1 / 15

Object Based Processing for Privacy Protected Surveillance

Object Based Processing for Privacy Protected Surveillance. Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008. Overview. Introduction Object Based Image/Video Processing Object Based Coding/Compression

lars-barton
Download Presentation

Object Based Processing for Privacy Protected Surveillance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of TorontoDept. of Electrical and Computer Engineering February 6, 2008

  2. Overview • Introduction • Object Based Image/Video Processing • Object Based Coding/Compression • Privacy Protection via Object Processing • Smart Surveillance Technologies Confidential - Not to be reproduced without permission

  3. Digital Signal Processing • Multimedia Security • Authentication & Fingerprinting • Image and Video Encryption • Visual Secret Sharing • Secure Streaming • Watermarking • Image and Video Processing • Digital Camera Processing • cDNA Micro-array Imaging • Visual Object Compression • Universal Multimedia Access • Biometrics & Surveillance • Face Recognition • Gait Recognition • Visual Surveillance • Professor: • Kostas Plataniotis (kostas@comm.utoronto.ca)

  4. Object Based Image/Video Processing • Semantic processing of frames/video sequences • Objects: • Face, body, suitcase, vehicle, etc. • Defined by:Shape + Texture • Enables: • Privacy Protection • Event Detection • Etc. Confidential - Not to be reproduced without permission

  5. Object Based Image/Video Processing • Requires detection and segmentation • Rough box or accurate contour • Computer vision and pattern recognition techniques Confidential - Not to be reproduced without permission

  6. Object Based Coding/Compression • Traditional frame/video sequence coding • MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000 • Content unaware • Object based coding • MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006) • Content aware – enabling technology for object based processing CompressionEngine CompressedData Stream Video Frame ObjectCompressionEngine Compressed Shape and TextureStream (Object 1) Compressed Shape and TextureStream (Background) Compressed Shape and TextureStream (Object 2) Confidential - Not to be reproduced without permission

  7. Privacy Protection via Object Processing • Object obscuration – irreversible • Object Encryption - reversible Texture Removal (blackout) Texture Blur Decryption Key Confidential - Not to be reproduced without permission

  8. Privacy Protection via Object Processing • SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007) • Secure texture OR texture+shape • Encryption can be reversed with correct key • Real-time or offline release of key based on authority • Allows investigation of original content Original Frame Secured Texture SecuredTexture+Shape Confidential - Not to be reproduced without permission

  9. Privacy Protection via Object Processing Law Enforcement • Example System Topologies CentralReal-time Monitor Local Real-time Monitor KeyManagement AuthorizedKey Release ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission

  10. Privacy Protection via Object Processing Local Real-time Monitor • Example System Topologies CentralReal-time Monitor KeyManagement AuthorizedKey Release Law Enforcement ObjectSegmentation SecST-SPIHT(secure coding) Recorder/Storage Server PhysicalTransfer Confidential - Not to be reproduced without permission

  11. Smart Surveillance Technologies • Digital vs. Analog Confidential - Not to be reproduced without permission

  12. Smart Surveillance Technologies • General processing stages for smart processing • Detected Behaviours • Violence • Suspected objects • Robbery • Vandalism • Overcrowding • Trespassing EventDetection ObjectRecognition Tracking BehavouralAnalysis Confidential - Not to be reproduced without permission

  13. Smart Surveillance Technologies • Integrated Approach • Technical infrastructure • Organizational human-led procedures • Ethical framework (privacy vs security) • Behavioural studies • Requirements for Implementation • Robust • Adaptable • Easy installation • Off-the-shelf hardware • Real-time operation Confidential - Not to be reproduced without permission

  14. Smart Surveillance Technologies • Example Commercial Solutions Confidential - Not to be reproduced without permission

  15. END Confidential - Not to be reproduced without permission

More Related