SlideShare a Scribd company logo
1 of 28
Contribution of Non-Scrambled Chroma Information in
  Privacy-Protected Face Images to Privacy Leakage



10th International Workshop on Digital Forensics and Watermarking
                             October 2011


         Hosik Sohn1, Dohyoung Lee2, Wesley De Neve1,
         Konstantinos N. Plataniotis2, and Yong Man Ro1

   1Korea   Advanced Institute of Science and Technology (KAIST),
                   Image and Video Systems Lab
                       2University of Toronto,

                           Multimedia Lab
-2-


Contents

1. Introduction

2. Layered Scrambling for Motion JPEG XR

3. Assessment of Chroma-induced Privacy Leakage

   3.1 Objective Assessments

   3.2 Subjective Assessments

4. Discussion and Conclusions
-3-




INTRODUCTION
-4-


1. Introduction
 Present-day video surveillance systems often come with high-speed network
  connections, plenty of storage capacity, and high processing power

 The increasing ability of video surveillance systems to identify people has
  recently raised several privacy concerns

 To mitigate these privacy concerns, scrambling can be leveraged to conceal
  the identity of face images in video content originating from surveillance
  cameras




                             Privacy protected surveillance videos
-5-


1. Introduction

 The past few years have witnessed the development of a wide range of
  content-based tools for protecting privacy in video surveillance systems

     Dependent on the location where scrambling (or encryption) is applied, three
      different approaches of scrambling can be distinguished
         Uncompressed domain scrambling
         Transform domain scrambling
         Compressed bit stream domain scrambling


     One of the main challenges is the concealment of privacy-sensitive regions by
      making use of invertible transformation of visual information at a low
      computational cost
-6-


1. Introduction

 Content-based tools for privacy protection need to find a proper balance
  between the level of security offered and the amount of bit rate overhead
     In general, altering the visual information present in privacy-sensitive regions
      typically breaks the effectiveness of coding tools




                                                Coding
                             Security
                                               efficiency
                              level


 To limit the bit rate overhead, many content-based tools for privacy protection
  only scramble luma information, leaving chroma information unprotected
-7-


1. Introduction

 In this paper, we investigate the contribution of non-scrambled chroma
  information to privacy leakage

 To that end, we study and quantify the influence of the presence of non-
  scrambled chroma information on the effectiveness of automatic and human
  FR

     Objective assessment: we apply automatic FR techniques to face images that
      have been privacy-protected in the luma domain
     Subjective assessment: we investigate whether agreement exists between the
      judgments of 32 human observers and the output of automatic FR
-8-


      1. Introduction



       FR vs. perception-based security metrics for assessing the level of privacy

              Luminance Similarity Score (LSS), Edge Similarity Score (ESS), and Local
               Feature-based Visual Security Metric (LFVSM)[1,2]

              Note that these metrics are general in nature and are thus not able to take
               advantage of domain-specific information (e.g., face information)




[1] Tong, L., Dai, F., Zhang, Y., Li, J. “Visual security evaluation for video encryption,” in: Proceedings of ACM International Conference on
Multimedia, 835–838 (2010)
[2] Mao Y., Wu M., "A joint signal processing and cryptographic approach to multimedia encryption," IEEE Transactions on Image Processing,
15(7), 2061-2075 (2006)
-9-




LAYERED SCRAMBLING FOR
MOTION JPEG XR
-10-


      2. Layered Scrambling for Motion JPEG XR

       The video surveillance system studied makes use of Motion JPEG XR to
        encode surveillance video content
              Motion JPEG XR offers a low-complexity solution for the intra coding of high-resolution
               video content, while at the same time offering quality and spatial scalability provisions


       Layered scrambling for JPEG XR [3]
              Modified JPEG XR encoder
                                                                               Secret key
                                              DC subband
                                                                              Scrambling
                           LBT       LBT       Q      Pred.
                                                                                (RLS)         • Adaptive
                                              LP subband                                        entropy
                                                                Adaptive      Scrambling        coding
                                               Q      Pred.
                                                                 scan            (RP)         • Fixed
                                              HP subband/Flexbits                               length
                                                                Adaptive      Scrambling        coding
                                               Q      Pred.
                                                                 scan            (RSI)


[3] Sohn, H., De Neve, W., Ro, Y.M., “Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG
XR,” IEEE Transactions on Circuits and Systems for Video Technology, 21, 170–177 (2011)
-11-


