SlideShare una empresa de Scribd logo
1 de 71
1




             Privacy protection
            of visual information

                        Touradj Ebrahimi
                    touradj.ebrahimi@epfl.ch
                               MediaSense 2012
                                 Dublin, Ireland
                                21-22 May 2012

Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Video surveillance popularity              2



• Rise in terrorism and crime
   – Globalization of good and bad
• Political
   – Perception that the problem of crime and terrorism is
     addressed
• Business and economy
   – New revenue models
   – Cost issues




   Multimedia Signal Processing Group
   Swiss Federal Institute of Technology, Lausanne
Potential abuses in video surveillance                                 3


• Criminal abuse
  – Criminal misuse by law enforcement officers
  – Police official gathering information on a gay club to blackmail patrons
• Institutional abuse
  – Spy upon and harass political activists (Civil Rights, Vietnam war)
  – Surveillance of political demonstrations
• Personal usage
  – Police officers helping friends stalk women, track estranged girlfriends/
    spouses
• Discrimination
  – Racial discrimination towards people of color
• Voyeurism
  – Bored male operators spying on women
  – Footage of public cameras made publicly available


  Multimedia Signal Processing Group
  Swiss Federal Institute of Technology, Lausanne
Civil liberty and right to privacy         4


• Increased resistance to video surveillance
• Several countries have set up or are in the process of
  setting up directives and guidelines to regulate video
  surveillance
  – EU – Directive 95/46/EC




   Multimedia Signal Processing Group
   Swiss Federal Institute of Technology, Lausanne
World Trade Center, 9/11                                       5



                                      filmed by a Gas Station
                                      surveillance camera on
                                      September 10, 2001




                                                                filmed by an ATM
                                                                surveillance camera on
                                                                September 10, 2001
Mohamed Atta

      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
Attack on London underground, July 7, 2005                       6




                                On a reconnaissance mission two
                                weeks before the attack
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Plot to attack trains in Germany, August 2006    7




Two unexploded bombs found in
luggage aboard two trains


Both terrorists have been arrested
thanks to the video footage




     Multimedia Signal Processing Group
     Swiss Federal Institute of Technology, Lausanne
Proliferation of video surveillance applications                   8


• Surveillance of sensitive locations
    – Embassies, airports, nuclear plants, military zone, border
       control, …
• Intrusion detection
    – Residential surveillance, retail surveillance, …
• Traffic control
    – Speed control
• Access to places
    – Car license plate recognition in cities
• Event detection
    – Child/Elderly care
• Marketing/statistics
    – Customers habits
    – Number of visitors
• …
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Forensic video – legal admissibility                   9


• If the image is not inherently reliable, its admissibility in court is
  questionable
• If a poor image is ruled admissible, it will be afforded little or no
  weight
• For an image to be admissible, the prosecutor must prove that the
  image has not been altered
   – Lossy compression
   – Conditional replenishment
   – Enhancement
• Original versus copy
   – Any digital image can be thought of as being ‘the original’




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
10
                  Video surveillance dimensions

•   Technology
•   Business
•   Legal
•   Social




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Video surveillance technologies      11


• First generation
    – Analog
    – CCTV
    – Recording
• Second generation
    – Digital/Hybrid
    – Recording
    – Computerized
    – IP wired/wireless




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Video surveillance technologies      12


• Third generation
    – Content analysis
    – Biometrics
    – Search
    – Unusual event detection
• Forth generation
    – Pervasive
    – Distributed
    – Invisible
    – Multi-view
    – Ultra high definition




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
13
           Main security tools in video surveillance

• Encryption
    – Secure communication
    – Conditional access
• Integrity verification
    – Digital signature
    – Proof for lack of manipulation after capture




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
14
Alternatives to implement video surveillance with privacy

   • Fully automatic surveillance without intervention of
      human operators
       – False positives and false negatives
   • Encrypting the whole video
       – Not good for monitoring
   • Distorting/blocking sensitive regions
       – Impact on intelligibility
   • Reversible encryption/scrambling of sensitive regions
      with a key
       – Identification can take place when crime happens
   • Legal and best practices in video surveillance
       – Recorded materials locked in secure locations
   • Only extract/record needed information from the scene
       – MPEG-7 visual descriptors
   Multimedia Signal Processing Group
   Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                   15




                                                  Video +
                                                  Metadata
                                                  Recording




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Smart video surveillance                            15




                                                           Video +
                                                           Metadata
                                                           Recording




                                                  […011001…]




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Example: Smart video surveillance       16




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
17
                  Privacy-sensitive visual information


• Predefined zones
   –   Windows, doors
   –   Bank teller
   –   Casino playing tables
   –   …

• Automatic identification of Regions of Interest (ROI)
   –   People in the scene
   –   Human faces
   –   Cars license plates
   –   Moving objects
   –   …




    Multimedia Signal Processing Group
    Swiss Federal Institute of Technology, Lausanne
18
       Legacy solutions to visual privacy protection

• Masking
• Blur
• Pixelization




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
19
                                    Masking




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
20
                                       Blur




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
21
                                 Pixelization




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
22
        More recent solutions for privacy protection

• (ROI) Encryption
• (ROI) Scrambling




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
23
                      ROI selective encryption




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
24
                      ROI selective decryption




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
ROI selective scrambling     25




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Bitstream encryption                     26


• Selective encryption of the bitstream at packet level
• One or more secret keys
• Symmetric encryption
   – Packet body
   – Block cipher: e.g. AES

                          packet


                                                    private key
                       encrypted
                       packet




  Multimedia Signal Processing Group
  Swiss Federal Institute of Technology, Lausanne
Scrambling approaches                                        27


