Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
DVS Sales Guide for 1-Ch MPEG4 Video Server
Kien A. Hua Division of Computer Science University of Central Florida.
A new Network Concept for transporting and storing digital video…………
CONFIDENTIAL University of Toronto Multimedia Lab Karl Martin | Prof. Kostas.
INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, ICT '09. TAREK OUNI WALID AYEDI MOHAMED ABID NATIONAL ENGINEERING SCHOOL OF SFAX New Low Complexity.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Automatic Video Shot Detection from MPEG Bit Stream Jianping Fan Department of Computer Science University of North Carolina at Charlotte Charlotte, NC.
AXIS Camera Station Flexible surveillance software for your Axis network video products Sales Presentation Welcome to this short presentation of the.
XProtect® Expert 2013 Product presentation
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Visual Event Detection & Recognition Filiz Bunyak Ersoy, Ph.D. student Smart Engineering Systems Lab.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
Fifth International Conference on Information
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
FIT3105 Biometric based authentication and identity management
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
AceMedia Personal content management in a mobile environment Jonathan Teh Motorola Labs.
Real-time and Retrospective Analysis of Video Streams and Still Image Collections using MPEG-7 Ganesh Gopalan, College of Oceanic and Atmospheric Sciences,
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
The Role of Computers in Surveillance ~ Katie Hatland.
Visual Information Retrieval Chapter 1 Introduction Alberto Del Bimbo Dipartimento di Sistemi e Informatica Universita di Firenze Firenze, Italy.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
Overview Presentation MKT-CODE-P-001E. Introduction Single Channel Codec designed to increase the flexibility of NetVu Connected analogue/IP CCTV networks.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
XProtect ® Enterprise. XProtect Enterprise is comprehensive IP video surveillance software with interactive monitoring capabilities The perfect match.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
Introduction - IP8151 SUPREME Night Visibility Best choice for Day/Night Security.
Introduction to ECE432 Instructor: Ying Wu Dept. Electrical & Computer Engr. Northwestern University Evanston, IL 60208
Ten Reasons to Buy a Network Camera. Focus 10 of the most important functional differences between analog and network cameras.
Real-Time Human Posture Reconstruction in Wireless Smart Camera Networks Chen Wu, Hamid Aghajan Wireless Sensor Network Lab, Stanford University, USA IPSN.
Trends in Computer Vision Automatic Video Surveillance.
Motion Object Segmentation, Recognition and Tracking Huiqiong Chen; Yun Zhang; Derek Rivait Faculty of Computer Science Dalhousie University.
Multimedia Information Retrieval and Multimedia Data Mining Chengcui Zhang Assistant Professor Dept. of Computer and Information Science University of.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Computer Vision – Overview Hanyang University Jong-Il Park.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
MACHINE VISION Machine Vision System Components ENT 273 Ms. HEMA C.R. Lecture 1.
Prototype 3: MI prototype for video surveillance and biometry CVDSP-UJI Computer Vision Group – UJI Digital Signal Processing Group – UV November 2010.
In-Car Video Management: Technology and Trends. Agenda Things to Consider –Analog vs. Digital What Makes a good Video Solution It’s All about Protection.
Efficient Visual Object Tracking with Online Nearest Neighbor Classifier Many slides adapt from Steve Gu.
Joint Optimization of Data Hiding and Video Compression Jithendra K. Paruchuri & Sen-ching S. Cheung Department of Electrical and Computer Engineering.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Digital Video Library Network Supervisor: Prof. Michael Lyu Student: Ma Chak Kei, Jacky.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
Secure Scalable Multimedia Streaming Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
IP Speed Dome Solution 2006-Feb-22.
Visual Information Retrieval
Automatic Video Shot Detection from MPEG Bit Stream
FACE RECOGNITION TECHNOLOGY
State of the art – Part 1 Xin Jin
LCD Network Monitor.
Image and Video Processing – An Introduction
An Overview of MPEG-21 Cory McKay.
A New Technology for Video Surveillance Cameron Serles
XProtect® progression over time
Presentation transcript:

Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008

2 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Overview Introduction Object Based Image/Video Processing Object Based Coding/Compression Privacy Protection via Object Processing Smart Surveillance Technologies

3 Digital Signal Processing Image and Video Processing Digital Camera Processing cDNA Micro-array Imaging Visual Object Compression Universal Multimedia Access Multimedia Security Authentication & Fingerprinting Image and Video Encryption Visual Secret Sharing Secure Streaming Watermarking Biometrics & Surveillance Face Recognition Gait Recognition Visual Surveillance Professor: Kostas Plataniotis

4 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Object Based Image/Video Processing Semantic processing of frames/video sequences Objects: –Face, body, suitcase, vehicle, etc. –Defined by: Shape + Texture Enables: –Privacy Protection –Event Detection –Etc.

5 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Object Based Image/Video Processing Requires detection and segmentation –Rough box or accurate contour –Computer vision and pattern recognition techniques

6 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Object Based Coding/Compression Traditional frame/video sequence coding –MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000 –Content unaware Object based coding –MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006) –Content aware – enabling technology for object based processing Video Compression Engine Compressed Data Stream Frame Object Compression Engine Compressed Shape and Texture Stream (Object 1) Compressed Shape and Texture Stream (Background) Compressed Shape and Texture Stream (Object 2)

7 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Privacy Protection via Object Processing Object obscuration – irreversible Object Encryption - reversible Texture Removal (blackout) Texture Blur Decryption Key

8 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Privacy Protection via Object Processing SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007) –Secure texture OR texture+shape Encryption can be reversed with correct key –Real-time or offline release of key based on authority –Allows investigation of original content Original FrameSecured TextureSecured Texture+Shape

9 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Privacy Protection via Object Processing Example System Topologies Object Segmentation SecST-SPIHT (secure coding) Recorder/ Storage Server Authorized Key Release Local Real-time Monitor Central Real-time Monitor Law Enforcement Physical Transfer Key Management

10 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Privacy Protection via Object Processing Example System Topologies Object Segmentation Recorder/ Storage Server Authorized Key Release Local Real-time Monitor Central Real-time Monitor Law Enforcement Physical Transfer Key Management SecST-SPIHT (secure coding)

11 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Smart Surveillance Technologies Digital vs. Analog DigitalAnalog Operating Central operationIsolated, site-by-site Managing Central managementDifficult to manage large number of sites Recording Flexible framerate/qualityFixed framerate/quality Storing Flexible based on storage, compression parameters – highly scalable Tapes requiring substantial storage space – potential video loss during tape change Searching Single query search across multiple storage sites – near instantaneous Manual, physical retrieval of tapes

12 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Smart Surveillance Technologies General processing stages for smart processing Detected Behaviours –Violence –Suspected objects –Robbery –Vandalism –Overcrowding –Trespassing Event Detection Object Recognition Tracking Behavoural Analysis

13 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Smart Surveillance Technologies Integrated Approach –Technical infrastructure –Organizational human-led procedures –Ethical framework (privacy vs security) –Behavioural studies Requirements for Implementation –Robust –Adaptable –Easy installation –Off-the-shelf hardware –Real-time operation

14 Confidential - Not to be reproduced without permissionFebruary 6, 2008 Smart Surveillance Technologies Example Commercial Solutions CompressionOther Features MC Electronics MPEG-4Audio, PTZ control, alarm inputs Visiowave Visiobox 3D WaveletPTZ control, motion detection 3 Baxall Analog and digital interfaces Teleeye III+ NF WaveletMotion detection, wireless Sony SNCV10P WaveletMultiple interfaces, embedded LINUX, built in security

15 Confidential - Not to be reproduced without permissionFebruary 6, 2008 END