2. Layered Scrambling for Motion JPEG XR

  Overview of the layered scrambling technique




                                                        - Random level shift (RLS) for DC subbands
                                                          DCcoeff e  DCcoeff  R(L),


                                                        - Random permutation (RP) for LP subbands

                                                         LPcoeffi e  LPcoeff j , where i  1,..., C, j  x1 ,..., xC ,


                                                        - Random sign inversion (RSI) for HP subbands
                                                                      HPcoeff , if r  1
                                                         HPcoeff e                       ,
                                                                      HPcoeff , otherwise


      N denotes the number of MBs, L denotes the RLS parameter, K denotes the number
       of non-zero LP coefficients in a MB, and M denotes the number of non-zero HP
       coefficients in a MB
-12-




ASSESSMENT OF CHROMA-INDUCED
PRIVACY LEAKAGE
-13-


3.1. Objective Assessments
 Experimental setup
    FR techniques used: PCA, FLDA, LBP
    Face images: 3070 frontal face images of 68 subjects from CMU PIE
     (68 gallery, 340 training, and 2662 probe face images)
           Probe face images represent privacy-protected face images that appear in video
            content originating from surveillance cameras
    Performance evaluation: Cumulative Match Characteristic (CMC) curve

    Notations
     Notation                            Explanation
     DC, LP, and HP                      DC, LP, and HP subband
     S3                                  DC+LP+HP
     S2                                  DC+LP
     S1                                  DC
     Subscripts (Y, Co, Cg)              Luma and chroma channels (Y, Co, and Cg)
     Prime (′)                           Scrambled image data
-14-


3.1. Objective Assessments
 Influence of distance measurement on FR effectiveness
     Distance metric: Euclidean, Mahalanobis, Cosine, and Chi-square distance




                                                           DE : Euclidean distance
                                                           DM : Mahalanobis distance
                                                           DC : Cosine distance
                                                           DH : Chi-square distance




     In the remainder of our experiments, we make use of the Euclidean distance metric for
      PCA- and FLDA-based FR, and the Chi-square distance metric for LBP-based FR
-15-


3.1. Objective Assessments
 Scrambled luma information
    Assumes that an adversary is not able to take advantage of the possible presence of
     non-scrambled chroma information in the privacy-protected probe face images
-16-


3.1. Objective Assessments

 Scrambled luma and non-scrambled chroma information
    We investigate whether layered scrambling is still effective when the
     scrambled luma channel and the non-scrambled chroma channels are
     simultaneously used for the purpose of automatic FR

    We assume that an adversary has access to the compressed bit stream
     structure, and thus to the non-scrambled chroma information

    We adopt feature-level fusion in order to take advantage of non-
     scrambled chroma information
-17-


3.1. Objective Assessments
 Scrambled luma and non-scrambled chroma information
-18-


3.1. Objective Assessments
 Non-scrambled chroma information
-19-


3.2. Subjective Assessments

 Experimental setup
    Number of observers: 32
    We presented three scrambled probe face images of different subjects to the
     human observers for each experimental condition
    Assessment method
        Human observers were asked to select the gallery face image that is most similar to
         the given probe face image
        Human observers were also able to study the probe face images at different zoom
         levels




                       Gallery face images used for the subjective assessments
-20-


3.2. Subjective Assessments
 Non-scrambled chroma information
-21-


3.2. Subjective Assessments
 Scrambled luma and non-scrambled chroma information
-22-




DISCUSSION & CONCLUSIONS
-23-


4. Discussion

 For video surveillance applications requiring a high level of privacy protection, both
  the luma and the chroma channels need to be scrambled
     At the cost of a higher bit rate overhead
 Layered scrambling for both the luma (Y) and the chroma channels (Co and Cg)
-24-


4. Discussion
 Bit rate overhead




 Security (ideal case)
     Sub-sampling decreases the level of privacy protection, given the lesser amount
      of data available for scrambling
     Total number of combinations required to break the protection of 10 MBs is
      reduced from 3.6×10722 (4:4:4) to 1.7×10360 (4:2:0)
-25-


5. Conclusions and Future Work

 This paper studied and quantified the influence of non-scrambled chroma infor-
  mation on the effectiveness of automatic and human FR

 Our results show that, when an adversary has access to the coded bit stream
  structure, the presence of non-scrambled chroma information may significantly
  contribute to privacy leakage

 For video surveillance applications requiring a high level of privacy protection, our
  results indicate that both luma and chroma information needs to be scrambled at the
  cost of an increase in bit rate overhead

