Download presentation
Presentation is loading. Please wait.
Published byBeverly Perkins Modified over 9 years ago
1
1 Privacy Protected Video Surveillance Sen-ching Samson Cheung Center for Visualization & Virtual Environments Department of Electrical & Computer Engineering University of Kentucky http://www.vis.uky.edu/mialab
2
2 Acknowledgements Graduate Students Vijay Venkatesh Mahalingam Jian Zhao Jithendra K. Paruchuri Research Support Department of Homeland Security Oak Rridge Associated Universities
3
3 What is privacy? To develop human excellence without interference [Aristotle’s Politics 350 B.C.] Control over information about oneself [Warren and Brandeis 1890] …the right most valued by all civilized men — the right to be let alone. - U.S. Supreme Court Justice Louis Brandeis, 1890 …the right most valued by all civilized men — the right to be let alone. - U.S. Supreme Court Justice Louis Brandeis, 1890
4
4 Today’s privacy concerns Electronic Voting E-commerce Medical Records Financial Records Cyber Activities
5
5 Smart video surveillance Biometric theft Multimedia processing RFID tracking Tomorrow’s privacy concerns
6
6 Privacy Protection Technology Technologies that aim at protecting personal privacy without compromising the “legitimate” use of information. Main PPT include the followings: Encryption Tools Platform for Privacy Preferences (P3P) Automated Privacy Audit Anonymizer Privacy Protected Data mining Is privacy protection of multimedia any different?
7
7 Challenges from Multimedia What to protect? Identify semantic objects for protection How to protect it? Reliable protection without losing perceptual utility How to control it? Flexible control and secure authentication of privacy data
8
8 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management Portable AV devices Evaluation of audio privacy protections Secure Distributed Processing
9
9 Overview Object Identification and Tacking Obfuscation Secure Data Hiding Surveillance Video Database Subject Identification Module Secure Camera System Privacy Data Management System
10
10 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management
11
11 Video Obfuscation Original Pixelation/ Blurring Black Out In-painted
12
12 Challenges of Video Inpainting
13
13 Dynamic Object In-painting Basic idea: Using object template extracted form other time instant to complete a conceptually consistent sequence. Steps: 1. Similarity based on optimal alignment 2. Motion continuity 3. Positioning of templates ?
14
14 Motion Continuity ??
15
15 Object-based Video In-painting Better motion in-painting by better registration and task separation Capable to in-paint partially and completely occluded objects Improved computational performance (Matlab) Number of frames with complete occlusion Number of frames with partial occlusion
16
16 Public-domain Sequences
17
17 Complex Sequences
18
18 Talk Overview Video Surveillance Subject Identification Optimal Camera Network Video Obfuscation Privacy Data Management
19
19 Privacy Data Management Subject A Subject B Subject C Producer Client A Client B Client C Privacy Protection Key question: How does a client know which subject to ask?
20
20 Three-agent architecture Mediator Agent PK M,SK M Subject Agent PK U,SK U Client Agent PK C,SK C RSA(TOC; PK m ) Step 2 RSA(K; PK U ) TOC: U Step 3 RSA(K; PK U ) Step 4 RSA(K; PK C ) Step 5 RSA(K;PK C ) Step 6 Step 7 AES(V u ; K) Step 1 RSA(K; PK U )U RSA(TOC; PK m ) AES(V u ; K)
21
21 Keeping sensitive information MediumMethodPro Con Separate File Encryption + Cryptographic signature Standard Technology Storage efficiency Pervious to attacker Difficult to distribute with the modified video Separate authentication for modified video Meta-dataEncryption + Cryptographic signature Standard Technology Storage efficiency Less pervious to attacker Depend on format Data hiding Encrypted watermark Impervious to attacker Inseparable from data Joint authentication May need more storage May affect visual quality
22
22 Data Hiding for Privacy Data Preservation
23
23 Data Hiding Data hiding/Stenography/Watermarking Active research in the past fifteen years Typical applications include authentication, copy detection, monitoring Challenges in our application: Picture-in-picture: large embedding capacity Compatibility with existing compression scheme Minimal visual distortion
24
24 Optimal Data Hiding Psycho-visual Modeling Block-based Rate-Distortion Calculation Discrete Optimization Solve constrained optimization Combined rate- distortion cost C(x) Combined rate- distortion cost C(x) # embedded bits
25
25 Proposed Data Hiding Motion Compensation DCT Entropy Coding DCT Domain Frequency, contrast and luminance masking [Watson] H.263 Encrypted foreground video bit-stream DCT Perceptual Mask Parity Embedding R-D Optimization Positions of the “optimal’ DCT coeff for embedding DCT(i,j) = watermark_bit+ 2*round(DCT(i,j)/2) Privacy protected video Last decoded frame J. Paruchuri & S.-C. Cheung “Rate- Distortion Optimized Data Hiding for Privacy Protection” submitted to ISCAS 2008
26
26 R-D framework Target cost function: R i = Increase in Bandwidth of Block i D i = Perceptual Distortion in Block i δ = Relative Weight Greedy embedding of P data bits in Block i: Lagrangian optimization: determine the optimal P i and λ to embed the target number of data bits:
27
27 Examples 1/2 119kbps No data Distortion 637 kbps 81 kbps data Rate & Distortion 562 kbps 81 kbps data Rate only 370 kbps 81 kbps data
28
28 Examples 2/2 406.3kbps No data Distortion 743 kbps 81 kbps data Rate & Distortion 678 kbps 81 kbps data Rate only 610 kbps 81 kbps data
29
29 Conclusions Privacy Protecting Video Surveillance Visual Tagging for subject identification Optimized camera network for visual tagging In-painting for video obfuscation Privacy Data Management R-D optimized watermarking Current Research Video In-painting in crowded environment Performance Evaluation for PPT Secure Reversible Modification Audio Privacy Protection Signal processing in encrypted domain
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.