• Image-domain
   – Randomly flip bits in one or more bit planes



             image      Scrambling        Transform   Entropy Coding   bitstream


                                                            Encoder



• Pros
   – Very simple
   – Independent from the subsequent encoding scheme
   – Does not affect the bitstream syntax → standard compliance
• Cons
   – Significantly alter statistics of video signal
   – Ensuing compression less efficient


  Multimedia Signal Processing Group
  Swiss Federal Institute of Technology, Lausanne
Scrambling approaches                                          28


• Transform-domain
  – Randomly flip sign of transform coefficients


             image         Transform       Scrambling   Entropy Coding   bitstream


                                                              Encoder


• Pros
  – Does not adversely affect subsequent entropy coding
  – Strength of scrambling can be controlled
  – Does not affect the bitstream syntax → standard compliance
• Cons
  – Must be integrated inside the encoder




  Multimedia Signal Processing Group
  Swiss Federal Institute of Technology, Lausanne
Scrambling approaches                                         29


• Bitstream-domain
   – Randomly flip bits in bitstream



                image        Transform      Entropy Coding   Scrambling   bitstream


                                                  Encoder




• Pros
   – Applied on bitstream after encoding
• Cons
   – Require parsing of bitstream
   – Difficult to guarantee syntax remains compliant and will not crash a
     decoder



  Multimedia Signal Processing Group
  Swiss Federal Institute of Technology, Lausanne
30
                                                    Scrambling in JPEG

                                (a)                                                 (b)                       DC




                                                                                                                      pseudo-randomly
                                                                                                  PRNG
                                                                                                                        inverse sign

                                                                                          seed


                                                                                                 assymetric               scrambled
                                                                                                 encryption              codestream



                                                                                                         public key




                                (c)                       DC                        (d)                       DC




                                                                  pseudo-randomly                                     pseudo-randomly
                                              PRNG                                                PRNG
                                                                    inverse sign                                        inverse sign

                                      seed                                                seed


                                             assymetric               scrambled                  assymetric               scrambled
                                             encryption              codestream                  encryption              codestream



                                                     public key                                          public key




                                                        Figure 4 – AC coefficients scrambling:
                             (a) 63 AC coefficients, (b) 60 AC coefficients, (c) 55 AC coefficients, (d) 48 AC coefficients.


                 Straightforwardly, as the scrambling is merely flipping signs of selected coefficients, the technique requires negligible
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, scrambled region is restricted to match the 8x8 DCT blocks
          computational complexity. Clearly, the shape of the
                                                              Lausanne
               boundaries.
31
                          Scrambling in JPEG




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG 2000 (JPSEC)                                                                                             32


    •       Codeblock-based bitstream domain scrambling
    image
               wavelet    quantizer    selective   arithmetic             Encoder               codestream
                                                                                                              selective           scrambled    Decoder
             transform                scrambling      coder                                                  scrambling           codestream
                                                              scrambled
                                                             codestream
                                        PRNG        JPSEC                  JPSEC                               PRNG        JPSEC                JPSEC
                                                    syntax                 codestream                                      syntax               codestream
                                                           encrypted                                                             encrypted
                                                           seed                                                                  seed

                                        seed       encryption                                                 seed        encryption





    Preserve the markers in the bitstream; do not introduce erroneous markers
     
 x=current byte, y=preceding byte
     1. If x=0xFF, no modification
     2. If y=0xFF                                                                           
       where m is an 8-bit pseudo-
                                                                                                    random number in [0x00,0x8F]

     3. Otherwise                                                                       
           where n is an 8-bit pseudo-
                                                                                                    random number in [0x00,0xFE]

             Multimedia Signal Processing Group
             Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG 2000 (JPSEC)                                                                                                             33


        • ROI-based wavelet domain scrambling
                  – Arbitrary-shape regions
        • Exploit ROI mechanisms in JPEG 2000
                      wavelet            quantizer
                                                                                Encoder
           image
                     transform


                                                  no           resolution         yes
                                                                 level l
                                                                  < TI ?                           keys         ROI-based scrambled                                  Decoder
                                                                                                                                                                     Decoder
                                                                             up-scale                            JPSEC code-stream
                                                                            code-block
                                                                             distortion           decrypt                                           arithmetic
                                                                                                   seeds                                             decoder


                                                  foreground                                                                           foreground
                                     resolution                                                seeds                                     objects
                       yes                          objects segmentation          background                 yes          resolution                                    background
                                       level l                                                                              level l                 coefficient
                                       ≥ TS ?                  mask ?                                                        ≥ TS ?                   < 2s ?
                       scramble                                             down-shift                      unscramble                                             up-shift
        PRNG                                                                                      PRNG
                        wavelet            no                                wavelet                         wavelet                                               wavelet
                                                                                                                                no
                      coefficient                                           coefficient                     coefficient                                           coefficient
seeds

        encrypt                                   arithmetic                                                                                         inverse         inv. wavelet
         seeds                                       coder                                                                                          quantizer          transform
                     ROI-based sc
                                rambled
        keys          JPSEC code-stream                                                                                                                                 image




               Multimedia Signal Processing Group
               Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG 2000        34




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
35
                        Scrambling in MPEG-4




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
36
                        Scrambling in MPEG-4




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in MPEG-4        37




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in MPEG-4        37




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in MPEG-4        37




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
38
                       Scrambling in H.264/AVC




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in H.264/AVC        39




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
40
                            An existing product




                     Scrambler                    Unscrambler




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
41
                              Scrambling in DVC
• Key frame privacy (JPEG)
   – Scrambling in the transform domain on the DCT coefficients.
   – Driven by a Pseudo-Random Number Generator (PRNG) to pseudo-
      randomly invert the sign of the DCT Coefficients.
• WZ frames




                                                           DCT scrambler
                DVC scheme with privacy protection
 Multimedia Signal Processing Group
 Swiss Federal Institute of Technology, Lausanne
42
                             Scrambling in DVC




                      a) Key frame (JPEG).   b) Wyner-Ziv transform domain scrambling.