 In order to compile a benchmark for privacy protection tools, future research will
  focus on identifying additional worst case scenarios
-26-




Thank you for your attention!
-27-


APPENDIX A
 Effectiveness of general-purpose visual security metrics
     Visual security metrics used
         Luminance Similarity Score (LSS), Edge Similarity Score (ESS), and Local Feature-
          based Visual Security Metric (LFVSM)
     The lower the values computed by the visual security metrics, the higher the
      visual security
-28-


APPENDIX B
 Paper of interest
     Sohn, H., De Neve, W., Ro, Y.M., “Privacy Protection in Video Surveillance
      Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR,” IEEE
      Transactions on Circuits and Systems for Video Technology, 21, 170–177
      (2011)


 Book chapter of interest
     Sohn, H., Lee, D., De Neve, W., Plataniotis, K.N., Ro, Y.M., “An objective and
      subjective evaluation of content-based privacy protection of face images in
      video surveillance systems using JPEG XR,” Accepted for publication in
      Effective Surveillance for Homeland Security: Balancing Technology and
      Social Issues, CRC Press / Taylor & Francis, To be published in 2013


 IVY Lab video surveillance data set
     http://ivylab.kaist.ac.kr/demo/vs/dataset.htm

More Related Content

What's hot

Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency
Phan Duy
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...
wtyru1989
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...
wtyru1989
 
Emerging H.264 Standard: Overview and TMS320DM642- Based ...
Emerging H.264 Standard: Overview and TMS320DM642- Based ...Emerging H.264 Standard: Overview and TMS320DM642- Based ...
Emerging H.264 Standard: Overview and TMS320DM642- Based ...
Videoguy
 
Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010
Nitesh Chilakala
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANET
Ankit Gupta
 
Detecting VoIP Traffic Based on Human Conversation Patterns
Detecting VoIP Traffic Based on Human Conversation PatternsDetecting VoIP Traffic Based on Human Conversation Patterns
Detecting VoIP Traffic Based on Human Conversation Patterns
Academia Sinica
 
High-speed Distributed Video Transcoding for Multiple Rates ...
High-speed Distributed Video Transcoding for Multiple Rates ...High-speed Distributed Video Transcoding for Multiple Rates ...
High-speed Distributed Video Transcoding for Multiple Rates ...
Videoguy
 

What's hot (20)

A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
 
Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency
 
Thesis L Leyssenne - November 27th 2009 - Part1
Thesis L Leyssenne - November 27th 2009 - Part1Thesis L Leyssenne - November 27th 2009 - Part1
Thesis L Leyssenne - November 27th 2009 - Part1
 
IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...
 
4092a081
4092a0814092a081
4092a081
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...
 
Distributed Adaptation Decision-Taking Framework and Scalable Video Coding Tu...
Distributed Adaptation Decision-Taking Framework and Scalable Video Coding Tu...Distributed Adaptation Decision-Taking Framework and Scalable Video Coding Tu...
Distributed Adaptation Decision-Taking Framework and Scalable Video Coding Tu...
 
speech enhancement
speech enhancementspeech enhancement
speech enhancement
 
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
 
Emerging H.264 Standard: Overview and TMS320DM642- Based ...
Emerging H.264 Standard: Overview and TMS320DM642- Based ...Emerging H.264 Standard: Overview and TMS320DM642- Based ...
Emerging H.264 Standard: Overview and TMS320DM642- Based ...
 
Video Compression Standards - History & Introduction
Video Compression Standards - History & IntroductionVideo Compression Standards - History & Introduction
Video Compression Standards - History & Introduction
 
Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANET
 
Detecting VoIP Traffic Based on Human Conversation Patterns
Detecting VoIP Traffic Based on Human Conversation PatternsDetecting VoIP Traffic Based on Human Conversation Patterns
Detecting VoIP Traffic Based on Human Conversation Patterns
 
DAC 2012
DAC 2012DAC 2012
DAC 2012
 
High-speed Distributed Video Transcoding for Multiple Rates ...
High-speed Distributed Video Transcoding for Multiple Rates ...High-speed Distributed Video Transcoding for Multiple Rates ...
High-speed Distributed Video Transcoding for Multiple Rates ...
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2
 

Viewers also liked

Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
Suvadip Shome
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
12206695
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 

Viewers also liked (20)

Estudio digitalizacion Espana 4.0 Siemens and Roland Berger
Estudio digitalizacion Espana 4.0 Siemens and Roland BergerEstudio digitalizacion Espana 4.0 Siemens and Roland Berger
Estudio digitalizacion Espana 4.0 Siemens and Roland Berger
 
