Video monitoring system with privacy features

ABSTRACT

A surveillance monitoring system may use a camera to detect any viewing faces visible within viewing sight of a monitor and determine whether the detected viewing faces belong to authorized individuals who are authorized to view video surveillance footage on the monitor or if any of the detected viewing faces belong to individuals who are not authorized to view video surveillance footage on the monitor. When the detected viewing faces belong only to authorized individuals, the surveillance monitoring system continues to display the video surveillance footage that includes identifiable faces without anonymizing the identifiable faces. When the detected viewing faces also include unauthorized individuals, the surveillance monitoring system may continue to display the video surveillance footage, but the surveillance monitoring system may automatically anonymize one or more of the identifiable faces seen in the video surveillance footage.

TECHNICAL FIELD

The present disclosure relates generally to a video monitoring system.More particularly, the present disclosure relates to methods and systemsfor monitoring video surveillance footage while satisfying privacyrequirements.

BACKGROUND

Known video surveillance systems often include a large number of videocameras that are used to provide video surveillance. The videosurveillance may be monitored live by one or more security operatorsthat watch video on one or more monitors for signs of suspiciousbehavior and other potential issues. In some cases, prior captured videomay be pulled up from memory or other storage and viewed in response toa particular incident, for example. Due to privacy concerns, there maybe situations in which the identity of least some individuals shown inthe video surveillance needs to be anonymized. There may be privacyconcerns raised as well by who is reviewing the video surveillance.While video monitoring systems are known, there is a need for improvedvideo monitoring systems generally and video monitoring systems thatmeet certain privacy requirements specifically.

SUMMARY

The present disclosure relates generally to a video monitoring systemthat permit access to video surveillance while satisfying certainprivacy requirements. In some instances, a video monitoring system mayitself include a camera that is trained on those watching the videosurveillance footage on an operator's monitor. When only authorizedindividuals are seen to be watching, the video that is displayed may notbe altered to anonymize some or all of the individuals shown in thevideo. If any unauthorized individuals are found to be watching, thedisplayed video may be altered to anonymize one or more of theindividuals shown in the video in order to protect their privacy. Thepresent disclosure also pertains to methods of selectively anonymizingpersons in a video. For example, certain classifications of individualsmay be anonymized while other classifications of individuals may not beanonymized.

The preceding summary is provided to facilitate an understanding of someof the innovative features unique to the present disclosure and is notintended to be a full description. A full appreciation of the disclosurecan be gained by taking the entire specification, claims, figures, andabstract as a whole.

BRIEF DESCRIPTION OF THE FIGURES

The disclosure may be more completely understood in consideration of thefollowing description of various examples in connection with theaccompanying drawings, in which:

FIG. 1 is a schematic block diagram of an illustrative videosurveillance system that includes a video monitoring system;

FIG. 2 is a schematic block diagram of an illustrative video monitoringstation usable by a security operator for monitoring video of a videosurveillance system;

FIG. 3 is a schematic block diagram of an illustrative video monitoringsystem usable in the illustrative video surveillance system of FIG. 1;

FIG. 4 is a schematic block diagram of an illustrative video monitoringsystem usable in the illustrative video surveillance system of FIG. 1;

FIG. 5 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 6 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 7 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 8 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 9 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 10 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 11 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 12 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 13 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 14 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 15 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 16 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4;

FIG. 17 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4; and

FIG. 18 is a flow diagram showing an illustrative method that may becarried out via the illustrative video monitoring systems of FIGS. 3 and4.

While the disclosure is amenable to various modifications andalternative forms, specifics thereof have been shown by way of examplein the drawings and will be described in detail. It should beunderstood, however, that the intention is not to limit the disclosureto the particular examples described. On the contrary, the intention isto cover all modifications, equivalents, and alternatives falling withinthe spirit and scope of the disclosure.

DESCRIPTION

The following description should be read with reference to the drawings,in which like elements in different drawings are numbered in likefashion. The drawings, which are not necessarily to scale, depictexamples that are not intended to limit the scope of the disclosure.Although examples are illustrated for the various elements, thoseskilled in the art will recognize that many of the examples providedhave suitable alternatives that may be utilized.

All numbers are herein assumed to be modified by the term “about”,unless the content clearly dictates otherwise. The recitation ofnumerical ranges by endpoints includes all numbers subsumed within thatrange (e.g., 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5).

As used in this specification and the appended claims, the singularforms “a”, “an”, and “the” include the plural referents unless thecontent clearly dictates otherwise. As used in this specification andthe appended claims, the term “or” is generally employed in its senseincluding “and/or” unless the content clearly dictates otherwise.

It is noted that references in the specification to “an embodiment”,“some embodiments”, “other embodiments”, etc., indicate that theembodiment described may include a particular feature, structure, orcharacteristic, but every embodiment may not necessarily include theparticular feature, structure, or characteristic. Moreover, such phrasesare not necessarily referring to the same embodiment. Further, when aparticular feature, structure, or characteristic is described inconnection with an embodiment, it is contemplated that the feature,structure, or characteristic is described in connection with anembodiment, it is contemplated that the feature, structure, orcharacteristic may be applied to other embodiments whether or notexplicitly described unless clearly stated to the contrary.

The present disclosure relates generally to video surveillance systemsthat include a plurality of video cameras and a video monitoring system.FIG. 1 is a schematic block diagram of an illustrative videosurveillance system 10 that includes a plurality of cameras 12. While atotal of four cameras 12 a, 12 b, 12 c, 12 d are shown, it will beappreciated that this is merely illustrative, as the video surveillancesystem 10 may include any number of cameras 12. For example, the videosurveillance system 10 may include tens, hundreds or even thousands ofcameras 12. While the cameras 12 are described as video cameras thateach provide a video stream, in some cases at least some of the cameras12 may be still cameras that capture still images, perhaps on aparticular schedule or in response to detected motion.

In some instances, the images or video streams captured by each of thecameras 12 may be transmitted to a server 14. In some cases, the server14 may provide live video streams to a video monitoring system 16, andmay store or archive some or all of the video streams for later reviewusing the video monitoring system 16. While the server 14 is illustratedas being a cloud server, this is not necessary in all cases. The server14 may represent a single computer, or the server 14 may represent alarge number of computers that are networked together. In some cases,the server 14 may simply be a video recorder/video router. Some of thecameras 12 may be hard wired to a device such as a computer, a router ora modem, that itself communicates with the server 14. Some of thecameras 12 may communicate wirelessly with the server 14, using anydesired wireless communication protocol such as but not limited tocellular communication, ZigBee, REDLINK™, Bluetooth, WiFi, IrDA,dedicated short range communication (DSRC), EnOcean, and/or any othersuitable common or proprietary wireless protocol, as desired.

