1 Privacy Protected Video Surveillance Sen-ching Samson Cheung Center for Visualization & Virtual Environments Department of Electrical & Computer Engineering.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Digital rights management Audio watermark Jiamian.
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
ADVISE: Advanced Digital Video Information Segmentation Engine
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Watermarking For Image Authentication Presented by San-Hao Wang.
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER 2011 Qian Zhang, King Ngi Ngan Department of Electronic Engineering, the Chinese university.
1 Motivation Video Communication over Heterogeneous Networks –Diverse client devices –Various network connection bandwidths Limitations of Scalable Video.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
MPEG: (Moving Pictures Expert Group) A Video Compression Standard for Multimedia Applications Seo Yeong Geon Dept. of Computer Science in GNU.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Privacy Protection for Life-log Video Jayashri Chaudhari, Sen-ching S. Cheung, M. Vijay Venkatesh Department of Electrical and Computer Engineering Center.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multimedia Security Part I: Digital Watermarking Subrata Acharya CS 2310, Spring 2007.
Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Embedding in Compressed UAV Video via Digital.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
09/30/2005ENEE408G Fall 2005 Multimedia Signal Processing 1 ENEE408G: Capstone Design Project: Multimedia Signal Processing Design Project 2: Digital Audio.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Joint Optimization of Data Hiding and Video Compression Jithendra K. Paruchuri & Sen-ching S. Cheung Department of Electrical and Computer Engineering.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Automatic Video Shot Detection from MPEG Bit Stream
CS644 Advanced Topics in Networking
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
State of the art – Part 1 Xin Jin
DONE BY S.MURALIRAJAN M.NIRMAL
Error Concealment In The Pixel Domain And MATLAB commands
Watermarking for Image Authentication ( Fragile Watermarking )
Recent Developments on Multimedia and Secure Networking Technologies
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Chair Professor Chin-Chen Chang Feng Chia University
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Recent Developments on Multimedia and Secure Networking Technologies
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Presentation transcript:

1 Privacy Protected Video Surveillance Sen-ching Samson Cheung Center for Visualization & Virtual Environments Department of Electrical & Computer Engineering University of Kentucky

2 Acknowledgements Graduate Students Vijay Venkatesh Mahalingam Jian Zhao Jithendra K. Paruchuri Research Support Department of Homeland Security Oak Rridge Associated Universities

3 What is privacy? To develop human excellence without interference [Aristotle’s Politics 350 B.C.] Control over information about oneself [Warren and Brandeis 1890] …the right most valued by all civilized men — the right to be let alone. - U.S. Supreme Court Justice Louis Brandeis, 1890 …the right most valued by all civilized men — the right to be let alone. - U.S. Supreme Court Justice Louis Brandeis, 1890

4 Today’s privacy concerns Electronic Voting E-commerce Medical Records Financial Records Cyber Activities

5 Smart video surveillance Biometric theft Multimedia processing RFID tracking Tomorrow’s privacy concerns

6 Privacy Protection Technology Technologies that aim at protecting personal privacy without compromising the “legitimate” use of information. Main PPT include the followings: Encryption Tools Platform for Privacy Preferences (P3P) Automated Privacy Audit Anonymizer Privacy Protected Data mining Is privacy protection of multimedia any different?

7 Challenges from Multimedia What to protect? Identify semantic objects for protection How to protect it? Reliable protection without losing perceptual utility How to control it? Flexible control and secure authentication of privacy data

8 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management Portable AV devices Evaluation of audio privacy protections Secure Distributed Processing

9 Overview Object Identification and Tacking Obfuscation Secure Data Hiding Surveillance Video Database Subject Identification Module Secure Camera System Privacy Data Management System

10 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management

11 Video Obfuscation Original Pixelation/ Blurring Black Out In-painted

12 Challenges of Video Inpainting

13 Dynamic Object In-painting Basic idea: Using object template extracted form other time instant to complete a conceptually consistent sequence. Steps: 1. Similarity based on optimal alignment 2. Motion continuity 3. Positioning of templates ?

14 Motion Continuity ??

15 Object-based Video In-painting Better motion in-painting by better registration and task separation Capable to in-paint partially and completely occluded objects Improved computational performance (Matlab) Number of frames with complete occlusion Number of frames with partial occlusion

16 Public-domain Sequences

17 Complex Sequences

18 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management

19 Privacy Data Management Subject A Subject B Subject C Producer Client A Client B Client C Privacy Protection Key question: How does a client know which subject to ask?

20 Three-agent architecture Mediator Agent PK M,SK M Subject Agent PK U,SK U Client Agent PK C,SK C RSA(TOC; PK m ) Step 2 RSA(K; PK U ) TOC: U Step 3 RSA(K; PK U ) Step 4 RSA(K; PK C ) Step 5 RSA(K;PK C ) Step 6 Step 7 AES(V u ; K) Step 1 RSA(K; PK U )U RSA(TOC; PK m ) AES(V u ; K)

21 Keeping sensitive information MediumMethodPro Con Separate File Encryption + Cryptographic signature Standard Technology Storage efficiency Pervious to attacker Difficult to distribute with the modified video Separate authentication for modified video Meta-dataEncryption + Cryptographic signature Standard Technology Storage efficiency Less pervious to attacker Depend on format Data hiding Encrypted watermark Impervious to attacker Inseparable from data Joint authentication May need more storage May affect visual quality

22 Data Hiding for Privacy Data Preservation

23 Data Hiding Data hiding/Stenography/Watermarking Active research in the past fifteen years Typical applications include authentication, copy detection, monitoring Challenges in our application: Picture-in-picture: large embedding capacity Compatibility with existing compression scheme Minimal visual distortion

24 Optimal Data Hiding Psycho-visual Modeling Block-based Rate-Distortion Calculation Discrete Optimization Solve constrained optimization Combined rate- distortion cost C(x) Combined rate- distortion cost C(x) # embedded bits

25 Proposed Data Hiding Motion Compensation DCT Entropy Coding DCT Domain Frequency, contrast and luminance masking [Watson] H.263 Encrypted foreground video bit-stream DCT Perceptual Mask Parity Embedding R-D Optimization Positions of the “optimal’ DCT coeff for embedding DCT(i,j) = watermark_bit+ 2*round(DCT(i,j)/2) Privacy protected video Last decoded frame J. Paruchuri & S.-C. Cheung “Rate- Distortion Optimized Data Hiding for Privacy Protection” submitted to ISCAS 2008

26 R-D framework Target cost function: R i = Increase in Bandwidth of Block i D i = Perceptual Distortion in Block i δ = Relative Weight Greedy embedding of P data bits in Block i: Lagrangian optimization: determine the optimal P i and λ to embed the target number of data bits:

27 Examples 1/2 119kbps No data Distortion 637 kbps 81 kbps data Rate & Distortion 562 kbps 81 kbps data Rate only 370 kbps 81 kbps data

28 Examples 2/ kbps No data Distortion 743 kbps 81 kbps data Rate & Distortion 678 kbps 81 kbps data Rate only 610 kbps 81 kbps data

29 Conclusions Privacy Protecting Video Surveillance Visual Tagging for subject identification Optimized camera network for visual tagging In-painting for video obfuscation Privacy Data Management R-D optimized watermarking Current Research Video In-painting in crowded environment Performance Evaluation for PPT Secure Reversible Modification Audio Privacy Protection Signal processing in encrypted domain