150 likes | 270 Vues
This document outlines the innovative approaches in object-based image and video processing as applied to privacy-protected surveillance. It covers key topics such as semantic processing of frames, object detection and segmentation, and coding/compression methods like MPEG-4 and ST-SPIHT. Emphasizing privacy protection strategies, it discusses techniques including irreversible object obscuration and reversible object encryption. The paper also examines smart surveillance technologies capable of real-time behavioral analysis and event detection, ensuring a balance between security needs and individual privacy rights.
E N D
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of TorontoDept. of Electrical and Computer Engineering February 6, 2008
Overview • Introduction • Object Based Image/Video Processing • Object Based Coding/Compression • Privacy Protection via Object Processing • Smart Surveillance Technologies Confidential - Not to be reproduced without permission
Digital Signal Processing • Multimedia Security • Authentication & Fingerprinting • Image and Video Encryption • Visual Secret Sharing • Secure Streaming • Watermarking • Image and Video Processing • Digital Camera Processing • cDNA Micro-array Imaging • Visual Object Compression • Universal Multimedia Access • Biometrics & Surveillance • Face Recognition • Gait Recognition • Visual Surveillance • Professor: • Kostas Plataniotis (kostas@comm.utoronto.ca)
Object Based Image/Video Processing • Semantic processing of frames/video sequences • Objects: • Face, body, suitcase, vehicle, etc. • Defined by:Shape + Texture • Enables: • Privacy Protection • Event Detection • Etc. Confidential - Not to be reproduced without permission
Object Based Image/Video Processing • Requires detection and segmentation • Rough box or accurate contour • Computer vision and pattern recognition techniques Confidential - Not to be reproduced without permission
Object Based Coding/Compression • Traditional frame/video sequence coding • MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000 • Content unaware • Object based coding • MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006) • Content aware – enabling technology for object based processing CompressionEngine CompressedData Stream Video Frame ObjectCompressionEngine Compressed Shape and TextureStream (Object 1) Compressed Shape and TextureStream (Background) Compressed Shape and TextureStream (Object 2) Confidential - Not to be reproduced without permission
Privacy Protection via Object Processing • Object obscuration – irreversible • Object Encryption - reversible Texture Removal (blackout) Texture Blur Decryption Key Confidential - Not to be reproduced without permission
Privacy Protection via Object Processing • SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007) • Secure texture OR texture+shape • Encryption can be reversed with correct key • Real-time or offline release of key based on authority • Allows investigation of original content Original Frame Secured Texture SecuredTexture+Shape Confidential - Not to be reproduced without permission
Privacy Protection via Object Processing Law Enforcement • Example System Topologies CentralReal-time Monitor Local Real-time Monitor KeyManagement AuthorizedKey Release ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission
Privacy Protection via Object Processing Local Real-time Monitor • Example System Topologies CentralReal-time Monitor KeyManagement AuthorizedKey Release Law Enforcement ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission
Smart Surveillance Technologies • Digital vs. Analog Confidential - Not to be reproduced without permission
Smart Surveillance Technologies • General processing stages for smart processing • Detected Behaviours • Violence • Suspected objects • Robbery • Vandalism • Overcrowding • Trespassing EventDetection ObjectRecognition Tracking BehavouralAnalysis Confidential - Not to be reproduced without permission
Smart Surveillance Technologies • Integrated Approach • Technical infrastructure • Organizational human-led procedures • Ethical framework (privacy vs security) • Behavioural studies • Requirements for Implementation • Robust • Adaptable • Easy installation • Off-the-shelf hardware • Real-time operation Confidential - Not to be reproduced without permission
Smart Surveillance Technologies • Example Commercial Solutions Confidential - Not to be reproduced without permission
END Confidential - Not to be reproduced without permission