The video monitoring system 16 may be in communication with the server14 such that the images or video streams captured by each of the cameras12 may be accessed by the video monitoring system 16 and viewed on adisplay 18 of the video monitoring system 16. In some instances, thevideo monitoring system 16 may be used to control one or more of thecameras 12, or to adjust one or more of the cameras 12. The videomonitoring system 16 may be disposed near where at least some of thecameras 12 are located, or may be remote from the cameras 12. In someinstances, the video monitoring system 16 may be configured to displayvideos received from cameras 12 that are located in a number ofdifferent locations. It will be appreciated that a security officer, forexample, may use the video monitoring system 16 to live-stream one ormore video streams from one or more of the cameras 12. A securityofficer may also use the video monitoring system 16 to review archivedvideo, particularly if there was an incident of some sort and thesecurity officer wants or needs to take a closer look.

FIG. 2 is a schematic block diagram of an illustrative video monitoringstation 20 usable by a security operator for monitoring video of a videosurveillance system, such as video surveillance system 10 shown inFIG. 1. While a single monitor 22 is shown, this is merely illustrative.In some cases, the video monitoring station 20 may include two, three,four or more monitors 22. In some instances, the monitor 22 mayrepresent a wall of monitors, or a large display unit that is configuredto display a plurality of different video streams simultaneously in agrid fashion. The monitor 22 may be mounted on a wall. In some cases,the monitor 22 may sit on a desk (not illustrated). The illustrativevideo monitoring station 20 include a keyboard 24 and a controller 26.The controller 26 may, for example, be a desktop computer or a laptopcomputer. The controller 26 may be manifested in the cloud, and thevideo monitoring station 20 may thus represent a dumb terminal thatconnects to a cloud-based terminal server. The keyboard 24 may be usedto solicit information from the controller 26, or to provide informationto the controller 26. While a keyboard 24 is generically represented, itwill be appreciated that other input devices may additionally oralternatively be used, including a mouse, a track ball, a touch screensurface and the like. These are just examples.

As illustrated, the illustrative video monitoring station 20 alsoincludes a video camera 28 that is operably coupled to the controller26. In some cases, the video camera 28 may be considered as being aimedat, or having a field of view, that corresponds to where the securityoperator would sit or stand while operating the keyboard 24 and viewingthe monitor 22. In some cases, particularly if the video monitoringstation 20 is manifested as laptop computer, the video camera 28 may bea web-cam that is built into the laptop. The video camera 28 may beoperably coupled to the controller 26 such that the controller 26receives a video stream from the video camera 28. Additionally oralternatively, the video camera 28 may be in communication with thecloud 14. In either case, the controller 26 and/or the cloud 14 may beconfigured to analyze the video stream provided by the video camera 28to ensure that the individual operating the video monitoring station 20is authorized to do so. The video stream from the video camera 28 mayalso be analyzed to ensure that nobody else is standing behind thesecurity officer in a position to possibly sneak a peak at the videodisplayed on the monitor 22. As will be discussed with respect tosubsequent Figures, the video stream from the video camera 28 may beanalyzed to identify authorized individuals who are authorized to viewthe video displayed on the monitor 22, and possibly identifyunauthorized individuals who are not authorized to view the videodisplayed on the monitor 22. If unauthorized individuals are detected,the controller 26 and/or the cloud 14 may take actions to ensure thatindividual privacy is maintained, sometimes by anonymizing certainindividuals in the video in real-time.

FIG. 3 is a schematic block diagram of a video monitoring system 30 thatis configured to provide privacy for individuals shown in videosurveillance footage while displaying the video surveillance footage onthe video monitoring system 30. The video monitoring system 30 may beconsidered as being an example of the video monitoring system 16 shownin FIG. 1, and may in some instances include elements and/or features ofthe video monitoring station 20 shown in FIG. 2. The video monitoringsystem 30 includes a monitor 32 that is configured to display videosurveillance footage as well as a keyboard 34. A video camera 36 may beaimed at a space in front of the monitor 32 and the keyboard 34 and thusmay be positioned to visually capture an individual operating the videomonitoring system 30 as well as any other individuals who may be behindthat individual (e.g. in viewing sight of the monitor 32). A controller38 is operably coupled to the monitor 32 and to the keyboard 34 and maybe configured to control display of video surveillance footage on themonitor 32.

In the example shown, the controller 38 may also be configured toidentify faces that are detected by the video camera 36 aimed at thespace in front of the monitor 32 and the keyboard 34 in order toascertain an identity of an operator using the monitor 32 and keyboard34 as well as to ascertain whether there are any unauthorizedindividuals possibly viewing the video surveillance footage displayed onthe monitor 32. The controller 38 may be further configured to displayvideo surveillance footage on the monitor 32, including showing one ormore identifiable faces in the video surveillance footage, when nounauthorized individuals are detected and to anonymize one or moreidentifiable faces in the video surveillance footage when one or moreunauthorized individuals are detected. In some cases, the controller 38may be further configured to issue an alert when an unauthorizedindividual is detected within viewing sight of the monitor 32. It willbe appreciated that anonymizing one or more identifiable faces mayinclude, for example, pixelating the individual's face/body to protecttheir identity. Anonymizing may also include blocking out theindividual's face/body in a solid color such as black or white. In somecases, anonymizing may include fuzz balling the individual's face/bodyas displayed on the monitor 32. In some cases, the video footage may beanonymized for display purposes, but the original video footage mayremain unchanged.

In some instances, the controller 38 may further be configured tocapture log in credentials used by the operator and match the log incredentials with the identity of the operator as determined byidentifying a face of the operator. The controller 38 may, for example,be further configured to capture keystrokes of the operator to identifya keystroke pattern, and compare the identified keystroke pattern with ahistorical keystroke pattern for the operator as determined byidentifying a face of the operator. The keystroke pattern may include atemporal component. The controller 38 may be further configured toanonymize one or more identifiable faces in the video surveillancefootage displayed on the monitor 32 in response to a detected tamperingwith the video camera 36 that is aimed at the space in front of themonitor 32 and the keyboard 34.