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera                                  43




        The MPEG-7 camera describes a scene in terms of
        semantic objects and of their properties



                                                  XML scene description




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera                                44




    – Image analysis: segmentation, change detection, and tracking
      (implemented on the camera DSP).
    – MPEG-7 coder: scene description represented using MPEG-7 (XML).
    – MPEG-7 decoder: MPEG-7 description is parsed. Extraction of the
      information related to the specific applications.



Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera                                     45

                     <!-- ################################################## --!>
                     <!-- DDL output for object 4                            --!>
                     <!-- ################################################## --!>
                     <Object id="4">
                       <RegionLocator>
                         <BoxPoly> Poly </BoxPoly>
                         <Coords1> 237 222 </Coords1>
                         <Coords2> 230 252 </Coords2>
                         <Coords3> 240 286 </Coords3>
                         <Coords4> 308 287 </Coords4>
                         <Coords5> 312 284 </Coords5>
                       </RegionLocator>
XML scene              <DominantColor>
description              <ColorSpace> YUV </ColorSpace>
                         <ColorValue1> 143.4 </ColorValue1>
                         <ColorValue2> 123.3 </ColorValue2>
                         <ColorValue3> 128.2 </ColorValue3>
                       </DominantColor>
                       <HomogeneousTexture>
                         <TextureValue> 9.02 </TextureValue>
                       </HomogeneousTexture>
                       <MotionTrajectory>
                         <TemporalInterpolation>
                           <KeyFrame> 100 </KeyFrame>
                           <KeyPos> 268.6 251.7 </KeyPos>
                           <KeyFrame> 101 </KeyFrame>
                           <KeyPos> 262.8 241.0 </KeyPos>
                                      ...
                           <KeyFrame> 138 </KeyFrame>
                           <KeyPos> 192.9 79.0 </KeyPos>
                         </TemporalInterpolation>
                       </MotionTrajectory>
                     </Object>


       Multimedia Signal Processing Group
       Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera for video surveillance                         46




    original frame               segmentation mask   bounding box




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
47
                             Existing product




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
48
   Evaluation of privacy protection in video surveillance

• Serious study of performance analysis of privacy protection solutions is
  lacking
• It is paramount to validate privacy protection solutions against user and
  system requirements for privacy
• Two approaches can be used
    –   Performance analysis using subjective evaluations
    –   Performance analysis using objective metrics




    Multimedia Signal Processing Group
    Swiss Federal Institute of Technology, Lausanne
49
                                       Pixelization

• Naïve approach for privacy protection
   – Commonly used in television news and documentaries in
     order to obscure the faces of suspects, witnesses or
     bystanders to preserve their anonymity
   – Also used to censor nudity or to avoid unintentional product
     placement on television.
• Consists in noticeably reducing resolution in ROI
• Can be achieved by substituting a square block of pixels
  with its average
• Drawback
   – Integrating pixels along trajectories over time may allow to
     partly recovering the concealed information
   – Irreversible




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
50
                                    Gaussian Blur

• Naïve approach for privacy protection
• Removes details in ROI by applying a Gaussian low pass
  filter
• Image is convolved with a 2D Gaussian function




• Drawback
   – Irreversible




     Multimedia Signal Processing Group
     Swiss Federal Institute of Technology, Lausanne
51
                   Scrambling by Random Sign Inversion

• ROI-based transform-domain scrambling method
• Scrambles the quantized transform coefficients of each 4x4
  block of the ROI by pseudo-randomly flipping their sign




• Advantages
   –   Fully reversible
   –   Same scrambled stream is transmitted to all users
   –   Small impact in terms of coding efficiency
   –   Requires a low computational complexity




       Multimedia Signal Processing Group
       Swiss Federal Institute of Technology, Lausanne
52
                     Scrambling by Random Permutation

• ROI-based transform-domain scrambling method
• Random permutation to rearrange the order of transform
  coefficients in 4x4 blocks corresponding to ROI
   – Knuth shuffle to generate a permutation of n items with uniform
       random distribution




• Advantages
   –   Fully reversible
   –   Same scrambled stream is transmitted to all users
   –   Small impact in terms of coding efficiency
   –   Requires a low computational complexity




       Multimedia Signal Processing Group
       Swiss Federal Institute of Technology, Lausanne
53
                             Face Recognition - PCA

• Principal Components Analysis (PCA)
   – Also known as eigenfaces
   – A linear transformation is applied to rotate feature vectors from the initially large
     and highly correlated subspace to a smaller and uncorrelated subspace
   – PCA has shown to be effective for face recognition
      – Firstly, it can be used to reduce the dimensionality of the feature space
      – Secondly, it eliminates statistical covariance in the transformed feature space
      – In other words, the covariance matrix for the transformed feature vectors is
         always diagonal




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
54
                               Face Recognition - LDA

• Linear Discriminant Analysis (LDA)
   – LDA aims at finding a linear transformation which stresses differences between
       classes while lessening differences within classes (a class corresponds to all
       images of a given individual)
   –   The resulting transformed subspace is linearly separable between classes
   –   PCA is first performed to reduce the feature space dimensionality
   –   LDA is then applied to further decrease the dimensionality while safeguarding the
       distinctive characteristics of the classes
   –   The final subspace is obtained by multiplying the PCA and LDA basis vectors.




