, 2018, doi: 10.22156/CS4SMB.2018.8.6.129.
[8] Q. M. Rajpoot and C. D. Jensen, “Video surveillance: Privacy issues and legal compliance,” Biometrics Concepts, Methodol. Tools, Appl., pp. 1335–1358, 2016, doi: 10.4018/978-1-5225-0983-7.ch054.
[9] A. Badii, M. Einig, M. Tiemann, D. Thiemert, and C. Lallah, “Visual context identification for privacy-respecting video analytics,” 2012 IEEE 14th Int. Work. Multimed. Signal Process. MMSP 2012 - Proc., pp. 366–371, 2012, doi: 10.1109/MMSP.2012.6343470.
[10] A. Cavoukian, “Privacy by Design,” Priv. Prot. Meas. Technol. Bus. Organ., pp. 170–208, 2011, doi: 10.4018/978-1-61350-501-4.ch007.
[11] J. D. S. Paolo Nesi, Kia Ng, AXMEDIS 2008 Proceedings of the 4th International Conference on Automated Solutions for Cross Media Content and Multi-Channel Distribution Workshops, Panels and Industrial Applications. 1386.
[12] J. Pollard, Assembling the social. 2016.
[13] A. Chattopadhyay and T. E. Boult, “PrivacyCam: A privacy preserving camera using uCLinux on the blackfin DSP,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., no. April 2019, 2007, doi: 10.1109/CVPR.2007.383413.
[14] M. Cossalter, M. Tagliasacchi, and G. Valenzise, “Privacy-enabled object tracking in video sequences using compressive sensing,” 6th IEEE Int. Conf. Adv. Video Signal Based Surveillance, AVSS 2009, no. September, pp. 436–441, 2009, doi: 10.1109/AVSS.2009.13.
[15] J. G. Wang, A. Suwandy, and W. Y. Yau, “Face obscuration in a video sequence by integrating kernel-based mean-shift and active contour,” 2008 10th Int. Conf. Control. Autom. Robot. Vision, ICARCV 2008, no. December, pp. 2314–2318, 2008, doi: 10.1109/ICARCV.2008.4795894.
[16] “A DISCRETE WAVELET TRANSFORM BASED RECOVERABLE IMAGE PROCESSING FOR Graduate School of Engineering Osaka University , Japan,” Engineering, pp. 3–6, 2008.
[17] R. Gross, L. Sweeney, F. De Torre, and S. Baker, “Model-Based Face De-Identification,” 2006.
[18] A. Frome et al., “Large-scale privacy protection in Google Street View,” Proc. IEEE Int. Conf. Comput. Vis., pp. 2373–2380, 2009, doi: 10.1109/ICCV.2009.5459413.
[19] G. Denina et al., “Distributed Video Sensor Networks,” Distrib. Video Sens. Networks, pp. 335–347, 2011, doi: 10.1007/978-0-85729-127-1.
[20] ATM Banking, “ATM Banking | ATM Banking | Open Data DC,” ATM Banking , 2022. (accessed Nov. 03, 2022).
[21] C. Neustaedter, S. Greenberg, and M. Boyle, “Blur filtration fails to preserve privacy for home-based video conferencing,” ACM Trans. Comput. Interact., vol. 13, no. 1, pp. 1–36, 2006, doi: 10.1145/1143518.1143519.
How to Cite
Alwahaibi, A. M. A., Al Musalhi, N., Wan Hassan, W. A., Abd Latib, L., & Almamari, M. (2023). Privacy Violation by CCTV in Public Places. Selangor Science & Technology Review (SeSTeR), 7(2), PREPRINT. Retrieved from