SlideShare a Scribd company logo
1 of 1
Privacy Protection in Video Surveillance Systems using
                                                                        Scalable Video Coding
                                                     Hosik Sohn1, Esla T. AnzaKu1, Wesley De Neve1, Yong Man Ro1, and Konstantinos N. Plataniotis2
                                                      1Image and Video Systems Lab, Department of Electrical Engineering, KAIST, Daejeon, Korea
                                               2Multimedia Lab, Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada



I. INTRODUCTION
                                                                                                                                                              Layer key generation for scalable video
 SVC can be used to fulfill the requirement of omnipresence in
                                                                                                                                                                                                                                 Let     S   be     a    secret       key.    Then,
 surveillance systems. In this paper, we propose a privacy-protected                                                                                                                     K(1,1) = S1,1||S1,2   Spatial layer 1
 video surveillance system that makes use of Scalable Video Coding
 (SVC). To address privacy concerns, face regions are detected and                                                                                                                                                               where H represents a cryptographic
 subsequently scrambled in the compressed domain.                                                                                                                K(1,0) = S1,1||S0,2
                                                                                                                                                                                             K(0,1) =
                                                                                                                                                                                             S0,1||S1,2
                                                                                                                                                                                                               Spatial layer 0   hash function and where “||”
                                                                                                                                                                                                                                 represents     the      concatenation
II. PROPOSED VIDEO SURVEILLANCE SYSTEM                                                                                                                                                                                           operator. The parameter k either
                                                                                                                                                                     K(0,0) =
                                                                                                                                                                     S0,1||S0,2                                                  denotes spatial scalability (k=1) or
                                                                                                                                                                                                                                 temporal scalability (k=2).
                                                                                                                                                                Temporal layer 0         Temporal layer 1
                                                                                                                                                                                                                                 A sub-key is computed as,
                                                                                                                        PDA
                                                                                                                                                               Figure 7. Use of layer keys and sub-keys

                                                                                                                                                               A layer key for the dth spatial and the ith temporal layer is defined as
                                                                                                                                                               follows:
                     Surveillance
                       camera
                                       Video analyzer
                                       & SVC encoder
                                                            Storage             Transmitter
                                                                                                                        PC                                   III. Experiments
                                                                                                                                                              The video sequence used is “moinas_toni”. This video sequence is
                                                                                                                    Cellular phone                            designed for single person/face visual detection and tracking.
                                    Figure 1. Proposed video surveillance system                                                                              Encoding was done using two spatial layers {QVGA and VGA} and two
                                                                                                                                                              temporal layers {12.5 fps and 25 fps}. At VGA resolution, the average
1. Moving ROIs in SVC
                                                                                                                                                              size of the detected face region is 78 79 pixels (over 200 frames).
 ROI representation
                                                                                                                   Slice group 1                             1. Experimental results
 ROI : privacy-sensitive area (i.e., a face region)
                                                                                                                                                              1) The percentage of increased bits in the ROI for a varying picture
 FMO type 2 : allows defining rectangular ROIs                                                                            Slice group 0
                                                                                                                                                              quality at 25 fps
              (foreground / background)                                                                                                                                                        Table 1. Percentage of increased bits in the ROI

 Updating ROIs in a coded bit stream                                                     Figure 2. Illustration of FMO type 2                                    Size / QP                       25                28             31             34            37              40
                                                                                                                                                                   VGA                         -0.36             -1.89           -0.07          -0.08         -1.42          -3.42
 In order to update the location of an ROI in a coded video bit stream,
                                                                                                                                                                  QVGA                          0.77              0.77           -0.04          -2.09         -3.88           0.04
 additional PPS NAL units need to be inserted.
                                                                                                                                                               2) Privacy-protected surveillance video sequence
 A PPS (Picture Parameter Set) contains the parameters that define an
 ROI, such as slice group map type, the slice group IDs, and the top-left
 and bottom-right address of the slice groups.