       Multimedia Signal Processing Group
       Swiss Federal Institute of Technology, Lausanne
55
              Face Identification and Evaluation System

• Preprocessing
   – Reduces detrimental variations between images
   – Face alignment aligned using eye coordinates
   – Pixel values equalization, contrast and brightness normalization
• Training
   – Create the subspace into which test images are subsequently projected and
     matched
   – Performed using a training set of images
• Testing
   – A distance matrix is computed in the transformed subspace for all test images
   – Euclidian distance for PCA and soft distance for LDA
   – Two image sets are defined:
      – gallery set is made of known faces
      – probe set corresponds to faces to be recognized.




     Multimedia Signal Processing Group
     Swiss Federal Institute of Technology, Lausanne
56
              Face Identification and Evaluation System

• Performance analysis
   – Generate cumulative match curve
   – For each probe image, the recognition rank is computed
      – rank 0 means that the best match is of the same subject
      – rank 1 means that the best match is from another person but the second best
         match is of the same subject
      – etc.
   – The cumulative match curve is obtained by summing the number of correct
     matches for each rank




     Multimedia Signal Processing Group
     Swiss Federal Institute of Technology, Lausanne
57
                                         Test Data

• Grayscale Facial Recognition Technology (FERET)
   – Although it is not representative of typical video surveillance footage, this
     database is widely used for face recognition research
   – We consider a subset of 3368 images of frontal faces for which eye coordinates
     are available
   – Images have 256 by 384 pixels with eight-bit per pixel
   – We further consider two series of images denoted by ‘fa’ and ‘fb’
       – ‘fa’ indicates a regular frontal image
       – ‘fb’ indicates an alternative frontal image, taken within seconds of the
         corresponding ‘fa’ image, where a different facial expression was requested
         from the subject.
• Standard training, gallery and probe sets from the FERET test
   – Training set: 501 images from the ‘fa’ series
   – Gallery set: 1196 images from the ‘fa’ series
   – Probe set: 1195 images from the ‘fb’ series




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
58
                      Performance Analysis – Attack #1

• Simple attack
   – Training and gallery sets are made of unaltered images
   – Probe set corresponds to images with privacy protection
   – In other words, altered images are merely processed by the face recognition
     algorithms without taking into account the fact that privacy protection tools have
     been applied.




                    PCA                                              LDA

      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
59
                      Performance Analysis – Attack #1

• For both PCA and LDA schemes applied on original images, recognition rate
  is superior to 70% at rank 0 (i.e. the best match is of the same subject as the
  probe), and superior to 90% at rank 50
• When applying a Gaussian blur, the performance drops radically for LDA.
  However, recognition rate remains high for PCA with 56% success at rank 0
• Pixelization fares worse. The recognition rate is 56% and 13% at rank 0 for
  PCA and LDA respectively
• Results clearly show that both region-based transform-domain scrambling
  approaches are successful at hiding identity. The recognition rate is nearly 0%
  at rank 0, and remains below 10% at rank 50, for both PCA and LDA
  algorithms. In addition, it can be observed that both random sign inversion
  and random permutation schemes achieve nearly the same performance




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
60
                      Performance Analysis – Attack #2

• More sophisticated attack
   – Privacy protection tools are now applied to all images in the training, gallery and
     probe sets
   – This corresponds to an attacker which gets access to protected data
   – Alternatively, an attacker may attempt replicating the alteration due to privacy
     protection techniques on his own training and gallery sets




                    PCA                                              LDA

      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
61
                      Performance Analysis – Attack #2

• With Gaussian blur, the performance remains nearly identical. It even
  improves slightly for LDA
• Pixelization is not much better at hiding facial information. The recognition
  rate is still 45% and 17% at rank 0 for PCA and LDA respectively
• Finally, both region-based transform-domain scrambling approaches are
  again successful at hiding identity. The recognition rate is nearly 0% at rank 0
  for both PCA and LDA algorithms.




      Multimedia Signal Processing Group
      Swiss Federal Institute of Technology, Lausanne
62
                      Thanks for your attention!




Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne

Más contenido relacionado

Destacado

ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositoriesklschoef
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an imageHarsukh Chandak
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorHugo Guyader
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibilityJeffrey Funk
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...Hakan Boz
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015klschoef
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentationPeter Smith
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Prajs Ks
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing pptashwini.jagdhane
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Codingimec.archive
 

Destacado (14)

ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an image
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer Behavior
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibility
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015
 
Region Of Interest Extraction
Region Of Interest ExtractionRegion Of Interest Extraction
Region Of Interest Extraction
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentation
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
 
Eye Tracking & Design
Eye Tracking & DesignEye Tracking & Design
Eye Tracking & Design
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Coding
 

Similar a Privacy protection of visual information

MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval2012
 
Quality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsQuality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsTouradj Ebrahimi
 
Enrichment of News Show Videos with Multimodal Semi-Automatic Analysis
Enrichment of News Show Videos with Multimodal Semi-Automatic AnalysisEnrichment of News Show Videos with Multimodal Semi-Automatic Analysis
Enrichment of News Show Videos with Multimodal Semi-Automatic AnalysisLinkedTV
 
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...Touradj Ebrahimi
 
Ivisiotech A2 Tech
Ivisiotech A2 TechIvisiotech A2 Tech
Ivisiotech A2 Techa2tech
 

Similar a Privacy protection of visual information (6)

MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
 
Quality of Experience in emerging visual communications
Quality of Experience in emerging visual communicationsQuality of Experience in emerging visual communications
Quality of Experience in emerging visual communications
 
Enrichment of News Show Videos with Multimodal Semi-Automatic Analysis
Enrichment of News Show Videos with Multimodal Semi-Automatic AnalysisEnrichment of News Show Videos with Multimodal Semi-Automatic Analysis
Enrichment of News Show Videos with Multimodal Semi-Automatic Analysis
 
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...
My talk at the ACM Multimedia 2010 panel on The Use of Non-conventional Means...
 
