Privacy Protection for Life-log Video Jayashri Chaudhari, Sen-ching S. Cheung, M. Vijay Venkatesh Department of Electrical and Computer Engineering Center.

Slides:



Advertisements
Similar presentations
Edna Greene Medford, Ph.D. Department of History.
Advertisements

                      Digital Audio 1.
Kien A. Hua Division of Computer Science University of Central Florida.
International Conference on Automatic Face and Gesture Recognition, 2006 A Layered Deformable Model for Gait Analysis Haiping Lu, K.N. Plataniotis and.
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Department of Electrical and Computer Engineering He Zhou Hui Zheng William Mai Xiang Guo Advisor: Professor Patrick Kelly ASLLENGE.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
6/3/20151 Voice Transformation : Speech Morphing Gidon Porat and Yizhar Lavner SIPL – Technion IIT December
LYU0103 Speech Recognition Techniques for Digital Video Library Supervisor : Prof Michael R. Lyu Students: Gao Zheng Hong Lei Mo.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Feature vs. Model Based Vocal Tract Length Normalization for a Speech Recognition-based Interactive Toy Jacky CHAU Department of Computer Science and Engineering.
ASR Evaluation Julia Hirschberg CS Outline Intrinsic Methods –Transcription Accuracy Word Error Rate Automatic methods, toolkits Limitations –Concept.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
LYU0103 Speech Recognition Techniques for Digital Video Library Supervisor : Prof Michael R. Lyu Students: Gao Zheng Hong Lei Mo.
1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System Supervisor: Prof Michael Lyu Presented by: Lewis Ng,
Teaching Tool For French Speech Pronunciation Capstone Design Project 2008 Joseph Ciaburri Advisor: Professor Catravas.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
Computer Vision Systems for the Blind and Visually Disabled. STATS 19 SEM Talk 3. Alan Yuille. UCLA. Dept. Statistics and Psychology.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
GCT731 Fall 2014 Topics in Music Technology - Music Information Retrieval Overview of MIR Systems Audio and Music Representations (Part 1) 1.
DIVA - University of Fribourg - Switzerland Seminar presentation, jan Lawrence Michel, MSc Student Portable Meeting Recorder.
Smart Meeting Systems Josh Reilly. Why are Smart Meeting Systems worth studying?
Twenty-First Century Automatic Speech Recognition: Meeting Rooms and Beyond ASR 2000 September 20, 2000 John Garofolo
Multimedia Specification Design and Production 2013 / Semester 2 / week 8 Lecturer: Dr. Nikos Gazepidis
PortableVision-based HCI A Hand Mouse System on Portable Devices 連矩鋒 (Burt C.F. Lien) Computer Science and Information Engineering Department National.
Trends in Computer Vision Automatic Video Surveillance.
Input Devices.  Identify audio and video input devices  List the function of the respective devices.
VISUAL MONITORING OF RAILROAD GRADE CROSSING AND RAILROAD TRACKS University of Central Florida.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Umm Al-Qura University Collage of Computer and Info. Systems Computer Engineering Department Automatic Camera Tracking System IMPLEMINTATION CONCLUSION.
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
PrivacyCam: Tomorrow’s Smart Video Surveillance Technology Presented By - Ankur Chattopadhyay.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal VideoConference Archives Indexing System.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
Pedestrian Detection and Localization
Privacy Protection for Life-log Video Jayashri Chaudhari November 27, 2007 Department of Electrical and Computer Engineering University of Kentucky, Lexington,
MULTIMEDIA INPUT / OUTPUT TECHNOLOGIES INTRODUCTION 6/1/ A.Aruna, Assistant Professor, Faculty of Information Technology.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Controlling Computer Using Speech Recognition (CCSR) Creative Masters Group Supervisor : Dr: Mounira Taileb.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Joint Optimization of Data Hiding and Video Compression Jithendra K. Paruchuri & Sen-ching S. Cheung Department of Electrical and Computer Engineering.
Counting How Many Words You Read
The New Pharmaceutical Audio & Video Player The interactive learning tool that is full of possibilities! from CMO Digital.
Digital Video Library Network Supervisor: Prof. Michael Lyu Student: Ma Chak Kei, Jacky.
1 Privacy Protected Video Surveillance Sen-ching Samson Cheung Center for Visualization & Virtual Environments Department of Electrical & Computer Engineering.
WBI/WCI - SKM 14 July Analysis and Knowledge Extraction from Video & Audio Rick Parent Jim Davis Raghu Machiraju Deleon Wang Department of Computer.
What is Multimedia Anyway? David Millard and Paul Lewis.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Automatic License Plate Recognition for Electronic Payment system Chiu Wing Cheung d.
Digital Video Library - Jacky Ma.
Guillaume-Alexandre Bilodeau
Supervisor: Prof Michael Lyu Presented by: Lewis Ng, Philip Chan
AHED Automatic Human Emotion Detection
Intro to Machine Learning
A Seminar Report On Face Recognition Technology
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Digital Dictation News Gathering.
                      Digital Audio 1.
Dingding Liu* Yingen Xiong† Linda Shapiro* Kari Pulli†
Biometrics.
A maximum likelihood estimation and training on the fly approach
Presentation transcript:

