Object Based Processing for Privacy Protected Surveillance

15
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008

description

Object Based Processing for Privacy Protected Surveillance. Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering February 6, 2008. Overview. Introduction Object Based Image/Video Processing Object Based Coding/Compression - PowerPoint PPT Presentation

Transcript of Object Based Processing for Privacy Protected Surveillance

Page 1: Object Based Processing for Privacy Protected Surveillance

Object Based Processing for Privacy Protected Surveillance

Karl MartinKostas N. Plataniotis

University of TorontoDept. of Electrical and Computer Engineering

February 6, 2008

Page 2: Object Based Processing for Privacy Protected Surveillance

2Confidential - Not to be reproduced without permissionFebruary 6, 2008

Overview

Introduction

Object Based Image/Video Processing

Object Based Coding/Compression

Privacy Protection via Object Processing

Smart Surveillance Technologies

Page 3: Object Based Processing for Privacy Protected Surveillance

3

Digital Signal Processing

Image and Video Processing

• Digital Camera Processing• cDNA Micro-array Imaging• Visual Object Compression• Universal Multimedia Access

Multimedia Security

• Authentication & Fingerprinting• Image and Video Encryption• Visual Secret Sharing• Secure Streaming• Watermarking

Biometrics & Surveillance

• Face Recognition• Gait Recognition• Visual Surveillance

Professor:• Kostas Plataniotis

([email protected])

Page 4: Object Based Processing for Privacy Protected Surveillance

4Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Image/Video Processing

Semantic processing of frames/video sequences Objects:

– Face, body, suitcase, vehicle, etc.– Defined by:

Shape + Texture

Enables:– Privacy Protection– Event Detection– Etc.

Page 5: Object Based Processing for Privacy Protected Surveillance

5Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Image/Video Processing

Requires detection and segmentation– Rough box or accurate contour

– Computer vision and pattern recognition techniques

Page 6: Object Based Processing for Privacy Protected Surveillance

6Confidential - Not to be reproduced without permissionFebruary 6, 2008

Object Based Coding/Compression

Traditional frame/video sequence coding– MPEG-1/2/4, H.263, Motion JPEG, Motion JPEG2000– Content unaware

Object based coding– MPEG-4, ST-SPIHT Wavelet (UofT, Martin and Plataniotis 2006)– Content aware – enabling technology for object based processing

VideoCompression

EngineCompressedData Stream

FrameObject

CompressionEngine

Compressed Shape and TextureStream (Object 1)

Compressed Shape and TextureStream (Background)

Compressed Shape and TextureStream (Object 2)

Page 7: Object Based Processing for Privacy Protected Surveillance

7Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Object obscuration – irreversible

Object Encryption - reversible

Texture Removal (blackout)

Texture Blur

Decryption Key

Page 8: Object Based Processing for Privacy Protected Surveillance

8Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

SecST-SPIHT Secure Object Coding (UofT, Martin and Plataniotis, 2007)– Secure texture OR texture+shape

Encryption can be reversed with correct key– Real-time or offline release of key based on authority– Allows investigation of original content

Original Frame Secured Texture SecuredTexture+Shape

Page 9: Object Based Processing for Privacy Protected Surveillance

9Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Example System Topologies

ObjectSegmentation

SecST-SPIHT(secure coding)

Recorder/Storage Server

AuthorizedKey Release

Local Real-time Monitor

CentralReal-time Monitor

Law Enforcement

PhysicalTransfer

KeyManagement

Page 10: Object Based Processing for Privacy Protected Surveillance

10Confidential - Not to be reproduced without permissionFebruary 6, 2008

Privacy Protection via Object Processing

Example System Topologies

ObjectSegmentation

Recorder/Storage Server

AuthorizedKey Release

Local Real-time Monitor

CentralReal-time Monitor

Law Enforcement

PhysicalTransfer

KeyManagement

SecST-SPIHT(secure coding)

Page 11: Object Based Processing for Privacy Protected Surveillance

11Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Digital vs. Analog

Digital Analog

Operating Central operation Isolated, site-by-site

Managing Central management Difficult to manage large number of sites

Recording Flexible framerate/quality Fixed framerate/quality

Storing Flexible based on storage, compression parameters – highly scalable

Tapes requiring substantial storage space – potential video loss during tape change

Searching Single query search across multiple storage sites – near instantaneous

Manual, physical retrieval of tapes

Page 12: Object Based Processing for Privacy Protected Surveillance

12Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

General processing stages for smart processing

Detected Behaviours – Violence– Suspected objects– Robbery– Vandalism– Overcrowding– Trespassing

EventDetection

ObjectRecognition

TrackingBehavoural

Analysis

Page 13: Object Based Processing for Privacy Protected Surveillance

13Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Integrated Approach– Technical infrastructure– Organizational human-led procedures– Ethical framework (privacy vs security)– Behavioural studies

Requirements for Implementation– Robust– Adaptable– Easy installation– Off-the-shelf hardware– Real-time operation

Page 14: Object Based Processing for Privacy Protected Surveillance

14Confidential - Not to be reproduced without permissionFebruary 6, 2008

Smart Surveillance Technologies

Example Commercial Solutions

Compression Other Features

MC Electronics MPEG-4 Audio, PTZ control, alarm inputs

Visiowave Visiobox 3D Wavelet PTZ control, motion detection 3

Baxall Analog and digital interfaces

Teleeye III+ NF Wavelet Motion detection, wireless

Sony SNCV10P Wavelet Multiple interfaces, embedded

LINUX, built in security

Page 15: Object Based Processing for Privacy Protected Surveillance

15Confidential - Not to be reproduced without permissionFebruary 6, 2008

END