      Supplemental enhancement information Video Coding Layer (VCL) NALUs              IDR           Non-IDR               IDR               IDR
            and parameter set NALUs                                             ··
                                                                                 ·                           ··
                                                                                                              ·                       ··
                                                                                                                                       ·                ··
                                                                                                                                                         ·
                                                                                      NALU            NALU                NALU              NALU
      SEI           SPS         PPS             IDR      Non-IDR                       Insertion of PPS             PPS             PPS
              ··
              ·                           ··
                                           ·                     ··
                                                                  ·
     NALU          NALU        NALU            NALU       NALU                            NAL units                NALU            NALU

             Figure 3. SVC bit stream structure                                      Figure 4. Insertion of PPS NAL units                                                                                                                          (b)
                                                                                                                                                                                       (a)
                                                                                                                                                               Figure 8. Privacy-protected surveillance video sequence at (a) QVGA and (b) VGA resolution
2. Privacy protection techniques
                                                                                                                                                               3) Simulation of                                                        4) Level of protection against
 ROI scrambling
                                                                                                                                                                  error concealment attack                                                brute force attack
                                                                                        Enhancement
 For faces with a high                                                                  layer coding

 spatial resolution, only
                                                                                                                             Secret key
 scrambling AC transform                                   Surveillance
                                                                            -                                                ROI
 coefficients in the luma                                     video,                          T/Q
                                                                                                                          scrambling
                                                                                                                                            CAVLC
                                                          ROI coordinates
 domain cannot sufficiently                                                                                Q-1/ T-1                        Compressed
 distort the silhouette of the                                                                                                              bitstream
                                                                                                                                                                              (a)                                (b)
                                                                                                               +
 face.                                                                                                                                                          Figure 9. Simulation of
                                                                                         Intra pred.                                                            (a) the proposed scrambling technique
                                                                                                                                                                (b) an error concealment attack
                                                                                         MC pred.


                                                                                              ME
                                                                                                                                                                                                                                       Figure 10. The average number of CAVLC
                                                                                                                                                                                                                                       levels in the ROI according to the bit rate at
                                                                                                                                                              IV. CONCLUSIONS                                                          QVGA and VGA resolution
       (a)                                                                                           (a)
                                    (b)
 Figure 5. Simulation of                                                                Secret key                                                              We proposed a privacy-protected video surveillance system that
 (a) random sign inversion for luma                       Extracted                       ROI              +                                                    makes use of the SVC standard. For the purpose of privacy protection,
                                                                       CAVLC-1                                         Q-1/ T-1             MC
 AC coefficients at 4CIF resolution                       bitstream                   unscrambling                                                              face regions were detected and subsequently encoded as an ROI
 (b) an error concealment attack
                                                                                                                          Surveillance video
                                                                                                                                                                using FMO type 2. ROIs are scrambled using random sign inversion,
                                                                                                     (b)                                                        having a negligible impact on the coding performance of CAVLC
                                                          Figure 6. Scrambling in SVC: (a) encoder; (b) decoder
                                                                                                                                                                entropy coding. Further, for each layer in an SVC bit stream, the ROI
                                                                                                                                                                is scrambled using a different key in order to ensure a high level of
In the proposed system, random sign inversion is applied to non-zero                                                                                            protection. Finally, the proposed video surveillance system shows
DC and AC transform coefficients of the luma and chroma components.                                                                                             reasonable robustness against brute-force attacks.

More Related Content

What's hot

Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelIDES Editor
 
Differential Modulation and Non-Coherent Detection in Wireless Relay Networks
Differential Modulation and Non-Coherent Detection in Wireless Relay NetworksDifferential Modulation and Non-Coherent Detection in Wireless Relay Networks
Differential Modulation and Non-Coherent Detection in Wireless Relay Networksmravendi
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksAndrea Tassi
 
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...Rosdiadee Nordin
 

What's hot (9)

Neural Networks - How do they work?
Neural Networks - How do they work?Neural Networks - How do they work?
Neural Networks - How do they work?
 