In some instances, the controller 38 may determine or otherwise receivean indication of the identity of the operator that is based upon facialrecognition. The controller 38 may determine or otherwise receive anindication of the identity of the operator that is based upon theoperator's log-in credentials. The controller 38 may determine orotherwise receive an indication of the identity of the operator that isbased upon keystroke tracking. In some cases, each of these indicationsmay include a numerical indication of the probability of the accuracy ofthe particular indication. In some cases, the controller 38 may providea relative weight to each of these probabilities, and may multiply eachprobability by its particular weight, and may sum these in order todetermine whether the detected operator is the correct operator, andthat there aren't any people watching over the operator's shoulder. Thecontroller 38 may use this numerical summation to determine whether toissue an alert and anonymize the video being displayed on the monitor32. If the numerical summation indicates a high likelihood that theoperator is an authorized operator, the video will continue to bedisplayed on the monitor 32 in an un-obscured fashion. If the numericalsummation indicates a lower likelihood that the operator is anauthorized operator, the video being displayed on the monitor 32 may beobscured, and an alert may be generated.

In some instances, the controller 38 may be configured to detectpossible problems with the video camera 36. For example, the controller38 may determine that no video is being provided by the video camera 36.This may mean that the video camera 36 is malfunctioning, or has simplylost power. The controller 38 may analyze video being provided by thevideo camera 36 to ascertain whether at least a portion of the frame ofview of the video camera 36 is being obscured. This may happenaccidently, such as if something is temporarily in front of the lens ofthe video camera 36. This may happen intentionally, such as if someoneintentionally blocks at least a part of the frame of the view of thevideo camera 36. For example, someone wishing to avoid detection mayplace a piece of paper over at least part of the lens of the videocamera 36, or could spray something onto the lens, and thus obscure thelens of the video camera 36. In some cases, if the controller 38determines that the video camera 36 is not functioning correctly, forwhatever reason, the controller 38 may issue an alert and maysimultaneously anonymize the video being displayed on the monitor 32.

In some cases, displayed video may be at least partially anonymized inresponse to detection of an unauthorized individual. In some instances,at least some of the individuals who might otherwise be identifiable indisplayed video surveillance footage may be automatically anonymized asa matter of policy, while other individuals may not be anonymized. FIG.4 is a schematic block diagram of a video monitoring system 40 that isconfigured to display video surveillance footage so that a securityofficer may view the video surveillance footage, the video monitoringsystem 40 configured to selectively anonymize at least some of thepeople who are visible in the video surveillance footage. The videomonitoring system 40 may be considered as being an example of the videomonitoring system 16 shown in FIG. 1, and may in some instances includeelements and/or features of the video monitoring station 20 shown inFIG. 2. The video monitoring system 40 includes a people detectionmodule 42 that is configured to receive video surveillance footage fromone or more cameras 12, and to analyze the footage to identify one ormore of people in the video surveillance footage. The video monitoringsystem 40 also includes a selective anonymization module 44 that isconfigured to selectively anonymize one or more of the people identifiedin the video surveillance footage based on one or more predeterminedcriteria.

For example, the selective anonymization module 44 may be configured toreceive information pertaining to people who should not be anonymized.In some cases, a security officer operating the video monitoring system40 may provide this information. In some cases, the people who shouldnot be anonymized include people accused of a crime. The people whoshould not be anonymized may include visitors, for example. It will beappreciated that in some cases, the selective anonymization module 44 isapplied when displaying the video surveillance footage via the videomonitoring system 40 and does not alter the original video surveillancefootage.

The people detection module 42 may, for example, use backgroundsubtraction to identify moving objects, where moving objects may bepeople. The people detection module 42 may use color detection to detectcolors that may represent a skin color. The selective anonymizationmodule 44 may be configured to pixelate portions of images that arebelieved to correspond to faces of people to be anonymized. Theselective anonymization module 44 may be configured to fuzzball portionsof images that are believed to correspond to faces of people to beanonymized, for example.

FIG. 5 is a flow diagram showing an illustrative method 50 of providingprivacy to individuals shown in video surveillance footage while viewingthe video surveillance footage on a surveillance monitoring system suchas but not limited to the video monitoring system 16, 30, 40. The videosurveillance footage may be displayed on a monitor, the videosurveillance footage including identifiable faces that are displayedwithout being anonymized, as indicated at block 52. As noted at block54, a camera of the surveillance monitoring system may be monitoring aspace within viewing sight of the monitor. In some cases, the camera maybe a video camera that is aimed at the space within viewing sight of themonitor. The surveillance monitoring system may, for example, analyze avideo feed from a video camera to detect any viewing faces visiblewithin the viewing sight of the monitor.

The surveillance monitoring system may detect any viewing faces visiblewithin the viewing sight of the monitor and may determine whether thedetected viewing faces belong to authorized individuals who areauthorized to view video surveillance footage on the monitor or if anyof the detected viewing faces belong to individuals who are notauthorized to view video surveillance footage on the monitor, asindicated at block 56. When the detected viewing faces belong only toauthorized individuals, indicating that there were no unauthorizedindividuals detected, and as indicated at block 58, the surveillancemonitoring system continues to display the video surveillance footagethat includes identifiable faces without anonymizing the identifiablefaces. When the detected viewing faces also include unauthorizedindividuals, and as indicated at block 60, the surveillance monitoringsystem continues to display the video surveillance footage, but thesurveillance monitoring system automatically anonymizes one or more ofthe identifiable faces seen in the video surveillance footage.

FIG. 6 is a flow diagram showing an illustrative method 70 of providingprivacy to individuals shown in video surveillance footage while viewingthe video surveillance footage on a surveillance monitoring system suchas but not limited to the video monitoring system 16, 30, 40. The videosurveillance footage may be displayed on a monitor, the videosurveillance footage including identifiable faces that are displayedwithout being anonymized, as indicated at block 52. As noted at block54, a camera of the surveillance monitoring system may be monitoring aspace within viewing sight of the monitor. The surveillance monitoringsystem may detect any viewing faces visible within the viewing sight ofthe monitor and may determine whether the detected viewing faces belongto authorized individuals who are authorized to view video surveillancefootage on the monitor or if any of the detected viewing faces belong toindividuals who are not authorized to view video surveillance footage onthe monitor, as indicated at block 56.