BCCR 6-2008
BCCR 6-2008BCCR 6-2008
BCCR 6-2008
 
American Marketing Association of Columbia Marketer Mentor Program
American Marketing Association of Columbia Marketer Mentor ProgramAmerican Marketing Association of Columbia Marketer Mentor Program
American Marketing Association of Columbia Marketer Mentor Program
 
المراحل المختلفة لمشروع ازالة المخلفات الصلبة -مبادرة تكاتف - عرض تقديمي بالص...
المراحل المختلفة لمشروع ازالة المخلفات الصلبة -مبادرة تكاتف - عرض تقديمي بالص...المراحل المختلفة لمشروع ازالة المخلفات الصلبة -مبادرة تكاتف - عرض تقديمي بالص...
المراحل المختلفة لمشروع ازالة المخلفات الصلبة -مبادرة تكاتف - عرض تقديمي بالص...
 
Modelos de datos
Modelos de datosModelos de datos
Modelos de datos
 
дмитрий гришанков.прогнозы по банковскому и финансовому рынку на 2015 год рис...
дмитрий гришанков.прогнозы по банковскому и финансовому рынку на 2015 год рис...дмитрий гришанков.прогнозы по банковскому и финансовому рынку на 2015 год рис...
дмитрий гришанков.прогнозы по банковскому и финансовому рынку на 2015 год рис...
 
Презентация: Leadgid
Презентация: LeadgidПрезентация: Leadgid
Презентация: Leadgid
 
Qué son los metadatos
Qué son los metadatosQué son los metadatos
Qué son los metadatos
 
виктор киселев.роль мспбанка в сделках секьюритизации мсп кредитов
виктор киселев.роль мспбанка в сделках секьюритизации мсп кредитоввиктор киселев.роль мспбанка в сделках секьюритизации мсп кредитов
виктор киселев.роль мспбанка в сделках секьюритизации мсп кредитов
 
آفات اللسان
آفات اللسانآفات اللسان
آفات اللسان
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Transformación Digital en México
Transformación Digital en MéxicoTransformación Digital en México
Transformación Digital en México
 
Kajian Kerjasama Pengelolaan Kebun Kelapa Sawit di Kab. Pasaman Barat
Kajian Kerjasama Pengelolaan Kebun Kelapa Sawit di Kab. Pasaman BaratKajian Kerjasama Pengelolaan Kebun Kelapa Sawit di Kab. Pasaman Barat
Kajian Kerjasama Pengelolaan Kebun Kelapa Sawit di Kab. Pasaman Barat
 
Surat penawaran service AC
Surat penawaran service ACSurat penawaran service AC
Surat penawaran service AC
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage

Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
Kobi Magnezi
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag Jain
Videoguy
 
Data representation
Data representationData representation
Data representation
ChingTing
 
H 264 in cuda presentation
H 264 in cuda presentationH 264 in cuda presentation
H 264 in cuda presentation
ashoknaik120
 

Similar to Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage (20)

Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag Jain
 
Introduction To SPOT
Introduction To SPOTIntroduction To SPOT
Introduction To SPOT
 
Data representation
Data representationData representation
Data representation
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Rfid
Rfid Rfid
Rfid
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
OW2con'14 - XLcoud, 3D rendering in the cloud, Marius Preda, Institut Mines T...
OW2con'14 - XLcoud, 3D rendering in the cloud, Marius Preda, Institut Mines T...OW2con'14 - XLcoud, 3D rendering in the cloud, Marius Preda, Institut Mines T...
OW2con'14 - XLcoud, 3D rendering in the cloud, Marius Preda, Institut Mines T...
 
XLcloud 3-d remote rendering
XLcloud 3-d remote renderingXLcloud 3-d remote rendering
XLcloud 3-d remote rendering
 
Matlab project
Matlab projectMatlab project
Matlab project
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
 
Sncrx
SncrxSncrx
Sncrx
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 
internet applications
 internet applications internet applications
internet applications
 
Resource Oriented Architecture for Managing Multimedia Content by Florian
Resource Oriented Architecture for Managing Multimedia Content by FlorianResource Oriented Architecture for Managing Multimedia Content by Florian
Resource Oriented Architecture for Managing Multimedia Content by Florian
 
H 264 in cuda presentation
H 264 in cuda presentationH 264 in cuda presentation
H 264 in cuda presentation
 