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channelCancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
 
Differential Modulation and Non-Coherent Detection in Wireless Relay Networks
Differential Modulation and Non-Coherent Detection in Wireless Relay NetworksDifferential Modulation and Non-Coherent Detection in Wireless Relay Networks
Differential Modulation and Non-Coherent Detection in Wireless Relay Networks
 
J0535964
J0535964J0535964
J0535964
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
 
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...
An Investigation of Self-Interference Reduction Strategy in Correlated SM-OFD...
 
Lo2520082015
Lo2520082015Lo2520082015
Lo2520082015
 
Dw24779784
Dw24779784Dw24779784
Dw24779784
 
8
88
8
 

Viewers also liked

Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...
Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...
Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...berkeragir
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
Growing your Small business to NEXT level
Growing your Small business to NEXT levelGrowing your Small business to NEXT level
Growing your Small business to NEXT levelKapil Kanugo
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIgor Zboran
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesWesley De Neve
 
ETUDE - Le Quantified Self et l'Assurance Santé
ETUDE - Le Quantified Self et l'Assurance Santé ETUDE - Le Quantified Self et l'Assurance Santé
ETUDE - Le Quantified Self et l'Assurance Santé Yann Fontes
 
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...MediaEval2012
 
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval2012
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyMuhammad Zeeshan
 
Quantified Self meets Responsive Ambient Intelligence
Quantified Self meets Responsive Ambient IntelligenceQuantified Self meets Responsive Ambient Intelligence
Quantified Self meets Responsive Ambient IntelligenceMeera Adhia
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 
HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION bhupesh lahare
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By MatlabAnkit Gujrati
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 

Viewers also liked (20)

Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...
Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...
Semantic and Sensitivity Aware Location-Privacy Protection for the Internet o...
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Growing your Small business to NEXT level
Growing your Small business to NEXT levelGrowing your Small business to NEXT level
Growing your Small business to NEXT level
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
 
2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
 
ETUDE - Le Quantified Self et l'Assurance Santé
ETUDE - Le Quantified Self et l'Assurance Santé ETUDE - Le Quantified Self et l'Assurance Santé
ETUDE - Le Quantified Self et l'Assurance Santé
 
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...
MediaEval 2012 Visual Privacy Task: Privacy and Intelligibility through Pixel...
 
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
MediaEval 2012 Visual Privacy Task: Applying Transform-domain Scrambling to A...
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
Quantified Self meets Responsive Ambient Intelligence
Quantified Self meets Responsive Ambient IntelligenceQuantified Self meets Responsive Ambient Intelligence
Quantified Self meets Responsive Ambient Intelligence
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By Matlab
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

More from Wesley De Neve

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Wesley De Neve
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Wesley De Neve
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Wesley De Neve
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Wesley De Neve
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla SymposiumWesley De Neve
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101Wesley De Neve
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumWesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusWesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusWesley De Neve
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Wesley De Neve
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesWesley De Neve
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Wesley De Neve
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsWesley De Neve
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Wesley De Neve
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Wesley De Neve
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...Wesley De Neve
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Wesley De Neve
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingWesley De Neve
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Wesley De Neve
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Wesley De Neve
 

More from Wesley De Neve (20)

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfEasyPrinterHelp
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 

Recently uploaded (20)