When the detected viewing faces belong only to authorized individuals,indicating that there were no unauthorized individuals detected, and asindicated at block 58, the surveillance monitoring system continues todisplay the video surveillance footage that includes identifiable faceswithout anonymizing the identifiable faces. When the detected viewingfaces also include unauthorized individuals, and as indicated at block60, the surveillance monitoring system continues to display the videosurveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage. In some cases, and as indicated at block72, the surveillance monitoring system may issue an alert that anunauthorized individual is within viewing sight of the monitor. Thealert may, for example, be an auditory alert and/or a visible alert.

FIG. 7 is a flow diagram showing an illustrative method 80 of providingprivacy to individuals shown in video surveillance footage while viewingthe video surveillance footage on a surveillance monitoring system suchas but not limited to the video monitoring system 16, 30, 40. The videosurveillance footage may be displayed on a monitor, the videosurveillance footage including identifiable faces that are displayedwithout being anonymized, as indicated at block 52. As noted at block54, a camera of the surveillance monitoring system may be monitoring aspace within viewing sight of the monitor. The surveillance monitoringsystem may detect any viewing faces visible within the viewing sight ofthe monitor and may determine whether the detected viewing faces belongto authorized individuals who are authorized to view video surveillancefootage on the monitor or if any of the detected viewing faces belong toindividuals who are not authorized to view video surveillance footage onthe monitor, as indicated at block 56.

When the detected viewing faces belong only to authorized individuals,indicating that there were no unauthorized individuals detected, and asindicated at block 58, the surveillance monitoring system continues todisplay the video surveillance footage that includes identifiable faceswithout anonymizing the identifiable faces. When the detected viewingfaces also include unauthorized individuals, and as indicated at block60, the surveillance monitoring system continues to display the videosurveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage. In some instances, as indicated at block82, any identifiable faces seen in the video surveillance footage may beanonymized and an alert may be issued when a determination is made thatthe video feed from the video camera is disrupted.

FIG. 8 is a flow diagram showing an illustrative method 90 of providingprivacy to individuals shown in video surveillance footage while viewingthe video surveillance footage on a surveillance monitoring system suchas but not limited to the video monitoring system 16, 30, 40. The videosurveillance footage may be displayed on a monitor, the videosurveillance footage including identifiable faces that are displayedwithout being anonymized, as indicated at block 52. As noted at block54, a camera of the surveillance monitoring system may be monitoring aspace within viewing sight of the monitor. The surveillance monitoringsystem may detect any viewing faces visible within the viewing sight ofthe monitor and may determine whether the detected viewing faces belongto authorized individuals who are authorized to view video surveillancefootage on the monitor or if any of the detected viewing faces belong toindividuals who are not authorized to view video surveillance footage onthe monitor, as indicated at block 56.

When the detected viewing faces belong only to authorized individuals,indicating that there were no unauthorized individuals detected, and asindicated at block 58, the surveillance monitoring system continues todisplay the video surveillance footage that includes identifiable faceswithout anonymizing the identifiable faces. When the detected viewingfaces also include unauthorized individuals, and as indicated at block60, the surveillance monitoring system continues to display the videosurveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage. In some cases, when one or more viewingfaces cannot be reliably identified, but are not indicated as belongingto individuals who are authorized to view video surveillance footage onthe monitor, and as indicated at block 92, the video monitoring systemmay anonymize any identifiable faces visible in the video surveillancefootage displayed on the monitor.

FIG. 9 is a flow diagram showing an illustrative method 100 of providingprivacy to individuals shown in video surveillance footage while viewingthe video surveillance footage on a surveillance monitoring system suchas but not limited to the video monitoring system 16, 30, 40. The videosurveillance footage may be displayed on a monitor, the videosurveillance footage including identifiable faces that are displayedwithout being anonymized, as indicated at block 52. As noted at block54, a camera of the surveillance monitoring system may be monitoring aspace within viewing sight of the monitor. The surveillance monitoringsystem may detect any viewing faces visible within the viewing sight ofthe monitor and may determine whether the detected viewing faces belongto authorized individuals who are authorized to view video surveillancefootage on the monitor or if any of the detected viewing faces belong toindividuals who are not authorized to view video surveillance footage onthe monitor, as indicated at block 56.

When the detected viewing faces belong only to authorized individuals,indicating that there were no unauthorized individuals detected, and asindicated at block 58, the surveillance monitoring system continues todisplay the video surveillance footage that includes identifiable faceswithout anonymizing the identifiable faces. When the detected viewingfaces also include unauthorized individuals, and as indicated at block60, the surveillance monitoring system continues to display the videosurveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage.

In some cases, and as indicated at block 102, a secondary check may bemade for an unauthorized individual viewing the video surveillancefootage. A secondary check may, for example, include comparing anidentification of an operator at the monitor and keyboard as identifiedvia facial recognition with log in credentials used by the operator tolog into the video monitoring system. As another example, a secondarycheck may include monitoring the operator's key strokes, and comparingthe operator's key strokes to a known key stroke pattern for aparticular authorized operator as identified via facial recognitionand/or via their log in credentials.

FIG. 10 is a flow diagram showing an illustrative method 110 ofdisplaying video surveillance footage on a monitor that can includefootage of people, where the people include at least one protected groupof people that are to remain anonymized when displaying the videosurveillance footage to an operator and at least one unprotected groupof people that are not to be anonymized when displaying the videosurveillance footage to the operator. A person's job category maydetermine whether they are in the at least one protected group of peopleor the at least one unprotected group of people. As an example, perhapssecurity officers, or custodial staff are in the at least oneunprotected group of people while other categories of employees are inthe at least one protected group of people. In some cases, a person'slegal status may determine whether they are in the at least oneprotected group of people or the at least one unprotected group ofpeople. As an example, a blacklisted person, or a person otherwiseaccused of a crime, may fall into the at least one unprotected group ofpeople. These are just examples.

As indicated at block 112, the video surveillance footage may beanalyzed to identify one or more people that belong to the at least oneprotected group and/or one or more people that belong to the at leastone unprotected group. As noted at block 114, the video surveillancefootage may be displayed on a display while anonymizing at least thefaces of people within the at least one protected group of people andnot anonymizing the faces of people within the at least one unprotectedgroup of people.

