Title: StealthGuard: a new framework of privacy-preserving human action recognition

Authors: Gazi Mohammad Ismail; Xueping Zhang; Junxiang Yang; Bin Li

Addresses: Computer Science and Technology, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, Henan, China ' Computer Science and Technology, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, Henan, China ' Computer Science and Technology, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, Henan, China ' Computer Science and Technology, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, Henan, China

Abstract: Privacy-preserving human action recognition is a crucial area of research, particularly in the context of video surveillance, assisted living systems, and healthcare applications. While human action recognition techniques offer significant benefits for automated video analysis, they also raise concerns about individual privacy when deployed in sensitive environments. This paper introduces, StealthGuard incorporates a temporal privacy-preserving component based on generative adversarial networks (GANs) to obfuscate sensor data, thereby preventing the identification of individual people or their activities. This approach utilises deep neural network, ensuring both accuracy in action recognition and real-time deployment feasibility. Through extensive experimental results, StealthGuard demonstrates its ability to achieve high levels of privacy protection while maintaining recognition accuracy making it a promising solution for applications where privacy is paramount. This paper also provides a related works in the field, highlighting approaches and techniques for privacy-preserving human action recognition.

Keywords: human action recognition; HAR; privacy preserving; generative adversarial network; GAN; image segmentation; convolutional neural network; CNN; recurrent neural network; RNN; video automation; anomaly detection; information security.

DOI: 10.1504/IJICS.2025.146882

International Journal of Information and Computer Security, 2025 Vol.27 No.2, pp.240 - 260

Received: 21 May 2024
Accepted: 16 Oct 2024

Published online: 24 Jun 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article