Results 1 - 10
of
45
fficient object-based video inpainting
- in Proceedings of the 13th IEEE International Conference on Image Processing
, 2006
"... Video inpainting describes the process of removing a portion of a video and filling in the missing part (hole) in a visually consistent manner. Most existing video inpainting techniques are computationally intensive and cannot handle large holes. In this paper, we propose a complete and efficient vi ..."
Abstract
-
Cited by 33 (7 self)
- Add to MetaCart
(Show Context)
Video inpainting describes the process of removing a portion of a video and filling in the missing part (hole) in a visually consistent manner. Most existing video inpainting techniques are computationally intensive and cannot handle large holes. In this paper, we propose a complete and efficient video inpainting system. Our system applies different strategies to handle static and dynamic portions of the hole. To inpaint the static portion, our system uses background replacement and image inpainting techniques. To inpaint moving objects in the hole, we utilizes background subtraction and object segmentation to extract a set of object templates and perform optimal object interpolation using dynamic programming. We evaluate the performance of our system based on a set of indoor surveillance sequences with different types of occlusions. Index Terms — Video signal processing, Interpolation,
Virtual walls: Protecting digital privacy in pervasive environments
- In Proceedings of the Fifth International Conference on Pervasive Computing (Pervasive), volume 4480 of LNCS
, 2007
"... Abstract. As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users ’ contextual information, leading to users unwittingly leaving “digital footprints. ” Users must thus be allowed to c ..."
Abstract
-
Cited by 25 (6 self)
- Add to MetaCart
(Show Context)
Abstract. As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users ’ contextual information, leading to users unwittingly leaving “digital footprints. ” Users must thus be allowed to control how their digital footprints are reported to third parties. While a significant amount of prior work has focused on location privacy, location is only one type of footprint, and we expect most users to be incapable of specifying fine-grained policies for a multitude of footprints. In this paper we present a policy language based on the metaphor of physical walls, and posit that users will find this abstraction to be an intuitive way to control access to their digital footprints. For example, users understand the privacy implications of meeting in a room enclosed by physical walls. By allowing users to deploy “virtual walls, ” they can control the privacy of their digital footprints much in the same way they control their privacy in the physical world. We present a policy framework and model for virtual walls with three levels of transparency that correspond to intuitive levels of privacy, and the results of a user study that indicates that our model is easy to understand and use. 1
Privacy considerations in awareness systems: designing with privacy in mind,”
- in Awareness Systems, ser. Human-Computer Interaction Series,
, 2009
"... ..."
(Show Context)
Subjective study of privacy filters in video surveillance
- In accepted in 14th international workshop on multimedia signal processing MMSP2012, Banf
, 2012
"... Abstract—Extensive adoption of video surveillance, affecting many aspects of the daily life, alarms the concerned public about the increasing invasion into personal privacy. Therefore, to address privacy issues, many tools have been proposed for protection of personal privacy in image and video. How ..."
Abstract
-
Cited by 12 (4 self)
- Add to MetaCart
(Show Context)
Abstract—Extensive adoption of video surveillance, affecting many aspects of the daily life, alarms the concerned public about the increasing invasion into personal privacy. Therefore, to address privacy issues, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks. In this paper, we propose a subjective evaluation methodology to analyze the tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. As an example, the proposed method is used to compare several commonly employed privacy protection techniques, such as blurring, pixelization, and masking applied to indoor surveillance video. The results show that, for the test material under analysis, the pixelization filter provides the best performance in terms of balance between privacy protection and intelligibility. I.
Security and Privacy for Distributed Multimedia Sensor Networks
, 2008
"... In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved. ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved.
Using Face Morphing to Protect Privacy
"... The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the sys ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
(Show Context)
The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important properties such as security of protected visual data, reversibility (ability to undo privacy protection), simplicity, and independence from the video encoding used. To overcome these shortcomings, in this paper, we propose a morphing-based privacy protection method and focus on its robustness, reversibility, and security properties. We morph faces from a standard FERET dataset and run face detection and recognition algorithms on the resulted images to demonstrate that morphed faces retain the likeness of a face, while making them unrecognizable, which ensures the protection of privacy. Our experiments also demonstrate the influence of morphing strength on robustness and security. We also show how to determine the right parameters of the method. 1.