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 

Privacy Protection in Video Surveillance Systems using Scalable Video Coding

  • 1. Privacy Protection in Video Surveillance Systems using Scalable Video Coding Hosik Sohn1, Esla T. AnzaKu1, Wesley De Neve1, Yong Man Ro1, and Konstantinos N. Plataniotis2 1Image and Video Systems Lab, Department of Electrical Engineering, KAIST, Daejeon, Korea 2Multimedia Lab, Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada I. INTRODUCTION Layer key generation for scalable video SVC can be used to fulfill the requirement of omnipresence in Let S be a secret key. Then, surveillance systems. In this paper, we propose a privacy-protected K(1,1) = S1,1||S1,2 Spatial layer 1 video surveillance system that makes use of Scalable Video Coding (SVC). To address privacy concerns, face regions are detected and where H represents a cryptographic subsequently scrambled in the compressed domain. K(1,0) = S1,1||S0,2 K(0,1) = S0,1||S1,2 Spatial layer 0 hash function and where “||” represents the concatenation II. PROPOSED VIDEO SURVEILLANCE SYSTEM operator. The parameter k either K(0,0) = S0,1||S0,2 denotes spatial scalability (k=1) or temporal scalability (k=2). Temporal layer 0 Temporal layer 1 A sub-key is computed as, PDA Figure 7. Use of layer keys and sub-keys A layer key for the dth spatial and the ith temporal layer is defined as follows: Surveillance camera Video analyzer & SVC encoder Storage Transmitter PC III. Experiments The video sequence used is “moinas_toni”. This video sequence is Cellular phone designed for single person/face visual detection and tracking. Figure 1. Proposed video surveillance system Encoding was done using two spatial layers {QVGA and VGA} and two temporal layers {12.5 fps and 25 fps}. At VGA resolution, the average 1. Moving ROIs in SVC size of the detected face region is 78 79 pixels (over 200 frames). ROI representation Slice group 1 1. Experimental results ROI : privacy-sensitive area (i.e., a face region) 1) The percentage of increased bits in the ROI for a varying picture FMO type 2 : allows defining rectangular ROIs Slice group 0 quality at 25 fps (foreground / background) Table 1. Percentage of increased bits in the ROI Updating ROIs in a coded bit stream Figure 2. Illustration of FMO type 2 Size / QP 25 28 31 34 37 40 VGA -0.36 -1.89 -0.07 -0.08 -1.42 -3.42 In order to update the location of an ROI in a coded video bit stream, QVGA 0.77 0.77 -0.04 -2.09 -3.88 0.04 additional PPS NAL units need to be inserted. 2) Privacy-protected surveillance video sequence A PPS (Picture Parameter Set) contains the parameters that define an ROI, such as slice group map type, the slice group IDs, and the top-left and bottom-right address of the slice groups. Supplemental enhancement information Video Coding Layer (VCL) NALUs IDR Non-IDR IDR IDR and parameter set NALUs ·· · ·· · ·· · ·· · NALU NALU NALU NALU SEI SPS PPS IDR Non-IDR Insertion of PPS PPS PPS ·· · ·· · ·· · NALU NALU NALU NALU NALU NAL units NALU NALU Figure 3. SVC bit stream structure Figure 4. Insertion of PPS NAL units (b) (a) Figure 8. Privacy-protected surveillance video sequence at (a) QVGA and (b) VGA resolution 2. Privacy protection techniques 3) Simulation of 4) Level of protection against ROI scrambling error concealment attack brute force attack Enhancement For faces with a high layer coding spatial resolution, only Secret key scrambling AC transform Surveillance - ROI coefficients in the luma video, T/Q scrambling CAVLC ROI coordinates domain cannot sufficiently Q-1/ T-1 Compressed distort the silhouette of the bitstream (a) (b) + face. Figure 9. Simulation of Intra pred. (a) the proposed scrambling technique (b) an error concealment attack MC pred. ME Figure 10. The average number of CAVLC levels in the ROI according to the bit rate at IV. CONCLUSIONS QVGA and VGA resolution (a) (a) (b) Figure 5. Simulation of Secret key We proposed a privacy-protected video surveillance system that (a) random sign inversion for luma Extracted ROI + makes use of the SVC standard. For the purpose of privacy protection, CAVLC-1 Q-1/ T-1 MC AC coefficients at 4CIF resolution bitstream unscrambling face regions were detected and subsequently encoded as an ROI (b) an error concealment attack Surveillance video using FMO type 2. ROIs are scrambled using random sign inversion, (b) having a negligible impact on the coding performance of CAVLC Figure 6. Scrambling in SVC: (a) encoder; (b) decoder entropy coding. Further, for each layer in an SVC bit stream, the ROI is scrambled using a different key in order to ensure a high level of In the proposed system, random sign inversion is applied to non-zero protection. Finally, the proposed video surveillance system shows DC and AC transform coefficients of the luma and chroma components. reasonable robustness against brute-force attacks.