FIG. 11 is a flow diagram showing an illustrative method 120 ofdisplaying video surveillance footage on a monitor that can includefootage of people, where the people include at least one protected groupof people that are to remain anonymized when displaying the videosurveillance footage to an operator and at least one unprotected groupof people that are not to be anonymized when displaying the videosurveillance footage to the operator. As indicated at block 112, thevideo surveillance footage may be analyzed to identify one or morepeople that belong to the at least one protected group and/or one ormore people that belong to the at least one unprotected group. As notedat block 114, the video surveillance footage may be displayed on adisplay while anonymizing at least the faces of people within the atleast one protected group of people and not anonymizing the faces ofpeople within the at least one unprotected group of people. In somecases, and as indicated at block 122, a determination may be madewhether an unauthorized person is in viewing sight of the monitor, andif so, the faces of people within the at least one unprotected group ofpeople may be anonymized.

FIG. 12 is a flow diagram showing an illustrative method 130 ofdisplaying video surveillance footage that can includes footage ofpeople, where the people include at least one protected group of peoplethat are to remain anonymized when displaying the video surveillancefootage and at least one unprotected group of people that are not to beanonymized when displaying the video surveillance footage. As indicatedat block 132, the video surveillance footage may be analyzed todetermine whether each of a plurality of people within the videosurveillance footage belong to the at least one protected group ofpeople or the at least one unprotected group of people. In someinstances, determining that some of the plurality of people belong tothe at least one unprotected group of people may be based at least parton one or more identifiable features of what the people are wearing. Forexample, one or more identifiable features of what the people arewearing may include a badge and/or a uniform.

As indicated at block 134, the video surveillance footage may bedisplayed on a display while anonymizing at least the faces of peoplewithin the at least one protected group of people and not anonymizingthe faces of people within the at least one unprotected group of people.In some cases, the at least one protected group of people include one ormore employee classifications while the at least one unprotected groupof people may include one or more other employee classifications. As anexample, the at least one unprotected group of people may includesecurity officers. As another example, the at least one unprotectedgroup of people may include custodians and/or housekeeping individuals.

FIG. 13 is a flow diagram showing an illustrative method 140 ofdisplaying video surveillance footage that can includes footage ofpeople, where the people include at least one protected group of peoplethat are to remain anonymized when displaying the video surveillancefootage and at least one unprotected group of people that are not to beanonymized when displaying the video surveillance footage. As indicatedat block 132, the video surveillance footage may be analyzed todetermine whether each of a plurality of people within the videosurveillance footage belong to the at least one protected group ofpeople or the at least one unprotected group of people. In someinstances, determining that some of the plurality of people belong tothe at least one unprotected group of people may be based at least parton one or more identifiable features of what the people are wearing.

As indicated at block 134, the video surveillance footage may bedisplayed on a display while anonymizing at least the faces of peoplewithin the at least one protected group of people and not anonymizingthe faces of people within the at least one unprotected group of people.In some cases, as indicated at block 142, facial recognition may be usedto help determine whether a person belongs to the at least one protectedgroup of people or the at least one unprotected group of people.

In some cases, there may be a desire to protect the identity of motorvehicles as well. FIG. 14 is a flow diagram showing an illustrativemethod 150 of displaying video surveillance footage that can includesfootage of motor vehicles having license plates. In some cases, vehiclesmay be detected using background subtraction or AI-based vehicledetection. As indicated at block 152, the video surveillance footage maybe analyzed to identify vehicles that fall into a protected group forwhich license plates are anonymized and vehicles that fall into anunprotected group for which license plates are allowed to be viewed whendisplaying the video surveillance footage.

In some cases, identifying the vehicles may include identifying anindicator displayed by the vehicle that signifies that the vehiclebelongs to the unprotected group. The indicator may be an indicia thatis placed on the vehicle. The indicator may be a sticker that includes arecognizable indicia. For example, the recognizable indicia may be acompany name, or a company logo. The indicator may simply be the licenseplate of each vehicle. As indicated at block 154, the video surveillancefootage may be displayed while anonymizing license plates for vehiclesin the protected group and not anonymizing license plates for vehiclesin the unprotected group.

FIG. 15 is a flow diagram of an illustrative method 160 of displayingvideo surveillance footage that includes footage of motor vehicleshaving license plates, the motor vehicles including vehicles associatedwith an entity and vehicles not associated with the entity. As indicatedat block 162, the video surveillance footage may be analyzed todetermine which vehicles are associated with the entity and whichvehicles that are not associated with the entity. In some cases,determining which vehicles are associated with the entity may includeidentifying an indicia placed on the vehicle. The indicia may include asticker bearing a company name or logo. The indicia may, for example, bethe license plate of each vehicle.

As indicated at block 164, the video surveillance footage may bedisplayed with license plates attached to vehicles that are associatedwith the entity obscured and license plates attached to vehicles thatare not associated with the entity are not obscured. For example,vehicles that are associated with the entity may include vehicles drivenby employees of a corporate entity. The vehicles that are associatedwith the entity may include vehicles owned by a corporate entity. Thevehicles that are not associated with the entity may include vehiclesdriven by visitors. In some instances, all license plates may beobscured. In some cases, all license plates may be displayed. These arejust examples.

FIG. 16 is a flow diagram showing an illustrative method 170 ofdisplaying video surveillance footage that includes footage of one ormore individuals who should be identifiable in the footage whileremaining people should be anonymized in the footage when displayed. Asindicated at block 172, the video surveillance footage may be analyzedto identify the one or more individuals who should be identified. Insome cases, identifying the one or more individuals who should beidentifiable may include using facial recognition. As indicated at block174, the video surveillance footage may be analyzed to locate possiblefaces to anonymize. In some instances, locating possible faces toanonymize may include using facial recognition. Locating possible facesto anonymize may, for example, include using background subtraction tolocate possible movement, where movement may be denoted as possiblyindicating a person. Locating possible faces to anonymize may includeusing color matching to locate possible human skin tones.

As indicated at block 176, the video surveillance footage may bedisplayed with the one or more individuals who should be identified withtheir faces not anonymized and with other faces anonymized. Theindividuals who should be identifiable in the footage may include one ormore individuals accused of a crime, and faces to anonymize may includeone or more victims of the crime. The individuals who should beidentifiable in the footage may include one or more visitors, and facesto anonymize may include employees.

In some cases, video footage may be analyzed over a length of videofootage, covering a period of time, when analyzing the videosurveillance footage. When an individual is identified at two or moredistinct times within a length of video footage, that individual may bedeemed to be identified at all points within the length of videofootage. In some cases, that individual is not anonymized at all at anytime during the length of video footage when that individual isdetermined to be one of the one or more individuals who should beidentifiable and is otherwise anonymized at all times during the lengthof video footage when that individual is not one of the one or moreindividuals who should be identifiable.