Ivisiotech A2 Tech
Ivisiotech A2 TechIvisiotech A2 Tech
Ivisiotech A2 Tech
 
La Bretagne au Milipol 2017
La Bretagne au Milipol 2017La Bretagne au Milipol 2017
La Bretagne au Milipol 2017
 

Más de Touradj Ebrahimi

An overview of fake media and its evolution
An overview of fake media and its evolutionAn overview of fake media and its evolution
An overview of fake media and its evolutionTouradj Ebrahimi
 
An overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesAn overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesTouradj Ebrahimi
 
The next generation JPEG standards
The next generation JPEG standardsThe next generation JPEG standards
The next generation JPEG standardsTouradj Ebrahimi
 
ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"Touradj Ebrahimi
 
ICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeTouradj Ebrahimi
 
Realization of Enhanced Reality Mobile Communication
Realization of Enhanced Reality  Mobile CommunicationRealization of Enhanced Reality  Mobile Communication
Realization of Enhanced Reality Mobile CommunicationTouradj Ebrahimi
 
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionJPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionTouradj Ebrahimi
 
Overview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesOverview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesTouradj Ebrahimi
 
A manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoA manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoTouradj Ebrahimi
 
Beyond Quality of Experience
Beyond Quality of ExperienceBeyond Quality of Experience
Beyond Quality of ExperienceTouradj Ebrahimi
 
Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Touradj Ebrahimi
 
Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Touradj Ebrahimi
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networksTouradj Ebrahimi
 
Towards 3D visual quality assessment for future multimedia
Towards 3D visual quality assessment for future  multimediaTowards 3D visual quality assessment for future  multimedia
Towards 3D visual quality assessment for future multimediaTouradj Ebrahimi
 
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Touradj Ebrahimi
 
What future for image/video compression
What future for image/video compressionWhat future for image/video compression
What future for image/video compressionTouradj Ebrahimi
 
3DTV - Past, Present and Future
3DTV - Past, Present and Future3DTV - Past, Present and Future
3DTV - Past, Present and FutureTouradj Ebrahimi
 
Towards second generation expert systems in telepathology for aid in diagnosis
Towards second generation expert systems in telepathology for aid in diagnosisTowards second generation expert systems in telepathology for aid in diagnosis
Towards second generation expert systems in telepathology for aid in diagnosisTouradj Ebrahimi
 

Más de Touradj Ebrahimi (20)

An overview of fake media and its evolution
An overview of fake media and its evolutionAn overview of fake media and its evolution
An overview of fake media and its evolution
 
An overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activitiesAn overview of recent and ongoing JPEG standardisation activities
An overview of recent and ongoing JPEG standardisation activities
 
The next generation JPEG standards
The next generation JPEG standardsThe next generation JPEG standards
The next generation JPEG standards
 
ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"ICIP2016 Panel on "Is compression dead or are we wrong again?"
ICIP2016 Panel on "Is compression dead or are we wrong again?"
 
ICIP2016 image compression grand challenge
ICIP2016 image compression grand challengeICIP2016 image compression grand challenge
ICIP2016 image compression grand challenge
 
Realization of Enhanced Reality Mobile Communication
Realization of Enhanced Reality  Mobile CommunicationRealization of Enhanced Reality  Mobile Communication
Realization of Enhanced Reality Mobile Communication
 
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image CompressionJPEG PLENO - Towards a New Standard for Plenoptic Image Compression
JPEG PLENO - Towards a New Standard for Plenoptic Image Compression
 
JPEG emerging standards
JPEG emerging standardsJPEG emerging standards
JPEG emerging standards
 
Overview of JPEG standardization committee activities
Overview of JPEG standardization committee activitiesOverview of JPEG standardization committee activities
Overview of JPEG standardization committee activities
 
A manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG PlenoA manifesto on the future of image coding - JPEG Pleno
A manifesto on the future of image coding - JPEG Pleno
 
Beyond Quality of Experience
Beyond Quality of ExperienceBeyond Quality of Experience
Beyond Quality of Experience
 
Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...Comparison of compression efficiency between HEVC and VP9 based on subjective...
Comparison of compression efficiency between HEVC and VP9 based on subjective...
 
Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard Subjective quality evaluation of the upcoming HEVC video compression standard
Subjective quality evaluation of the upcoming HEVC video compression standard
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
Towards 3D visual quality assessment for future multimedia
Towards 3D visual quality assessment for future  multimediaTowards 3D visual quality assessment for future  multimedia
Towards 3D visual quality assessment for future multimedia
 
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
Rate distortion performance of VP8 (WebP and WebM) when compared to standard ...
 
