+ All Categories
Home > Documents > Object Based Processing for Privacy Protected Surveillance

Object Based Processing for Privacy Protected Surveillance

Date post: 03-Jan-2016
Category:
Upload: lars-barton
View: 28 times
Download: 0 times
Share this document with a friend
Description:
Object Based Processing for Privacy Protected Surveillance. Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008. Overview. Introduction Object Based Image/Video Processing Object Based Coding/Compression - PowerPoint PPT Presentation
Popular Tags:
15
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008
Transcript
Page 1: Object Based Processing for Privacy Protected Surveillance

Object Based Processing for Privacy Protected Surveillance

Karl MartinKostas N. Plataniotis

University of TorontoDept. of Electrical and Computer Engineering

February 6, 2008

Page 2: Object Based Processing for Privacy Protected Surveillance

2Confidential - Not to be reproduced without permissionFebruary 6, 2008

Overview

Introduction

Object Based Image/Video Processing

Object Based Coding/Compression

Privacy Protection via Object Processing

Smart Surveillance Technologies

Page 3: Object Based Processing for Privacy Protected Surveillance

3

Digital Signal Processing

Image and Video Processing

• Digital Camera Processing• cDNA Micro-array Imaging• Visual Object Compression• Universal Multimedia Access

Multimedia Security

• Authentication & Fingerprinting• Image and Video Encryption• Visual Secret Sharing• Secure Streaming• Watermarking

Biometrics & Surveillance

• Face Recognition• Gait Recognition• Visual Surveillance

Professor:• Kostas Plataniotis

([email protected])

Page 4: Object Based Processing for Privacy Protected Surveillance

4Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Image/Video Processing

Semantic processing of frames/video sequences Objects:

– Face, body, suitcase, vehicle, etc.– Defined by:

Shape + Texture

Enables:– Privacy Protection– Event Detection– Etc.

Page 5: Object Based Processing for Privacy Protected Surveillance

5Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Image/Video Processing

Requires detection and segmentation– Rough box or accurate contour

– Computer vision and pattern recognition techniques

Page 6: Object Based Processing for Privacy Protected Surveillance

6Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Coding/Compression

Traditional frame/video sequence coding– MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000– Content unaware

Object based coding– MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006)– Content aware – enabling technology for object based processing

VideoCompression

EngineCompressedData Stream

FrameObject

CompressionEngine

Compressed Shape and TextureStream (Object 1)

Compressed Shape and TextureStream (Background)

Compressed Shape and TextureStream (Object 2)

Page 7: Object Based Processing for Privacy Protected Surveillance

7Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Object obscuration – irreversible

Object Encryption - reversible

Texture Removal (blackout)

Texture Blur

Decryption Key

Page 8: Object Based Processing for Privacy Protected Surveillance

8Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007)– Secure texture OR texture+shape

Encryption can be reversed with correct key– Real-time or offline release of key based on authority– Allows investigation of original content

Original Frame Secured Texture SecuredTexture+Shape

Page 9: Object Based Processing for Privacy Protected Surveillance

9Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Example System Topologies

ObjectSegmentation

SecST-SPIHT(secure coding)

Recorder/Storage Server

AuthorizedKey Release

Local Real-time Monitor

CentralReal-time Monitor

Law Enforcement

PhysicalTransfer

KeyManagement

Page 10: Object Based Processing for Privacy Protected Surveillance

10Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Example System Topologies

ObjectSegmentation

Recorder/Storage Server

AuthorizedKey Release

Local Real-time Monitor

CentralReal-time Monitor

Law Enforcement

PhysicalTransfer

KeyManagement

SecST-SPIHT(secure coding)

Page 11: Object Based Processing for Privacy Protected Surveillance

11Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Digital vs. Analog

Digital Analog

Operating Central operation Isolated, site-by-site

Managing Central management Difficult to manage large number of sites

Recording Flexible framerate/quality Fixed framerate/quality

Storing Flexible based on storage, compression parameters – highly scalable

Tapes requiring substantial storage space – potential video loss during tape change

Searching Single query search across multiple storage sites – near instantaneous

Manual, physical retrieval of tapes

Page 12: Object Based Processing for Privacy Protected Surveillance

12Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

General processing stages for smart processing

Detected Behaviours – Violence– Suspected objects– Robbery– Vandalism– Overcrowding– Trespassing

EventDetection

ObjectRecognition

TrackingBehavoural

Analysis

Page 13: Object Based Processing for Privacy Protected Surveillance

13Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Integrated Approach– Technical infrastructure– Organizational human-led procedures– Ethical framework (privacy vs security)– Behavioural studies

Requirements for Implementation– Robust– Adaptable– Easy installation– Off-the-shelf hardware– Real-time operation

Page 14: Object Based Processing for Privacy Protected Surveillance

14Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Example Commercial Solutions

Compression Other Features

MC Electronics MPEG-4 Audio, PTZ control, alarm inputs

Visiowave Visiobox 3D Wavelet PTZ control, motion detection 3

Baxall Analog and digital interfaces

Teleeye III+ NF Wavelet Motion detection, wireless

Sony SNCV10P Wavelet Multiple interfaces, embedded

LINUX, built in security

Page 15: Object Based Processing for Privacy Protected Surveillance

15Confidential - Not to be reproduced without permissionFebruary 6, 2008

END


Recommended