1 / 15

Object Based Processing for Privacy Protected Surveillance

This document outlines the innovative approaches in object-based image and video processing as applied to privacy-protected surveillance. It covers key topics such as semantic processing of frames, object detection and segmentation, and coding/compression methods like MPEG-4 and ST-SPIHT. Emphasizing privacy protection strategies, it discusses techniques including irreversible object obscuration and reversible object encryption. The paper also examines smart surveillance technologies capable of real-time behavioral analysis and event detection, ensuring a balance between security needs and individual privacy rights.

lars-barton
Télécharger la présentation

Object Based Processing for Privacy Protected Surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of TorontoDept. of Electrical and Computer Engineering February 6, 2008

  2. Overview • Introduction • Object Based Image/Video Processing • Object Based Coding/Compression • Privacy Protection via Object Processing • Smart Surveillance Technologies Confidential - Not to be reproduced without permission

  3. Digital Signal Processing • Multimedia Security • Authentication & Fingerprinting • Image and Video Encryption • Visual Secret Sharing • Secure Streaming • Watermarking • Image and Video Processing • Digital Camera Processing • cDNA Micro-array Imaging • Visual Object Compression • Universal Multimedia Access • Biometrics & Surveillance • Face Recognition • Gait Recognition • Visual Surveillance • Professor: • Kostas Plataniotis (kostas@comm.utoronto.ca)

  4. Object Based Image/Video Processing • Semantic processing of frames/video sequences • Objects: • Face, body, suitcase, vehicle, etc. • Defined by:Shape + Texture • Enables: • Privacy Protection • Event Detection • Etc. Confidential - Not to be reproduced without permission

  5. Object Based Image/Video Processing • Requires detection and segmentation • Rough box or accurate contour • Computer vision and pattern recognition techniques Confidential - Not to be reproduced without permission

  6. Object Based Coding/Compression • Traditional frame/video sequence coding • MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000 • Content unaware • Object based coding • MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006) • Content aware – enabling technology for object based processing CompressionEngine CompressedData Stream Video Frame ObjectCompressionEngine Compressed Shape and TextureStream (Object 1) Compressed Shape and TextureStream (Background) Compressed Shape and TextureStream (Object 2) Confidential - Not to be reproduced without permission

  7. Privacy Protection via Object Processing • Object obscuration – irreversible • Object Encryption - reversible Texture Removal (blackout) Texture Blur Decryption Key Confidential - Not to be reproduced without permission

  8. Privacy Protection via Object Processing • SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007) • Secure texture OR texture+shape • Encryption can be reversed with correct key • Real-time or offline release of key based on authority • Allows investigation of original content Original Frame Secured Texture SecuredTexture+Shape Confidential - Not to be reproduced without permission

  9. Privacy Protection via Object Processing Law Enforcement • Example System Topologies CentralReal-time Monitor Local Real-time Monitor KeyManagement AuthorizedKey Release ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission

  10. Privacy Protection via Object Processing Local Real-time Monitor • Example System Topologies CentralReal-time Monitor KeyManagement AuthorizedKey Release Law Enforcement ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission

  11. Smart Surveillance Technologies • Digital vs. Analog Confidential - Not to be reproduced without permission

  12. Smart Surveillance Technologies • General processing stages for smart processing • Detected Behaviours • Violence • Suspected objects • Robbery • Vandalism • Overcrowding • Trespassing EventDetection ObjectRecognition Tracking BehavouralAnalysis Confidential - Not to be reproduced without permission

  13. Smart Surveillance Technologies • Integrated Approach • Technical infrastructure • Organizational human-led procedures • Ethical framework (privacy vs security) • Behavioural studies • Requirements for Implementation • Robust • Adaptable • Easy installation • Off-the-shelf hardware • Real-time operation Confidential - Not to be reproduced without permission

  14. Smart Surveillance Technologies • Example Commercial Solutions Confidential - Not to be reproduced without permission

  15. END Confidential - Not to be reproduced without permission

More Related