SlideShare a Scribd company logo
1 of 1
Download to read offline
A Novel Eye Region Based Privacy Protection Scheme
                                                                                                            Dohyoung Lee, Konstantinos N. Plataniotis
                                                                        Multimedia Lab., The Edward S. Rogers Sr. Department of Electrical and Computer Engineering
                                                                                                      University of Toronto, Toronto, Ontario, Canada M5S 3G4

1. Introduction                                                                                           3.2. Generative framework based eye detection                                            5.2. Results
                                                                                                            • Haar-like feature / GentleBoost learning based object detection in two stages [1]      • Examples of protected sample images
1.1. Privacy Protection of Video Contents and Eye Region
                                                                                                                Stage 1 : Facial region detection from grayscale version of input frame
  • Proliferation of video surveillance systems and human behavior researches has
                                                                                                                Stage 2 : Eye region detection from the detected facial region
  raised a concern of revealing the identity in video data via face recognition software
                                                                                                            • Customizations for enhanced eye detection performance
  • Why Protect Eye Region ?
                                                                                                                Apply the binary skin map from segmentation stage to reduce search delay
      Conceal the region containing the most discriminative information within face
                                                                                                                Incorporate a novel RGB-grayscale conversion to improve detection accuracy
      Reduce computational costs compared to the entire facial region approach
      Thwart face recognition tools which typically rely on eye detection as an
     essential preprocessing step

1.2. Contribution
  Proposed a video privacy protection solution that effectively deteriorates the visual
  quality of human eye region in real time, while producing stream compatible to a                        4. JPEG XR scrambling module
  worldwide JPEG XR compression standard                                                                    • Cost-effective video encryption tool embedded in JPEG XR encoding module [2]
                                                                                                            • Apply different encryption techniques to transform coefficients of JPEG XR                        Fig.4. Eye region scrambling results on test images from CMU PIE database
                                                                                                            frequency subbands in located eye region
                                                                                                                                                                                                     • Face recognition rates for various eye region block sizes and invasion scenarios
2. System Overview


                                                                     • Consist of an automatic
                                                                     eye detection module and a
                                                                     JPEG XR scrambling
                                                                     module

                                                                     • Simplified architecture that
                                                                                                          5. Experiment
                                                                     processes each frame                 5.1. Methodology
                                                                     independently from the                 • Two benchmark recognition algorithms used to validate effectiveness of solution
                                                                     previous frame                             Principal Component Analysis with nearest-neighbor classifier (PCA-NN)
                                                                                                                Local Binary Pattern feature with nearest-neighbor classifier (LBP-NN)
                                                                     • Produce JPEG XR intra-               • Database : color frontal face images of from CMU PIE database
                                                                     coded video stream with                    Wide range of facial variations in illumination condition and ethnic groups
                                                                                                                                                                                                   6. Conclusion
                                                                     scrambled eye region                       68 gallery, 340 training, and 1710 test images normalized to 192x192 size           • The proposed scheme with 2.4d x 1.2d eye region block size significantly reduces
                                                                                                            • Experimental setup for eye region block sizes and invasion scenarios                   successful identification rate of two widely used face recognition algorithms

                                                                                                                                                                                                     • Encoding delay per 192x192 frame is 34.94 ms for the proposed solution and
                                                                                                                                                                                                     46.20 ms for the facial region solution (on Core2 Duo 2.53GHz CPU with 4GB
    Fig.1. Overview of the proposed eye region protection solution                                                                                                                                   RAM running Windows 7)

                                                                                                                                                                                                     • Results indicate that the proposed eye region based scheme effectively removes
                                                                                                                         Fig.2. Scrambling block size represented with respect to eye distance d     discriminative features in facial region with reduced computational costs
3. Automatic Eye Detection Module
  Locate the eye region in real-time from input video frame using:
     Color based skin segmentation
     Generative framework based eye detection

3.1. Skin-tone Segmentation                                                                                                                                                                        7. References
  • Generate a binary skin map to reduce face search region of subsequent module
  • Segmentation performed in both YCbCr and HSV color spaces to compensate the                                                                                                                      [1] I. Fasel, B. Fortenberry, and J. Movellan, “A generative framework for real
  unreliability of the single color space approach                                                                                                                                                   time object detection and classification,” Comput. Vis. Image Underst., vol. 98, pp.
                                                                                                                                                                                                     182–210, Apr. 2005