What future for image/video compression
What future for image/video compressionWhat future for image/video compression
What future for image/video compression
 
An overview of JPSearch
An overview of JPSearchAn overview of JPSearch
An overview of JPSearch
 
3DTV - Past, Present and Future
3DTV - Past, Present and Future3DTV - Past, Present and Future
3DTV - Past, Present and Future
 
Towards second generation expert systems in telepathology for aid in diagnosis
Towards second generation expert systems in telepathology for aid in diagnosisTowards second generation expert systems in telepathology for aid in diagnosis
Towards second generation expert systems in telepathology for aid in diagnosis
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Privacy protection of visual information

  • 1. 1 Privacy protection of visual information Touradj Ebrahimi touradj.ebrahimi@epfl.ch MediaSense 2012 Dublin, Ireland 21-22 May 2012 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 2. Video surveillance popularity 2 • Rise in terrorism and crime – Globalization of good and bad • Political – Perception that the problem of crime and terrorism is addressed • Business and economy – New revenue models – Cost issues Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 3. Potential abuses in video surveillance 3 • Criminal abuse – Criminal misuse by law enforcement officers – Police official gathering information on a gay club to blackmail patrons • Institutional abuse – Spy upon and harass political activists (Civil Rights, Vietnam war) – Surveillance of political demonstrations • Personal usage – Police officers helping friends stalk women, track estranged girlfriends/ spouses • Discrimination – Racial discrimination towards people of color • Voyeurism – Bored male operators spying on women – Footage of public cameras made publicly available Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 4. Civil liberty and right to privacy 4 • Increased resistance to video surveillance • Several countries have set up or are in the process of setting up directives and guidelines to regulate video surveillance – EU – Directive 95/46/EC Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 5. World Trade Center, 9/11 5 filmed by a Gas Station surveillance camera on September 10, 2001 filmed by an ATM surveillance camera on September 10, 2001 Mohamed Atta Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 6. Attack on London underground, July 7, 2005 6 On a reconnaissance mission two weeks before the attack Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 7. Plot to attack trains in Germany, August 2006 7 Two unexploded bombs found in luggage aboard two trains Both terrorists have been arrested thanks to the video footage Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 8. Proliferation of video surveillance applications 8 • Surveillance of sensitive locations – Embassies, airports, nuclear plants, military zone, border control, … • Intrusion detection – Residential surveillance, retail surveillance, … • Traffic control – Speed control • Access to places – Car license plate recognition in cities • Event detection – Child/Elderly care • Marketing/statistics – Customers habits – Number of visitors • … Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 9. Forensic video – legal admissibility 9 • If the image is not inherently reliable, its admissibility in court is questionable • If a poor image is ruled admissible, it will be afforded little or no weight • For an image to be admissible, the prosecutor must prove that the image has not been altered – Lossy compression – Conditional replenishment – Enhancement • Original versus copy – Any digital image can be thought of as being ‘the original’ Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 10. 10 Video surveillance dimensions • Technology • Business • Legal • Social Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 11. Video surveillance technologies 11 • First generation – Analog – CCTV – Recording • Second generation – Digital/Hybrid – Recording – Computerized – IP wired/wireless Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 12. Video surveillance technologies 12 • Third generation – Content analysis – Biometrics – Search – Unusual event detection • Forth generation – Pervasive – Distributed – Invisible – Multi-view – Ultra high definition Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 13. 13 Main security tools in video surveillance • Encryption – Secure communication – Conditional access • Integrity verification – Digital signature – Proof for lack of manipulation after capture Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 14. 14 Alternatives to implement video surveillance with privacy • Fully automatic surveillance without intervention of human operators – False positives and false negatives • Encrypting the whole video – Not good for monitoring • Distorting/blocking sensitive regions – Impact on intelligibility • Reversible encryption/scrambling of sensitive regions with a key – Identification can take place when crime happens • Legal and best practices in video surveillance – Recorded materials locked in secure locations • Only extract/record needed information from the scene – MPEG-7 visual descriptors Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 15. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 16. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 17. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 18. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 19. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 20. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 21. Smart video surveillance 15 Video + Metadata Recording Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 22. Smart video surveillance 15 Video + Metadata Recording […011001…] Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 23. Example: Smart video surveillance 16 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 24. 17 Privacy-sensitive visual information • Predefined zones – Windows, doors – Bank teller – Casino playing tables – … • Automatic identification of Regions of Interest (ROI) – People in the scene – Human faces – Cars license plates – Moving objects – … Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 25. 18 Legacy solutions to visual privacy protection • Masking • Blur • Pixelization Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 26. 19 Masking Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 27. 20 Blur Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 28. 21 Pixelization Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 29. 22 More recent solutions for privacy protection • (ROI) Encryption • (ROI) Scrambling Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 30. 23 ROI selective encryption Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 31. 