Object Based Processing for Privacy Protected Surveillance - PowerPoint PPT Presentation

About This Presentation
Title:

Object Based Processing for Privacy Protected Surveillance

Description:

Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering – PowerPoint PPT presentation

Number of Views:135
Avg rating:3.0/5.0
Slides: 16
Provided by: KarlM378
Category:

less

Transcript and Presenter's Notes

Title: Object Based Processing for Privacy Protected Surveillance


1
Object Based Processing for Privacy Protected
Surveillance
  • Karl Martin
  • Kostas N. Plataniotis
  • University of TorontoDept. of Electrical and
    Computer Engineering
  • February 6, 2008

2
Overview
  • Introduction
  • Object Based Image/Video Processing
  • Object Based Coding/Compression
  • Privacy Protection via Object Processing
  • Smart Surveillance Technologies

3
Digital Signal Processing
  • Multimedia Security
  • Authentication Fingerprinting
  • Image and Video Encryption
  • Visual Secret Sharing
  • Secure Streaming
  • Watermarking
  • Image and Video Processing
  • Digital Camera Processing
  • cDNA Micro-array Imaging
  • Visual Object Compression
  • Universal Multimedia Access
  • Biometrics Surveillance
  • Face Recognition
  • Gait Recognition
  • Visual Surveillance
  • Professor
  • Kostas Plataniotis (kostas_at_comm.utoronto.ca)

4
Object Based Image/Video Processing
  • Semantic processing of frames/video sequences
  • Objects
  • Face, body, suitcase, vehicle, etc.
  • Defined byShape Texture
  • Enables
  • Privacy Protection
  • Event Detection
  • Etc.

5
Object Based Image/Video Processing
  • Requires detection and segmentation
  • Rough box or accurate contour
  • Computer vision and pattern recognition techniques

6
Object Based Coding/Compression
  • Traditional frame/video sequence coding
  • MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000
  • Content unaware
  • Object based coding
  • MPEG-4, ST-SPIHT Wavelet (UofT, Martin and
    Plataniotis 2006)
  • Content aware enabling technology for object
    based processing

CompressionEngine
CompressedData Stream
Video
Frame
ObjectCompressionEngine
Compressed Shape and TextureStream (Object 1)
Compressed Shape and TextureStream (Background)
Compressed Shape and TextureStream (Object 2)
7
Privacy Protection via Object Processing
  • Object obscuration irreversible
  • Object Encryption - reversible

Texture Removal (blackout)
Texture Blur
Decryption Key
8
Privacy Protection via Object Processing
  • SecST-SPIHT Secure Object Coding (UofT, Martin
    and Plataniotis, 2007)
  • Secure texture OR textureshape
  • Encryption can be reversed with correct key
  • Real-time or offline release of key based on
    authority
  • Allows investigation of original content

Original Frame
Secured Texture
SecuredTextureShape
9
Privacy Protection via Object Processing
Law Enforcement
  • Example System Topologies

CentralReal-time Monitor
Local Real-time Monitor
KeyManagement
AuthorizedKey Release
ObjectSegmentation
SecST-SPIHT(secure coding)
Recorder/Storage Server
PhysicalTransfer
10
Privacy Protection via Object Processing
Local Real-time Monitor
  • Example System Topologies

CentralReal-time Monitor
KeyManagement
AuthorizedKey Release
Law Enforcement
ObjectSegmentation
SecST-SPIHT(secure coding)
Recorder/Storage Server
PhysicalTransfer
11
Smart Surveillance Technologies
  • Digital vs. Analog

Digital Analog
Operating Central operation Isolated, site-by-site
Managing Central management Difficult to manage large number of sites
Recording Flexible framerate/quality Fixed framerate/quality
Storing Flexible based on storage, compression parameters highly scalable Tapes requiring substantial storage space potential video loss during tape change
Searching Single query search across multiple storage sites near instantaneous Manual, physical retrieval of tapes
12
Smart Surveillance Technologies
  • General processing stages for smart processing
  • Detected Behaviours
  • Violence
  • Suspected objects
  • Robbery
  • Vandalism
  • Overcrowding
  • Trespassing

EventDetection
ObjectRecognition
Tracking
BehavouralAnalysis
13
Smart Surveillance Technologies
  • Integrated Approach
  • Technical infrastructure
  • Organizational human-led procedures
  • Ethical framework (privacy vs security)
  • Behavioural studies
  • Requirements for Implementation
  • Robust
  • Adaptable
  • Easy installation
  • Off-the-shelf hardware
  • Real-time operation

14
Smart Surveillance Technologies
  • Example Commercial Solutions

Compression Other Features
MC Electronics MPEG-4 Audio, PTZ control, alarm inputs
Visiowave Visiobox 3D Wavelet PTZ control, motion detection 3
Baxall Analog and digital interfaces
Teleeye III NF Wavelet Motion detection, wireless
Sony SNCV10P Wavelet Multiple interfaces, embedded LINUX, built in security
15
END
Write a Comment
User Comments (0)
About PowerShow.com