Privacy Protection for Life-log Video Jayashri Chaudhari, Sen-ching S. Cheung, M. Vijay Venkatesh Department of Electrical and Computer Engineering Center for Visualization and Virtual Environment University of Kentucky, Lexington, KY SAFE 2007 (11-13 April), Washington, DC

Outline Motivation and Background Proposed Life-Log System Privacy Protection Methodology Face detection and blocking Voice segmentation and distortion Experimental Results Conclusion

What is a Life-Log System? Applications include Law enforcement Police Questioning Tourism Medical Questioning Journalism “A System that records everything, at every moment and everywhere you go” Existing Systems/work 1)“ MyLifeBits Project”: At Microsoft Research 2)“WearCam” Project: At University of Toronto, Steve Mann 3)“Cylon Systems”: at UK (a portable body worn surveillance system)

Technical Challenges Security and Privacy Information management and storage Information Retrieval Knowledge Discovery Human Computer Interface

Technical Challenges Security and Privacy Information management and storage Information Retrieval Knowledge Discovery Human Computer Interface

Why Privacy Protection? Privacy is fundamental right of every citizen There are no clear and uniform rules and regulations regarding video recording Emerging technologies threaten privacy right People are resistant toward technologies like life-log Without tackling these issues the deployment of such emerging technologies is impossible

Research Contributions Practical audio-visual privacy protection scheme for life-log systems Performance measurement (audio) on Privacy protection Usability

Proposed Life-log System “A system that protects the audiovisual privacy of the persons captured by a portable video recording device”

Privacy Protection Scheme Design Objectives Privacy Hide the identity of the subjects being captured Privacy verses usefulness: Recording still should convey sufficient information to be useful Speed Protection scheme should work in real time. √ Usefulness × Privacy × Usefulness √ Privacy √ Usefulness √ Privacy

System Overview audio Audio Segmentation Audio Distortion Face Detection and Blocking Face Detection and Blocking video Synchronization & Multiplexing storage S P S: Subject (The person who is being recorded) P: Producer (The person who is the user of the system)

Voice Segmentation and distortion State k =State k-1 or Subject or Producer Windowed Power, P k Computation Windowed Power, P k Computation P k <T S P k <T U Y Y State k = Producer State k = Subject Storage Pitch Shifting We use the PitchSOLA time-domain pitch shifting method. * “DAFX: Digital Audio Effects” by U. Z. et al.

Pitch Shifting Algorithm Pitch Shifting : Steps 1) Time Stretching by a factor of α using window of size N and stepsize Sa Input Audio N X1(n) Sa X2(n) α*Sa Step 2) Re-sampling by a factor of 1/α to change pitch X2(n) Km Max correlation to preserve formant Mixing

Face Detection and Blocking camera Face Detection Face Detection Face detection is based on Viola & Jones Face Tracking Face Tracking Subject Selection Subject Selection Selective Blocking Selective Blocking Audio segmentation results Subject talking Producer talking

Experimental Results Three types of experiments Analysis of Segmentation algorithm Analysis of Audio distortion algorithm 1) Accuracy in hiding identity 2) Usability after distortion

Segmentation Experiment Experimental Data: Interview Scenario in quite meeting room Three interviews recording of about 1 minute and 30 seconds long Transitions P S PSP P S Silence S: Subject Speaking P: Producer Speaking 

Segmentation Results Meeting#Transition# (Ground truth) Correctly identified transitions# Falsely detected Transitions# PrecisionRecall

Speaker Identification Experiment Experimental Data 11 Test subjects, 2 voice samples from each subject One voice sample is used as training and the other is used for testing Public domain speaker recognition software Script1 This script is used for training the speaker recognition software Train Test Script2 This script is used to test the performance of audio distortion in hiding the identity

Speaker Identification Results Person ID Without Distortion (Person ID identified) Distortion 1 (Person ID identified) Distortion 2 (Person ID identified) Distortion 3 (Person ID identified) Error Rate 0%100%90.9%100% Distortion 1: (N=2048, Sa=256, α =1.5) Distortion 2: (N=2048, Sa=300, α =1.1) Distortion 3: (N=1024, Sa=128, α =1.5)

Usability Experiments Experimental Data 8 subjects, 2 voice samples from each subject 1 voice is used without distortion and the other is distorted Manual transcription (5 human tester) 1.Wav (transcription1) This transcription is of undistorted voice --- stored in one dot wav file. 2.Wav (transcription2) This transcription is of distorted voice sample --- in two dot wav ---. Manual Transcription Unrecognized words

Usability after distortion Word Error Rate: Standard measure of word recognition error for speech recognition system WER= (S+D+I) /N S = # substitution D = # deletion I = # insertion N = # words in reference sample Tool used: NIST tool SCLITE

Example Video

Conclusions Proposed Real time implementation of voice- distortion and face blocking for privacy protection in Life-log video Analysis of audio distortion for usability Analysis of audio distortion for privacy protection Future Work: Improvement in Segmentation and face blocking Expanding to the larger dataset Expanding to the noisy environment

Acknowledgment People at Center of Visualization and Virtual Environment Department of Homeland Security Thank you!

√ Usefulness × Privacy × Usefulness √ Privacy √ Usefulness √ Privacy