Architecture of an IP camera system using machine learning for privacy protection


  • Nikola Nikolić Toplica Academy of Applied Studies, Department of Business Studies Blace, Serbia
  • Oliver Popović Toplica Academy of Applied Studies, Department of Business School Blace, Serbia
  • Vladica Ubavić Republic Geodetic Authority, Belgrade
  • Marina Jovanović-Milenković Educons University, Faculty of Project and Innovation Management, Belgrade



machine learning, IP camera, video surveilance, privacy protection


The development of technologies and the Internet conditioned the development of video surveillance systems. In modern video surveillance systems, the complete content recorded by a camera can be publicly available, i.e., visible on the Internet. The mass use of this type of camera has led to the fact that the cameras record everything and everyone and that the recorded content violates privacy. In order to protect privacy, different types of technologies and software are applied. One of those technologies is machine learning. By applying machine learning, it is possible to mask people's faces on recorded material. In this way, in publicly available content, as well as in case of unauthorized access, the identity of people is not compromised. This paper describes the architecture of a system that enables the application of machine learning for the purpose of protecting the identity of a person, where only an authorized person would have access to the original unmasked content.


Aurélien, G. (2019). Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow. O'Reilly Media.

Fogel, I., & Sagi, D. (1989). Gabor filters as texture discriminator. Biological cybernetics, 61(2), 103-113.

Hoory, S., Shapira, T., Shabtai, A., & Elovici, Y. (2020). Dynamic adversarial patch for evading object detection models. arXiv preprint arXiv:2010.13070.

Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260.

Kapadia A, Henderson T, Fielding JJ, Kotz D (2007) Virtual walls: Protecting digital privacy in pervasive environments. In LaMarca A, Langheinrich M, Truong KN (eds) Pervasive computing (pp. 162–179) Springer Berlin Heidelberg.

Ravi, S., Climent-Pérez, P., & Florez-Revuelta, F. (2023). A review on visual privacy preservation techniques for active and assisted living. Multimedia Tools and Applications, 1-41.

Padilla-López, J. R., Chaaraoui, A. A., & Flórez-Revuelta, F. (2015). Visual privacy protection methods: A survey. Expert Systems with Applications, 42(9), 4177-4195.

Rahim, M. A., Hossain, M. N., Wahid, T., & Azam, M. S. (2013). Face recognition using local binary patterns (LBP). Global Journal of Computer Science and Technology, 13(4), 1-8.

Rong, Y., Shiratori, T., & Joo, H. (2021). Frankmocap: A monocular 3d whole-body pose estimation system via regression and integration. In Proceedings of the IEEE/CVF International Conference on Computer Vision (pp. 1749-1759).

Viola, P., & Jones, M. (2001, December). Rapid object detection using a boosted cascade of simple features. In Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition. CVPR 2001 (Vol. 1, pp. I-I). Ieee. https://doi:10.1109/cvpr.2001.990517

Yeh, R. A., Chen, C., Yian Lim, T., Schwing, A. G., Hasegawa-Johnson, M., & Do, M. N. (2017). Semantic image inpainting with deep generative models. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5485-5493).

Yu, J., Lin, Z., Yang, J., Shen, X., Lu, X., & Huang, T. S. (2018). Generative image inpainting with contextual attention. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5505-5514).

Zhou, J., & Pun, C. M. (2020). Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming. IEEE Transactions on Information Forensics and Security, 16, 1088-1103.




How to Cite

Nikolić, N., Popović, O., Ubavić, V., & Jovanović-Milenković, M. (2023). Architecture of an IP camera system using machine learning for privacy protection. International Scientific Conference on Economy, Management and Information Technologies, 1(1), 317–321.