Advertisement

Person De-identification in Videos

  • Prachi Agrawal
  • P. J. Narayanan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5996)

Abstract

Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people through services like Google Street View, EveryScape, etc. A large number of cameras oversee public and semi-public spaces today. These raise concerns on the unintentional and unwarranted invasion of the privacy of individuals caught in the videos. To address these concerns, automated methods to de-identify individuals in these videos are necessary. De-identification does not aim at destroying all information involving the individuals. Its goals are to obscure the identity of the actor without obscuring the action. This paper outlines the scenarios in which de-identification is required and the issues brought out by those. We also present a preliminary approach to de-identify individuals from videos. A bounding box around each individual present in a video is tracked through the video. An outline of the individuals is approximated by carrying out segmentation on a 3-D Graph of space-time voxels. We explore two de-identification transformations: exponential space-time blur and line integral convolution. We show results on a number of public videos and videos collected in a plausible setting. We also present the preliminary results of a user-study to validate the effectiveness of the de-identification schemes.

Keywords

User Study Privacy Protection Foreground Pixel Smoothness Term Computer Vision Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Collins, R.T., Gross, R., Shi, J.: Silhouette-based human identification from body shape and gait. In: Proceedings of IEEE Conference on Face and Gesture Recognition, pp. 351–356 (2002)Google Scholar
  2. 2.
    Yoo, J.H., Hwang, D., Nixon, M.S.: Gender classification in human gait using support vector machine. In: Blanc-Talon, J., Philips, W., Popescu, D.C., Scheunders, P. (eds.) ACIVS 2005. LNCS, vol. 3708, pp. 138–145. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: CVPR (1), pp. 886–893. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  4. 4.
    Tu, P., Sebastian, T., Doretto, G., Krahnstoever, N., Rittscher, J., Yu, T.: Unified crowd segmentation. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part IV. LNCS, vol. 5305, pp. 691–704. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Boykov, Y., Jolly, M.P.: Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images. In: ICCV, pp. 105–112 (2001)Google Scholar
  6. 6.
    Rother, C., Kolmogorov, V., Blake, A.: Grabcut: interactive foreground extraction using iterated graph cuts. ACM Trans. Graph. 23(3), 309–314 (2004)CrossRefGoogle Scholar
  7. 7.
    Cabral, B., Leedom, L.C.: Imaging vector fields using line integral convolution. In: SIGGRAPH 1993: Proc. on Computer graphics and interactive techniques, pp. 263–270. ACM, New York (1993)CrossRefGoogle Scholar
  8. 8.
    Senior, A.W.: Privacy enablement in a surveillance system. In: ICIP, pp. 1680–1683 (2008)Google Scholar
  9. 9.
    Yu, X., Chinomi, K., Koshimizu, T., Nitta, N., Ito, Y., Babaguchi, N.: Privacy protecting visual processing for secure video surveillance. In: ICIP, pp. 1672–1675 (2008)Google Scholar
  10. 10.
    Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying facial images. IEEE Transactions on Knowledge and Data Engineering 17, 232–243 (2003)CrossRefGoogle Scholar
  11. 11.
    Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227–242. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Gross, R., Sweeney, L., la Torre, F.D., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: IEEE CVPR (2008)Google Scholar
  13. 13.
    Phillips, P.: Privacy operating characteristic for privacy protection in surveillance applications, p. 869 (2005)Google Scholar
  14. 14.
    Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW, pp. 1–10 (2000)Google Scholar
  15. 15.
    Neustaedter, C., Greenberg, S., Boyle, M.: Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans. Comput.-Hum. Interact. 13(1), 1–36 (2006)CrossRefGoogle Scholar
  16. 16.
    Agarwala, A., Dontcheva, M., Agrawala, M., Drucker, S.M., Colburn, A., Curless, B., Salesin, D., Cohen, M.F.: Interactive digital photomontage. ACM Trans. Graph. 23(3), 294–302 (2004)CrossRefGoogle Scholar
  17. 17.
    Blanz, V., Scherbaum, K., Vetter, T., Seidel, H.P.: Exchanging faces in images. Comput. Graph. Forum 23(3), 669–676 (2004)CrossRefGoogle Scholar
  18. 18.
    Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P., Nayar, S.K.: Face swapping: automatically replacing faces in photographs. ACM Trans. Graph. 27(3), 1–8 (2008)CrossRefGoogle Scholar
  19. 19.
    Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Advances in Signal Processing 2007(1), 107–107 (2007)Google Scholar
  20. 20.
    Park, S., Trivedi, M.: A track-based human movement analysis and privacy protection system adaptive to environmental contexts, pp. 171–176 (2005)Google Scholar
  21. 21.
    Zhang, W., Cheung, S.C.S., Chen, M.: Hiding privacy information in video surveillance system. In: ICIP (3), pp. 868–871 (2005)Google Scholar
  22. 22.
    Cheung, S.C.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: ICIP, pp. 1676–1679 (2008)Google Scholar
  23. 23.
    Ren, X., Berg, A.C., Malik, J.: Recovering human body configurations using pairwise constraints between parts. In: ICCV, pp. 824–831. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  24. 24.
    Mori, G., Malik, J.: Recovering 3d human body configurations using shape contexts. IEEE Trans. Pattern Anal. Mach. Intell. 28(7), 1052–1062 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Prachi Agrawal
    • 1
  • P. J. Narayanan
    • 1
  1. 1.Center for Visual Information TechnologyIIITHyderabadIndia

Personalised recommendations