                                                                                                                                             Fig.3. Privacy invasion scenarios                       [2] H. Sohn, W. De Neve, and Y. Ro, “Privacy protection in video surveillance
                                                                                                                Scenario 1 : altered test images, non-altered gallery and training images           systems: Analysis of subband-adaptive scrambling in JPEG XR”, IEEE Trans. on
                                                                                                                Scenario 2 : altered test images, altered gallery, and training images              Circuits Syst. for Video Technol., vol. 21, no. 2, pp. 170 –177, Feb. 2011

More Related Content

What's hot

MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGcsandit
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrievalijcsa
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition SystemCSCJournals
 
Droege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesDroege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesKalle
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGsipij
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753IJMER
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcscpconf
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
Icetet 2010 id 94 fkp segmentation
Icetet 2010   id 94 fkp segmentationIcetet 2010   id 94 fkp segmentation
Icetet 2010 id 94 fkp segmentationDr. Vinayak Bharadi
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
 
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...ijtsrd
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery DetectionIRJET Journal
 

What's hot (18)

MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
Inverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy RetrievalInverted File Based Search Technique for Video Copy Retrieval
Inverted File Based Search Technique for Video Copy Retrieval
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
Droege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesDroege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution Images
 
K0966468
K0966468K0966468
K0966468
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Icetet 2010 id 94 fkp segmentation
Icetet 2010   id 94 fkp segmentationIcetet 2010   id 94 fkp segmentation
Icetet 2010 id 94 fkp segmentation
 
Cu31632635
Cu31632635Cu31632635
Cu31632635
 
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...
 
Dw32759763
Dw32759763Dw32759763
Dw32759763
 
237 240
237 240237 240
237 240
 
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
Discovering Anomalies Based on Saliency Detection and Segmentation in Surveil...
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
 

Similar to Dohyoung lee icassp2012_poster

Video Description using Deep Learning
Video Description using Deep LearningVideo Description using Deep Learning
Video Description using Deep LearningPranjalMahajan9
 
Mining Frequent Events From Video
Mining Frequent Events From VideoMining Frequent Events From Video
Mining Frequent Events From VideoSteffi Keran Rani J
 
Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep LearningSahithiKotha2
 
YU JIANGANG
YU JIANGANGYU JIANGANG
YU JIANGANGbutest
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptxMathanE5
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemIRJET Journal
 
Semantic Summarization of videos, Semantic Summarization of videos
Semantic Summarization of videos, Semantic Summarization of videosSemantic Summarization of videos, Semantic Summarization of videos
Semantic Summarization of videos, Semantic Summarization of videosdarsh228313
 
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMAUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMIRJET Journal
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationIRJET Journal
 
Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning cscpconf
 
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetIRJET Journal
 
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...V Code And V Data Illustrating A New Framework For Supporting The Video Annot...
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...GoogleTecTalks
 
2D to 3D conversion at CRC: A visual perception approach.
2D to 3D conversion at CRC: A visual perception approach.2D to 3D conversion at CRC: A visual perception approach.
2D to 3D conversion at CRC: A visual perception approach.Carlos Vazquez
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheetReyahwu
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheetReyahwu
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheetReyahwu
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNIRJET Journal
 
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)IRJET Journal
 
24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)IAESIJEECS
 

Similar to Dohyoung lee icassp2012_poster (20)

Video Description using Deep Learning
Video Description using Deep LearningVideo Description using Deep Learning
Video Description using Deep Learning
 
Mining Frequent Events From Video
Mining Frequent Events From VideoMining Frequent Events From Video
Mining Frequent Events From Video
 
Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep Learning
 
YU JIANGANG
YU JIANGANGYU JIANGANG
YU JIANGANG
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
Semantic Summarization of videos, Semantic Summarization of videos
Semantic Summarization of videos, Semantic Summarization of videosSemantic Summarization of videos, Semantic Summarization of videos
Semantic Summarization of videos, Semantic Summarization of videos
 
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMAUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
 
Parking Surveillance Footage Summarization
Parking Surveillance Footage SummarizationParking Surveillance Footage Summarization
Parking Surveillance Footage Summarization
 
Pdf4
Pdf4Pdf4
Pdf4
 
Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning
 
Object Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNetObject Detetcion using SSD-MobileNet
Object Detetcion using SSD-MobileNet
 
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...V Code And V Data Illustrating A New Framework For Supporting The Video Annot...
V Code And V Data Illustrating A New Framework For Supporting The Video Annot...
 