FIG. 17 is a flow diagram showing an illustrative method 180 of traininga video monitoring system that is used to display video surveillancefootage so that a security officer may view the video surveillancefootage, the video monitoring system configured to selectively anonymizeat least some of the people who are visible in the video surveillancefootage. As indicated at block 182, videos of people may be provided tothe video monitoring system as training data so that the videomonitoring system can learn identities of the people in the videos.Matched images of faces in surveillance videos may be added to thetraining data as indicated at block 184. As indicated at block 186, insome cases, more recent images and corresponding identifications aregiven a greater weight when attempting to identify a person.

FIG. 18 is a flow diagram showing an illustrative method 190 that may beused by the video monitoring system 30 when tracking one or more peoplewithin a video. As indicated at block 192, skin color detection may beperformed on an input video or input images. Any pixels that appear tobe a color that matches a possible human skin color may be anonymized.Separately, and as indicated at block 194, facial recognition may beperformed on at least some of the individuals shown in the input videoor input images. In some cases, and as noted at block 196, the faces ofindividuals who need to be visible may be provided to the facialrecognition system. As indicated at block 198, face tracking may beperformed for detected and recognized faces. A back tracking algorithmmay be used, as indicated at block 200. For example, if a person is seenthrough a number of frames, but is not positively identified until asubsequent frame, that identification is used to label previous frameswithin a track. As an illustrative but non-limiting example, say a faceis detected at frame F, but is not identified until frame F+10. In thissituation, the detected face is replaced with the person's Person IDand/or name within each frame beginning with Frame F. As indicated atblock 202, the system may obtain all regions that include valid PersonIDs. These may be considered as being the faces in the image(s) of thelisted people (as referenced at block 196). As indicated at block 204,the regions with valid Person IDs may be un-anonymized while all otherimages remain anonymized.

Additional Examples

An example of the disclosure includes a method of providing privacy toindividuals shown in video surveillance footage while viewing the videosurveillance footage on a surveillance monitoring system, wherein thevideo surveillance footage includes a monitor, a keyboard, and a camera.The method includes displaying the video surveillance footage on themonitor, the video surveillance footage including identifiable facesthat are displayed without being anonymized and the camera of thesurveillance monitoring system monitoring a space within viewing sightof the monitor. The surveillance monitoring system detects any viewingfaces visible within the viewing sight of the monitor and determineswhether the detected viewing faces belong to authorized individuals whoare authorized to view video surveillance footage on the monitor or ifany of the detected viewing faces belong to individuals who are notauthorized to view video surveillance footage on the monitor. When thedetected viewing faces belong only to authorized individuals, indicatingthat there were no unauthorized individuals detected, the surveillancemonitoring system continues to display the video surveillance footagethat includes identifiable faces without anonymizing the identifiablefaces. When the detected viewing faces also include unauthorizedindividuals, the surveillance monitoring system continues to display thevideo surveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage.

Alternatively or additionally, the method may further include thesurveillance monitoring system issuing an alert that an unauthorizedindividual is within viewing sight of the monitor.

Alternatively or additionally, the alert may include an auditory alertand/or a visible alert.

Alternatively or additionally, the camera may include a video cameraaimed at the space within viewing sight of the monitor.

Alternatively or additionally, the surveillance monitoring system mayanalyze a video feed from a video camera to detect any viewing facesvisible within the viewing sight of the monitor.

Alternatively or additionally, the method may further includeanonymizing any identifiable faces seen in the video surveillancefootage and issuing an alert when a determination is made that the videofeed from the video camera is disrupted.

Alternatively or additionally, the method may further include the videomonitoring system anonymizing any identifiable faces visible in thevideo surveillance footage displayed on the monitor when one or moreviewing faces cannot be reliably identified, but are not indicated asbelonging to individuals who are authorized to view video surveillancefootage on the monitor.

Alternatively or additionally, the method may further include making asecondary check for an unauthorized individual viewing the videosurveillance footage.

Alternatively or additionally, making the secondary check may includecomparing an identification of an operator at the monitor and keyboardas identified via facial recognition with log in credentials used by theoperator to log into the video monitoring system.

Alternatively or additionally, making the secondary check may includemonitoring the operator's key strokes, and comparing the operator's keystrokes to a known key stroke pattern for a particular authorizedoperator as identified via facial recognition and/or via their log incredentials.

Another example of the disclosure includes a video monitoring systemconfigured to provide privacy for individuals shown in videosurveillance footage while displaying the video surveillance footage onthe video monitoring system. The video monitoring system includes amonitor configured to display video surveillance footage, a keyboard, avideo camera that is aimed at a space in front of the monitor and thekeyboard and a controller operably coupled to the monitor and to thekeyboard, the controller configured to control display of videosurveillance footage on the monitor. The controller is furtherconfigured to identify faces detected by the video camera aimed at thespace in front of the monitor and the keyboard in order to ascertain anidentity of an operator using the monitor and keyboard as well as toascertain whether there are any unauthorized individuals possiblyviewing the video surveillance footage displayed on the monitor. Thecontroller is further configured to display video surveillance footageon the monitor, including showing one or more identifiable faces in thevideo surveillance footage, when no unauthorized individuals aredetected and to anonymize one or more identifiable faces in the videosurveillance footage when one or more unauthorized individuals aredetected.

Alternatively or additionally, the controller may be further configuredto capture log in credentials used by the operator and match the log incredentials with the identity of the operator as determined byidentifying a face of the operator.

Alternatively or additionally, the controller may be further configuredto capture keystrokes of the operator to identify a keystroke pattern,and compare the identified keystroke pattern with a historical keystrokepattern for the operator as determined by identifying a face of theoperator.

Alternatively or additionally, the controller may be further configuredto anonymize one or more identifiable faces in the video surveillancefootage displayed on the monitor in response to a detected tamperingwith the video camera that is aimed at the space in front of the monitorand the keyboard.

Alternatively or additionally, the controller may be further configuredto issue an alert when an unauthorized individual is detected withinviewing sight of the monitor.