24 ROI selective decryption Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 32. ROI selective scrambling 25 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 33. Bitstream encryption 26 • Selective encryption of the bitstream at packet level • One or more secret keys • Symmetric encryption – Packet body – Block cipher: e.g. AES packet private key encrypted packet Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 34. Scrambling approaches 27 • Image-domain – Randomly flip bits in one or more bit planes image Scrambling Transform Entropy Coding bitstream Encoder • Pros – Very simple – Independent from the subsequent encoding scheme – Does not affect the bitstream syntax → standard compliance • Cons – Significantly alter statistics of video signal – Ensuing compression less efficient Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 35. Scrambling approaches 28 • Transform-domain – Randomly flip sign of transform coefficients image Transform Scrambling Entropy Coding bitstream Encoder • Pros – Does not adversely affect subsequent entropy coding – Strength of scrambling can be controlled – Does not affect the bitstream syntax → standard compliance • Cons – Must be integrated inside the encoder Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 36. Scrambling approaches 29 • Bitstream-domain – Randomly flip bits in bitstream image Transform Entropy Coding Scrambling bitstream Encoder • Pros – Applied on bitstream after encoding • Cons – Require parsing of bitstream – Difficult to guarantee syntax remains compliant and will not crash a decoder Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 37. 30 Scrambling in JPEG (a) (b) DC pseudo-randomly PRNG inverse sign seed assymetric scrambled encryption codestream public key (c) DC (d) DC pseudo-randomly pseudo-randomly PRNG PRNG inverse sign inverse sign seed seed assymetric scrambled assymetric scrambled encryption codestream encryption codestream public key public key Figure 4 – AC coefficients scrambling: (a) 63 AC coefficients, (b) 60 AC coefficients, (c) 55 AC coefficients, (d) 48 AC coefficients. Straightforwardly, as the scrambling is merely flipping signs of selected coefficients, the technique requires negligible Multimedia Signal Processing Group Swiss Federal Institute of Technology, scrambled region is restricted to match the 8x8 DCT blocks computational complexity. Clearly, the shape of the Lausanne boundaries.
  • 38. 31 Scrambling in JPEG Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 39. Scrambling in JPEG 2000 (JPSEC) 32 • Codeblock-based bitstream domain scrambling image wavelet quantizer selective arithmetic Encoder codestream selective scrambled Decoder transform scrambling coder scrambling codestream scrambled codestream PRNG JPSEC JPSEC PRNG JPSEC JPSEC syntax codestream syntax codestream encrypted encrypted seed seed seed encryption seed encryption Preserve the markers in the bitstream; do not introduce erroneous markers x=current byte, y=preceding byte 1. If x=0xFF, no modification 2. If y=0xFF where m is an 8-bit pseudo- random number in [0x00,0x8F] 3. Otherwise where n is an 8-bit pseudo- random number in [0x00,0xFE] Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 40. Scrambling in JPEG 2000 (JPSEC) 33 • ROI-based wavelet domain scrambling – Arbitrary-shape regions • Exploit ROI mechanisms in JPEG 2000 wavelet quantizer Encoder image transform no resolution yes level l < TI ? keys ROI-based scrambled Decoder Decoder up-scale JPSEC code-stream code-block distortion decrypt arithmetic seeds decoder foreground foreground resolution seeds objects yes objects segmentation background yes resolution background level l level l coefficient ≥ TS ? mask ? ≥ TS ? < 2s ? scramble down-shift unscramble up-shift PRNG PRNG wavelet no wavelet wavelet wavelet no coefficient coefficient coefficient coefficient seeds encrypt arithmetic inverse inv. wavelet seeds coder quantizer transform ROI-based sc rambled keys JPSEC code-stream image Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 41. Scrambling in JPEG 2000 34 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 42. 35 Scrambling in MPEG-4 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 43. 36 Scrambling in MPEG-4 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 44. Scrambling in MPEG-4 37 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 45. Scrambling in MPEG-4 37 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 46. Scrambling in MPEG-4 37 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 47. 38 Scrambling in H.264/AVC Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 48. Scrambling in H.264/AVC 39 Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 49. 40 An existing product Scrambler Unscrambler Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 50. 41 Scrambling in DVC • Key frame privacy (JPEG) – Scrambling in the transform domain on the DCT coefficients. – Driven by a Pseudo-Random Number Generator (PRNG) to pseudo- randomly invert the sign of the DCT Coefficients. • WZ frames DCT scrambler DVC scheme with privacy protection Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 51. 42 Scrambling in DVC a) Key frame (JPEG). b) Wyner-Ziv transform domain scrambling. Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 52. MPEG-7 camera 43 The MPEG-7 camera describes a scene in terms of semantic objects and of their properties XML scene description Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 53. MPEG-7 camera 44 – Image analysis: segmentation, change detection, and tracking (implemented on the camera DSP). – MPEG-7 coder: scene description represented using MPEG-7 (XML). – MPEG-7 decoder: MPEG-7 description is parsed. Extraction of the information related to the specific applications. Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 54. MPEG-7 camera 45 <!-- ################################################## --!> <!-- DDL output for object 4 --!> <!-- ################################################## --!> <Object id="4"> <RegionLocator> <BoxPoly> Poly </BoxPoly> <Coords1> 237 222 </Coords1> <Coords2> 230 252 </Coords2> <Coords3> 240 286 </Coords3> <Coords4> 308 287 </Coords4> <Coords5> 312 284 </Coords5> </RegionLocator> XML scene <DominantColor> description <ColorSpace> YUV </ColorSpace> <ColorValue1> 143.4 </ColorValue1> <ColorValue2> 123.3 </ColorValue2> <ColorValue3> 128.2 </ColorValue3> </DominantColor> <HomogeneousTexture> <TextureValue> 9.02 </TextureValue> </HomogeneousTexture> <MotionTrajectory> <TemporalInterpolation> <KeyFrame> 100 </KeyFrame> <KeyPos> 268.6 251.7 </KeyPos> <KeyFrame> 101 </KeyFrame> <KeyPos> 262.8 241.0 </KeyPos> ... <KeyFrame> 138 </KeyFrame> <KeyPos> 192.9 79.0 </KeyPos> </TemporalInterpolation> </MotionTrajectory> </Object> Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 55. MPEG-7 camera for video surveillance 46 original frame segmentation mask bounding box Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 56. 47 Existing product Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 57. 48 Evaluation of privacy protection in video surveillance • Serious study of performance analysis of privacy protection solutions is lacking • It is paramount to validate privacy protection solutions against user and system requirements for privacy • Two approaches can be used – Performance analysis using subjective evaluations – Performance analysis using objective metrics Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 58. 