2D to 3D conversion at CRC: A visual perception approach.
2D to 3D conversion at CRC: A visual perception approach.2D to 3D conversion at CRC: A visual perception approach.
2D to 3D conversion at CRC: A visual perception approach.
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheet
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheet
 
Total exam2.product.sheet
Total exam2.product.sheetTotal exam2.product.sheet
Total exam2.product.sheet
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)
 
24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Dohyoung lee icassp2012_poster

  • 1. A Novel Eye Region Based Privacy Protection Scheme Dohyoung Lee, Konstantinos N. Plataniotis Multimedia Lab., The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario, Canada M5S 3G4 1. Introduction 3.2. Generative framework based eye detection 5.2. Results • Haar-like feature / GentleBoost learning based object detection in two stages [1] • Examples of protected sample images 1.1. Privacy Protection of Video Contents and Eye Region  Stage 1 : Facial region detection from grayscale version of input frame • Proliferation of video surveillance systems and human behavior researches has  Stage 2 : Eye region detection from the detected facial region raised a concern of revealing the identity in video data via face recognition software • Customizations for enhanced eye detection performance • Why Protect Eye Region ?  Apply the binary skin map from segmentation stage to reduce search delay  Conceal the region containing the most discriminative information within face  Incorporate a novel RGB-grayscale conversion to improve detection accuracy  Reduce computational costs compared to the entire facial region approach  Thwart face recognition tools which typically rely on eye detection as an essential preprocessing step 1.2. Contribution Proposed a video privacy protection solution that effectively deteriorates the visual quality of human eye region in real time, while producing stream compatible to a 4. JPEG XR scrambling module worldwide JPEG XR compression standard • Cost-effective video encryption tool embedded in JPEG XR encoding module [2] • Apply different encryption techniques to transform coefficients of JPEG XR Fig.4. Eye region scrambling results on test images from CMU PIE database frequency subbands in located eye region • Face recognition rates for various eye region block sizes and invasion scenarios 2. System Overview • Consist of an automatic eye detection module and a JPEG XR scrambling module • Simplified architecture that 5. Experiment processes each frame 5.1. Methodology independently from the • Two benchmark recognition algorithms used to validate effectiveness of solution previous frame  Principal Component Analysis with nearest-neighbor classifier (PCA-NN)  Local Binary Pattern feature with nearest-neighbor classifier (LBP-NN) • Produce JPEG XR intra- • Database : color frontal face images of from CMU PIE database coded video stream with  Wide range of facial variations in illumination condition and ethnic groups 6. Conclusion scrambled eye region  68 gallery, 340 training, and 1710 test images normalized to 192x192 size • The proposed scheme with 2.4d x 1.2d eye region block size significantly reduces • Experimental setup for eye region block sizes and invasion scenarios successful identification rate of two widely used face recognition algorithms • Encoding delay per 192x192 frame is 34.94 ms for the proposed solution and 46.20 ms for the facial region solution (on Core2 Duo 2.53GHz CPU with 4GB Fig.1. Overview of the proposed eye region protection solution RAM running Windows 7) • Results indicate that the proposed eye region based scheme effectively removes Fig.2. Scrambling block size represented with respect to eye distance d discriminative features in facial region with reduced computational costs 3. Automatic Eye Detection Module Locate the eye region in real-time from input video frame using:  Color based skin segmentation  Generative framework based eye detection 3.1. Skin-tone Segmentation 7. References • Generate a binary skin map to reduce face search region of subsequent module • Segmentation performed in both YCbCr and HSV color spaces to compensate the [1] I. Fasel, B. Fortenberry, and J. Movellan, “A generative framework for real unreliability of the single color space approach time object detection and classification,” Comput. Vis. Image Underst., vol. 98, pp. 182–210, Apr. 2005 Fig.3. Privacy invasion scenarios [2] H. Sohn, W. De Neve, and Y. Ro, “Privacy protection in video surveillance  Scenario 1 : altered test images, non-altered gallery and training images systems: Analysis of subband-adaptive scrambling in JPEG XR”, IEEE Trans. on  Scenario 2 : altered test images, altered gallery, and training images Circuits Syst. for Video Technol., vol. 21, no. 2, pp. 170 –177, Feb. 2011