More from Wesley De Neve

More from Wesley De Neve (20)

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 

Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage

  • 1. Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage 10th International Workshop on Digital Forensics and Watermarking October 2011 Hosik Sohn1, Dohyoung Lee2, Wesley De Neve1, Konstantinos N. Plataniotis2, and Yong Man Ro1 1Korea Advanced Institute of Science and Technology (KAIST), Image and Video Systems Lab 2University of Toronto, Multimedia Lab
  • 2. -2- Contents 1. Introduction 2. Layered Scrambling for Motion JPEG XR 3. Assessment of Chroma-induced Privacy Leakage 3.1 Objective Assessments 3.2 Subjective Assessments 4. Discussion and Conclusions
  • 4. -4- 1. Introduction  Present-day video surveillance systems often come with high-speed network connections, plenty of storage capacity, and high processing power  The increasing ability of video surveillance systems to identify people has recently raised several privacy concerns  To mitigate these privacy concerns, scrambling can be leveraged to conceal the identity of face images in video content originating from surveillance cameras Privacy protected surveillance videos
  • 5. -5- 1. Introduction  The past few years have witnessed the development of a wide range of content-based tools for protecting privacy in video surveillance systems  Dependent on the location where scrambling (or encryption) is applied, three different approaches of scrambling can be distinguished  Uncompressed domain scrambling  Transform domain scrambling  Compressed bit stream domain scrambling  One of the main challenges is the concealment of privacy-sensitive regions by making use of invertible transformation of visual information at a low computational cost
  • 6. -6- 1. Introduction  Content-based tools for privacy protection need to find a proper balance between the level of security offered and the amount of bit rate overhead  In general, altering the visual information present in privacy-sensitive regions typically breaks the effectiveness of coding tools Coding Security efficiency level  To limit the bit rate overhead, many content-based tools for privacy protection only scramble luma information, leaving chroma information unprotected
  • 7. -7- 1. Introduction  In this paper, we investigate the contribution of non-scrambled chroma information to privacy leakage  To that end, we study and quantify the influence of the presence of non- scrambled chroma information on the effectiveness of automatic and human FR  Objective assessment: we apply automatic FR techniques to face images that have been privacy-protected in the luma domain  Subjective assessment: we investigate whether agreement exists between the judgments of 32 human observers and the output of automatic FR
  • 8. -8- 1. Introduction  FR vs. perception-based security metrics for assessing the level of privacy  Luminance Similarity Score (LSS), Edge Similarity Score (ESS), and Local Feature-based Visual Security Metric (LFVSM)[1,2]  Note that these metrics are general in nature and are thus not able to take advantage of domain-specific information (e.g., face information) [1] Tong, L., Dai, F., Zhang, Y., Li, J. “Visual security evaluation for video encryption,” in: Proceedings of ACM International Conference on Multimedia, 835–838 (2010) [2] Mao Y., Wu M., "A joint signal processing and cryptographic approach to multimedia encryption," IEEE Transactions on Image Processing, 15(7), 2061-2075 (2006)
  • 10. -10- 2. Layered Scrambling for Motion JPEG XR  The video surveillance system studied makes use of Motion JPEG XR to encode surveillance video content  Motion JPEG XR offers a low-complexity solution for the intra coding of high-resolution video content, while at the same time offering quality and spatial scalability provisions  Layered scrambling for JPEG XR [3]  Modified JPEG XR encoder Secret key DC subband Scrambling LBT LBT Q Pred. (RLS) • Adaptive LP subband entropy Adaptive Scrambling coding Q Pred. scan (RP) • Fixed HP subband/Flexbits length Adaptive Scrambling coding Q Pred. scan (RSI) [3] Sohn, H., De Neve, W., Ro, Y.M., “Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR,” IEEE Transactions on Circuits and Systems for Video Technology, 21, 170–177 (2011)
  • 11. -11- 2. Layered Scrambling for Motion JPEG XR  Overview of the layered scrambling technique - Random level shift (RLS) for DC subbands DCcoeff e  DCcoeff  R(L), - Random permutation (RP) for LP subbands LPcoeffi e  LPcoeff j , where i  1,..., C, j  x1 ,..., xC , - Random sign inversion (RSI) for HP subbands  HPcoeff , if r  1 HPcoeff e   ,  HPcoeff , otherwise  N denotes the number of MBs, L denotes the RLS parameter, K denotes the number of non-zero LP coefficients in a MB, and M denotes the number of non-zero HP coefficients in a MB