Another example of the disclosure includes a method of displaying videosurveillance footage on a monitor that can include footage of people,where the people include at least one protected group of people that areto remain anonymized when displaying the video surveillance footage toan operator and at least one unprotected group of people that are not tobe anonymized when displaying the video surveillance footage to theoperator. The method includes analyzing the video surveillance footageto identify one or more people that belong to the at least one protectedgroup and/or one or more people that belong to the at least oneunprotected group and displaying the video surveillance footage on adisplay while anonymizing at least the faces of people within the atleast one protected group of people and not anonymizing the faces ofpeople within the at least one unprotected group of people.

Alternatively or additionally, the method may further includedetermining whether an unauthorized person is in viewing sight of themonitor, and if so, anonymizing the faces of people within the at leastone unprotected group of people.

Alternatively or additionally, a person's job category may determinewhether they are in the at least one protected group of people or the atleast one unprotected group of people.

Alternatively or additionally, a person's legal status may determinewhether they are in the at least one protected group of people or the atleast one unprotected group of people.

Alternatively or additionally, a blacklisted person may be in the atleast one unprotected group of people.

Another example of the disclosure includes a method of displaying videosurveillance footage that can includes footage of people, where thepeople include at least one protected group of people that are to remainanonymized when displaying the video surveillance footage and at leastone unprotected group of people that are not to be anonymized whendisplaying the video surveillance footage. The method includes analyzingthe video surveillance footage to determine whether each of a pluralityof people within the video surveillance footage belong to the at leastone protected group of people or the at least one unprotected group ofpeople, and determining that some of the plurality of people belong tothe at least one unprotected group of people is based at least part onone or more identifiable features of what the people are wearing. Themethod includes displaying the video surveillance footage on a displaywhile anonymizing at least the faces of people within the at least oneprotected group of people and not anonymizing the faces of people withinthe at least one unprotected group of people.

Alternatively or additionally, the at least one protected group ofpeople may include one or more employee classifications.

Alternatively or additionally, the at least one unprotected group ofpeople may include one or more other employee classifications.

Alternatively or additionally, the one or more identifiable features ofwhat the people are wearing may include a badge.

Alternatively or additionally, the one or more identifiable features ofwhat the people are wearing may include a uniform.

Alternatively or additionally, the method further includes using facialrecognition to help determine whether a person belongs to the at leastone protected group of people or the at least one unprotected group ofpeople.

Alternatively or additionally, the at least one unprotected group ofpeople may include security officers.

Alternatively or additionally, the at least one unprotected group ofpeople may include custodians and/or housekeeping individuals.

Alternatively or additionally, determining that some of the plurality ofpeople belong to the at least one protected group of people may be basedupon one or more identifiable features of what the people are wearing.

Another example of the disclosure includes a method of displaying videosurveillance footage that can include footage of motor vehicles havinglicense plates. The method includes analyzing the video surveillancefootage to identify vehicles that fall into a protected group for whichlicense plates are anonymized and vehicles that fall into an unprotectedgroup for which license plates are allowed to be viewed when displayingthe video surveillance footage and displaying the video surveillancefootage while anonymizing license plates for vehicles in the protectedgroup and not anonymizing license plates for vehicles in the unprotectedgroup. Identifying the vehicles includes identifying an indicatordisplayed by the vehicle that signifies that the vehicle belongs to theunprotected group.

Alternatively or additionally, the indicator may include an indiciaplaced on the vehicle.

Alternatively or additionally, the indicator may include a stickerbearing a recognizable indicia.

Alternatively or additionally, the indicator may include the licenseplate of each vehicle.

Another example of the disclosure includes a method of displaying videosurveillance footage that includes footage of motor vehicles havinglicense plates, the motor vehicles including vehicles associated with anentity and vehicles not associated with the entity. The method includesanalyzing the video surveillance footage to determine which vehicles areassociated with the entity and which vehicles that are not associatedwith the entity and displaying the video surveillance footage withlicense plates attached to vehicles that are associated with the entitynot obscured and license plates attached to vehicles that are notassociated with the entity being obscured.

Alternatively or additionally, vehicles that are associated with theentity may include vehicles driven by employees of a corporate entity.

Alternatively or additionally, vehicles that are associated with theentity may include vehicles owned by a corporate entity.

Alternatively or additionally, vehicles that are not associated with theentity may include vehicles driven by visitors.

Alternatively or additionally, determining which vehicles are associatedwith the entity may include identifying an indicia placed on thevehicle.

Alternatively or additionally, the indicia may include a sticker bearinga company name.

Alternatively or additionally, the indicia may include the license plateof each vehicle.

Another example of the disclosure includes a method of displaying videosurveillance footage that includes footage of one or more individualswho should be identifiable in the footage while remaining people shouldbe anonymized in the footage when displayed. The method includesanalyzing the video surveillance footage to identify the one or moreindividuals who should be identified, analyzing the video surveillancefootage to locate possible faces to anonymize and displaying the videosurveillance footage with the one or more individuals who should beidentified with their faces not anonymized and with other facesanonymized.

Alternatively or additionally, identifying the one or more individualswho should be identifiable may include using facial recognition.

Alternatively or additionally, locating possible faces to anonymize mayinclude using facial recognition.

Alternatively or additionally, locating possible faces to anonymize mayinclude using background subtraction to locate possible movement, wheremovement is denoted as possibly indicating a person.

Alternatively or additionally, locating possible faces to anonymize mayinclude using color matching to locate possible human skin tones.

Alternatively or additionally, individuals who should be identifiable inthe footage may include one or more individuals accused of a crime, andfaces to anonymize may include one or more victims of the crime.

Alternatively or additionally, individuals who should be identifiable inthe footage may include one or more visitors, and faces to anonymize mayinclude employees.

Alternatively or additionally, video footage may be analyzed over alength of video footage, covering a period of time, when analyzing thevideo surveillance footage.

Alternatively or additionally, when an individual is identified at twoor more distinct times within a length of video footage, that individualmay be deemed to be identified at all points within the length of videofootage.

Alternatively or additionally, an individual may not be anonymized atall at any time during the length of video footage when that individualis determined to be one of the one or more individuals who should beidentifiable and is otherwise anonymized at all times during the lengthof video footage when that individual is not one of the one or moreindividuals who should be identifiable.

Another example of the disclosure includes a video monitoring systemthat is configured to display video surveillance footage so that asecurity officer may view the video surveillance footage, the videomonitoring system configured to selectively anonymize at least some ofthe people who are visible in the video surveillance footage. The videomonitoring system includes a people detection module that is configuredto receive video surveillance footage from one or more cameras, and toanalyze the footage to identify one or more of people in the videosurveillance footage. The video monitoring system includes a selectiveanonymization module that is configured to selectively anonymize one ormore of the people identified in the video surveillance footage based onone or more predetermined criteria.