Privacy Protection for Life-Log Video
- Proc. IEEE Workshop Signal Processing Applications for Public Security and Forensics, IEEE Press, 2007
"... Abstract — Recent advances in wearable cameras and storage devices allow us to record the holistic human experience for an extended period of time. Such a life-log system can capture audio-visual data anywhere and at any time. It has a wide range of applications from law enforcement, journalism, med ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
(Show Context)
Abstract — Recent advances in wearable cameras and storage devices allow us to record the holistic human experience for an extended period of time. Such a life-log system can capture audio-visual data anywhere and at any time. It has a wide range of applications from law enforcement, journalism, medicine to personal archival. On the other hand, there is a natural apprehension towards such an intrusive system as the audiovisual information of unsuspecting subjects captured in the life-log video may be misused. Thus, along with the technical challenges, the privacy and legal issues arising in such recordings must be carefully addressed. In this paper, we describe a wearable life-log system that combines real-time audio distortion and visual blocking to protect the privacy of the subjects captured in life-log video. For audio, our system automatically isolates the subject’s speech and distorts it using a pitch-shifting algorithm to conceal the identity. For video, our system uses a real-time face detection, tracking and blocking algorithm to obfuscate the faces of the subjects. Extensive experiments have been conducted on interview videos to demonstrate the ability of our system in protecting the identity of the subject while maintaining the usability of the life-log video. I.
Dynamic Privacy Assessment in a Smart House Environment Using Multimodal Sensing
- ACM Trans. on Multimedia Computing, Commun. and Applications
, 2008
"... Surveillance applications in private environments such as smart houses require a privacy management policy if such systems are to be accepted by the occupants of the environment. This is due to the invasive nature of surveillance, and the private nature of the home. In this article, we propose a fra ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Surveillance applications in private environments such as smart houses require a privacy management policy if such systems are to be accepted by the occupants of the environment. This is due to the invasive nature of surveillance, and the private nature of the home. In this article, we propose a framework for dynamically altering the privacy policy applied to the monitoring of a smart house based on the situation within the environment. Initially the situation, or context, within the environment is determined; we identify several factors for determining environmental context, and propose methods to quantify the context using audio and binary sensor data. The context is then mapped to an appropriate privacy policy, which is implemented by applying data hiding techniques to control access to data gathered from various information sources. The significance of this work lies in the examination of privacy issues related to assisted-living smart house environments. A single privacy policy in such applications would be either too restrictive for an observer, for example, a carer, or too invasive for the occupants. We address this by proposing a dynamic method, with the aim of decreasing the invasiveness of the technology, while retaining the purpose of the system.
Privacy-Preserving Event Detection in Pervasive Spaces
"... Pervasive applications often require gathering information about individuals that may be considered sensitive. Often, one is forced to make a difficult choice: either to risk loss of privacy or to forgo the benefits that pervasive technology offers. Our conjecture is that it is possible to design an ..."
Abstract
-
Cited by 6 (4 self)
- Add to MetaCart
(Show Context)
Pervasive applications often require gathering information about individuals that may be considered sensitive. Often, one is forced to make a difficult choice: either to risk loss of privacy or to forgo the benefits that pervasive technology offers. Our conjecture is that it is possible to design and deploy applications in a pervasive environment that do not come at the expense of individuals ’ privacy. In this paper, we consider event-driven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to detect a variety of application-specific media events. In particular we develop a systems architecture for deploying a surveillance application in such an environment. The privacy challenge corresponds to that of detecting only events that break certain rules without disclosing any identifying information unless necessary. We characterize the nature of various inference channels that arise in designing such a system and determine appropriate security constraints that need to be met. We model privacy-preserving event detection as an optimization problem that attempts to balance disclosure and performance in such a system, and design efficient communication protocols for our proposed architecture. 1
Efficient object based video inpainting
- ICIP
, 2006
"... Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaints foreground objects and background is pr ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
(Show Context)
Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaints foreground objects and background is proposed. Using Dynamic Programming, foreground objects are holistically inpainted with object templates that minimizes a sliding-window dissimilarity cost function. Static background are inpainted by adaptive background replacement and image inpainting.