  • 13. -13- 3.1. Objective Assessments  Experimental setup  FR techniques used: PCA, FLDA, LBP  Face images: 3070 frontal face images of 68 subjects from CMU PIE (68 gallery, 340 training, and 2662 probe face images)  Probe face images represent privacy-protected face images that appear in video content originating from surveillance cameras  Performance evaluation: Cumulative Match Characteristic (CMC) curve  Notations Notation Explanation DC, LP, and HP DC, LP, and HP subband S3 DC+LP+HP S2 DC+LP S1 DC Subscripts (Y, Co, Cg) Luma and chroma channels (Y, Co, and Cg) Prime (′) Scrambled image data
  • 14. -14- 3.1. Objective Assessments  Influence of distance measurement on FR effectiveness  Distance metric: Euclidean, Mahalanobis, Cosine, and Chi-square distance DE : Euclidean distance DM : Mahalanobis distance DC : Cosine distance DH : Chi-square distance  In the remainder of our experiments, we make use of the Euclidean distance metric for PCA- and FLDA-based FR, and the Chi-square distance metric for LBP-based FR
  • 15. -15- 3.1. Objective Assessments  Scrambled luma information  Assumes that an adversary is not able to take advantage of the possible presence of non-scrambled chroma information in the privacy-protected probe face images
  • 16. -16- 3.1. Objective Assessments  Scrambled luma and non-scrambled chroma information  We investigate whether layered scrambling is still effective when the scrambled luma channel and the non-scrambled chroma channels are simultaneously used for the purpose of automatic FR  We assume that an adversary has access to the compressed bit stream structure, and thus to the non-scrambled chroma information  We adopt feature-level fusion in order to take advantage of non- scrambled chroma information
  • 17. -17- 3.1. Objective Assessments  Scrambled luma and non-scrambled chroma information
  • 18. -18- 3.1. Objective Assessments  Non-scrambled chroma information
  • 19. -19- 3.2. Subjective Assessments  Experimental setup  Number of observers: 32  We presented three scrambled probe face images of different subjects to the human observers for each experimental condition  Assessment method  Human observers were asked to select the gallery face image that is most similar to the given probe face image  Human observers were also able to study the probe face images at different zoom levels Gallery face images used for the subjective assessments
  • 20. -20- 3.2. Subjective Assessments  Non-scrambled chroma information
  • 21. -21- 3.2. Subjective Assessments  Scrambled luma and non-scrambled chroma information
  • 23. -23- 4. Discussion  For video surveillance applications requiring a high level of privacy protection, both the luma and the chroma channels need to be scrambled  At the cost of a higher bit rate overhead  Layered scrambling for both the luma (Y) and the chroma channels (Co and Cg)
  • 24. -24- 4. Discussion  Bit rate overhead  Security (ideal case)  Sub-sampling decreases the level of privacy protection, given the lesser amount of data available for scrambling  Total number of combinations required to break the protection of 10 MBs is reduced from 3.6×10722 (4:4:4) to 1.7×10360 (4:2:0)
  • 25. -25- 5. Conclusions and Future Work  This paper studied and quantified the influence of non-scrambled chroma infor- mation on the effectiveness of automatic and human FR  Our results show that, when an adversary has access to the coded bit stream structure, the presence of non-scrambled chroma information may significantly contribute to privacy leakage  For video surveillance applications requiring a high level of privacy protection, our results indicate that both luma and chroma information needs to be scrambled at the cost of an increase in bit rate overhead  In order to compile a benchmark for privacy protection tools, future research will focus on identifying additional worst case scenarios
  • 26. -26- Thank you for your attention!
  • 27. -27- APPENDIX A  Effectiveness of general-purpose visual security metrics  Visual security metrics used  Luminance Similarity Score (LSS), Edge Similarity Score (ESS), and Local Feature- based Visual Security Metric (LFVSM)  The lower the values computed by the visual security metrics, the higher the visual security
  • 28. -28- APPENDIX B  Paper of interest  Sohn, H., De Neve, W., Ro, Y.M., “Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR,” IEEE Transactions on Circuits and Systems for Video Technology, 21, 170–177 (2011)  Book chapter of interest  Sohn, H., Lee, D., De Neve, W., Plataniotis, K.N., Ro, Y.M., “An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR,” Accepted for publication in Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC Press / Taylor & Francis, To be published in 2013  IVY Lab video surveillance data set  http://ivylab.kaist.ac.kr/demo/vs/dataset.htm