Alternatively or additionally, the selective anonymization module may beconfigured to receive information pertaining to people who should not beanonymized.

Alternatively or additionally, the people who should not be anonymizedmay include people accused of a crime.

Alternatively or additionally, the people who should not be anonymizedmay include visitors.

Alternatively or additionally, the selective anonymization module may beapplied when displaying the video surveillance footage via the videomonitoring system and does not alter the original video surveillancefootage.

Alternatively or additionally, the people detection module may usebackground subtraction to identify moving objects, where moving objectsmay be people.

Alternatively or additionally, the people detection module may use colordetection to detect colors that may represent a skin color.

Alternatively or additionally, the selective anonymization module may beconfigured to pixelate portions of images that are believed tocorrespond to faces of people to be anonymized.

Alternatively or additionally, the selective anonymization module may beconfigured to fuzzball portions of images that are believed tocorrespond to faces of people to be anonymized.

Another example of the disclosure includes a method of training a videomonitoring system that is used to display video surveillance footage sothat a security officer may view the video surveillance footage, thevideo monitoring system configured to selectively anonymize at leastsome of the people who are visible in the video surveillance footage.The method includes providing videos of people to the video monitoringsystem as training data so that the video monitoring system can learnidentities of the people in the videos and adding matched images offaces in surveillance videos to the training data. More recent imagesand corresponding identifications may be given a greater weight whenattempting to identify a person.

Having thus described several illustrative embodiments of the presentdisclosure, those of skill in the art will readily appreciate that yetother embodiments may be made and used within the scope of the claimshereto attached. It will be understood, however, that this disclosureis, in many respects, only illustrative. Changes may be made in details,particularly in matters of shape, size, arrangement of parts, andexclusion and order of steps, without exceeding the scope of thedisclosure. The disclosure's scope is, of course, defined in thelanguage in which the appended claims are expressed.

What is claimed is:
 1. A method of providing privacy to individualsshown in video surveillance footage while viewing the video surveillancefootage on a surveillance monitoring system, wherein the videosurveillance footage includes a monitor, a keyboard, and a camera, themethod comprising: displaying the video surveillance footage on themonitor, the video surveillance footage including identifiable facesthat are displayed without being anonymized; the camera of thesurveillance monitoring system monitoring a space within viewing sightof the monitor; the surveillance monitoring system detecting any viewingfaces visible within the viewing sight of the monitor and determiningwhether the detected viewing faces belong to authorized individuals whoare authorized to view video surveillance footage on the monitor or ifany of the detected viewing faces belong to individuals who are notauthorized to view video surveillance footage on the monitor; when thedetected viewing faces belong only to authorized individuals, indicatingthat there were no unauthorized individuals detected, the surveillancemonitoring system continues to display the video surveillance footagethat includes identifiable faces without anonymizing the identifiablefaces; and when the detected viewing faces also include unauthorizedindividuals, the surveillance monitoring system continues to display thevideo surveillance footage, but the surveillance monitoring systemautomatically anonymizes one or more of the identifiable faces seen inthe video surveillance footage.
 2. The method of claim 1, furthercomprising the surveillance monitoring system issuing an alert that anunauthorized individual is within viewing sight of the monitor.
 3. Themethod of claim 2, wherein the alert comprises an auditory alert and/ora visible alert.
 4. The method of claim 1, wherein the camera comprisesa video camera aimed at the space within viewing sight of the monitor.5. The method of claim 4, wherein the surveillance monitoring systemanalyzes a video feed from a video camera to detect any viewing facesvisible within the viewing sight of the monitor.
 6. The method of claim5, further comprising anonymizing any identifiable faces seen in thevideo surveillance footage and issuing an alert when a determination ismade that the video feed from the video camera is disrupted.
 7. Themethod of claim 1, further comprising: when one or more viewing facescannot be reliably identified, but are not indicated as belonging toindividuals who are authorized to view video surveillance footage on themonitor, the video monitoring system anonymizing any identifiable facesvisible in the video surveillance footage displayed on the monitor. 8.The method of claim 1, further comprising making a secondary check foran unauthorized individual viewing the video surveillance footage. 9.The method of claim 8, wherein making the secondary check comprisescomparing an identification of an operator at the monitor and keyboardas identified via facial recognition with log in credentials used by theoperator to log into the video monitoring system.
 10. The method ofclaim 9, wherein making the secondary check comprises monitoring theoperator's key strokes, and comparing the operator's key strokes to aknown key stroke pattern for a particular authorized operator asidentified via facial recognition and/or via their log in credentials.11. A video monitoring system configured to provide privacy forindividuals shown in video surveillance footage while displaying thevideo surveillance footage on the video monitoring system, the videomonitoring system comprising: a monitor configured to display videosurveillance footage; a keyboard; a video camera that is aimed at aspace in front of the monitor and the keyboard; a controller operablycoupled to the monitor and to the keyboard, the controller configured tocontrol display of video surveillance footage on the monitor; thecontroller further configured to: identify faces detected by the videocamera aimed at the space in front of the monitor and the keyboard inorder to ascertain an identity of an operator using the monitor andkeyboard as well as to ascertain whether there are any unauthorizedindividuals possibly viewing the video surveillance footage displayed onthe monitor; display video surveillance footage on the monitor,including showing one or more identifiable faces in the videosurveillance footage, when no unauthorized individuals are detected; andanonymizing one or more identifiable faces in the video surveillancefootage when one or more unauthorized individuals are detected.
 12. Thevideo monitoring system of claim 11, wherein the controller is furtherconfigured to capture log in credentials used by the operator and matchthe log in credentials with the identity of the operator as determinedby identifying a face of the operator.
 13. The video monitoring systemof claim 11, wherein the controller is further configured to capturekeystrokes of the operator to identify a keystroke pattern, and comparethe identified keystroke pattern with a historical keystroke pattern forthe operator as determined by identifying a face of the operator. 14.The video monitoring system of claim 11, wherein the controller isfurther configured to anonymize one or more identifiable faces in thevideo surveillance footage displayed on the monitor in response to adetected tampering with the video camera that is aimed at the space infront of the monitor and the keyboard.
 15. The video monitoring systemof claim 11, wherein the controller is further configured to issue analert when an unauthorized individual is detected within viewing sightof the monitor.