49 Pixelization • Naïve approach for privacy protection – Commonly used in television news and documentaries in order to obscure the faces of suspects, witnesses or bystanders to preserve their anonymity – Also used to censor nudity or to avoid unintentional product placement on television. • Consists in noticeably reducing resolution in ROI • Can be achieved by substituting a square block of pixels with its average • Drawback – Integrating pixels along trajectories over time may allow to partly recovering the concealed information – Irreversible Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 59. 50 Gaussian Blur • Naïve approach for privacy protection • Removes details in ROI by applying a Gaussian low pass filter • Image is convolved with a 2D Gaussian function • Drawback – Irreversible Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 60. 51 Scrambling by Random Sign Inversion • ROI-based transform-domain scrambling method • Scrambles the quantized transform coefficients of each 4x4 block of the ROI by pseudo-randomly flipping their sign • Advantages – Fully reversible – Same scrambled stream is transmitted to all users – Small impact in terms of coding efficiency – Requires a low computational complexity Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 61. 52 Scrambling by Random Permutation • ROI-based transform-domain scrambling method • Random permutation to rearrange the order of transform coefficients in 4x4 blocks corresponding to ROI – Knuth shuffle to generate a permutation of n items with uniform random distribution • Advantages – Fully reversible – Same scrambled stream is transmitted to all users – Small impact in terms of coding efficiency – Requires a low computational complexity Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 62. 53 Face Recognition - PCA • Principal Components Analysis (PCA) – Also known as eigenfaces – A linear transformation is applied to rotate feature vectors from the initially large and highly correlated subspace to a smaller and uncorrelated subspace – PCA has shown to be effective for face recognition – Firstly, it can be used to reduce the dimensionality of the feature space – Secondly, it eliminates statistical covariance in the transformed feature space – In other words, the covariance matrix for the transformed feature vectors is always diagonal Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 63. 54 Face Recognition - LDA • Linear Discriminant Analysis (LDA) – LDA aims at finding a linear transformation which stresses differences between classes while lessening differences within classes (a class corresponds to all images of a given individual) – The resulting transformed subspace is linearly separable between classes – PCA is first performed to reduce the feature space dimensionality – LDA is then applied to further decrease the dimensionality while safeguarding the distinctive characteristics of the classes – The final subspace is obtained by multiplying the PCA and LDA basis vectors. Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 64. 55 Face Identification and Evaluation System • Preprocessing – Reduces detrimental variations between images – Face alignment aligned using eye coordinates – Pixel values equalization, contrast and brightness normalization • Training – Create the subspace into which test images are subsequently projected and matched – Performed using a training set of images • Testing – A distance matrix is computed in the transformed subspace for all test images – Euclidian distance for PCA and soft distance for LDA – Two image sets are defined: – gallery set is made of known faces – probe set corresponds to faces to be recognized. Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 65. 56 Face Identification and Evaluation System • Performance analysis – Generate cumulative match curve – For each probe image, the recognition rank is computed – rank 0 means that the best match is of the same subject – rank 1 means that the best match is from another person but the second best match is of the same subject – etc. – The cumulative match curve is obtained by summing the number of correct matches for each rank Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 66. 57 Test Data • Grayscale Facial Recognition Technology (FERET) – Although it is not representative of typical video surveillance footage, this database is widely used for face recognition research – We consider a subset of 3368 images of frontal faces for which eye coordinates are available – Images have 256 by 384 pixels with eight-bit per pixel – We further consider two series of images denoted by ‘fa’ and ‘fb’ – ‘fa’ indicates a regular frontal image – ‘fb’ indicates an alternative frontal image, taken within seconds of the corresponding ‘fa’ image, where a different facial expression was requested from the subject. • Standard training, gallery and probe sets from the FERET test – Training set: 501 images from the ‘fa’ series – Gallery set: 1196 images from the ‘fa’ series – Probe set: 1195 images from the ‘fb’ series Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 67. 58 Performance Analysis – Attack #1 • Simple attack – Training and gallery sets are made of unaltered images – Probe set corresponds to images with privacy protection – In other words, altered images are merely processed by the face recognition algorithms without taking into account the fact that privacy protection tools have been applied. PCA LDA Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 68. 59 Performance Analysis – Attack #1 • For both PCA and LDA schemes applied on original images, recognition rate is superior to 70% at rank 0 (i.e. the best match is of the same subject as the probe), and superior to 90% at rank 50 • When applying a Gaussian blur, the performance drops radically for LDA. However, recognition rate remains high for PCA with 56% success at rank 0 • Pixelization fares worse. The recognition rate is 56% and 13% at rank 0 for PCA and LDA respectively • Results clearly show that both region-based transform-domain scrambling approaches are successful at hiding identity. The recognition rate is nearly 0% at rank 0, and remains below 10% at rank 50, for both PCA and LDA algorithms. In addition, it can be observed that both random sign inversion and random permutation schemes achieve nearly the same performance Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 69. 60 Performance Analysis – Attack #2 • More sophisticated attack – Privacy protection tools are now applied to all images in the training, gallery and probe sets – This corresponds to an attacker which gets access to protected data – Alternatively, an attacker may attempt replicating the alteration due to privacy protection techniques on his own training and gallery sets PCA LDA Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 70. 61 Performance Analysis – Attack #2 • With Gaussian blur, the performance remains nearly identical. It even improves slightly for LDA • Pixelization is not much better at hiding facial information. The recognition rate is still 45% and 17% at rank 0 for PCA and LDA respectively • Finally, both region-based transform-domain scrambling approaches are again successful at hiding identity. The recognition rate is nearly 0% at rank 0 for both PCA and LDA algorithms. Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne
  • 71. 62 Thanks for your attention! Multimedia Signal Processing Group Swiss Federal Institute of Technology, Lausanne

Notas del editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n
  73. \n