MediaEval 2015 Drone Protect Task Privacy Protection inSurveillance Systems Using False Coloring

2015-09-30
Çiftçi, Serdar
Korshunov, Pavel
Akyüz, Ahmet Oğuz
Ebrahimi, Touradj
This paper describes privacy protection method based on a false coloring approach for Drone Protect Task of MediaEval 2015. The aim is to obscure regions of a video that are privacy sensitive without sacrificing intelligibility and pleasantness. False coloring transforms the original colors of pixels using a color palette into a different set of colors in which private information is harder to recognize. The method can be applied globally to an entire frame of the video or to a specific region of interest (ROI). The privacy protected output is expected to remain pleasant, and when needed, a close approximation of the original input can be recovered. Benchmarking evaluations on the mini-drone dataset show promising results, especially, for intelligibility and pleasantness criteria.
MediaEval 2015 Drone Protect Task Privacy Protection inSurveillance Systems Using False Coloring", MediaEval 2015 Workshop, Wurzen, Almanya, 14 - 15 Eylül 2015

Suggestions

Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Koz, Alper; Lagendijk, R. (Inald) L. (2017-03-01)
In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer (P2P) networks in comparison with traditional central database implementations of fingerprints. This discussion reveals that first, fingerprint sizes of existing video fingerprint methods are not compatible with the cache sizes of current P2P clients; second, fingerprint extraction durations during a query are not at tolerable levels for a user in the n...
Particle filter based Conjoint Individual-Group Tracker (CIGT)
YİĞİT, Ahmet; Temizel, Alptekin (2015-08-28)
In this paper, we present a method for joint tracking of individuals and groups in surveillance scenarios. Groups are dynamic entities and they may grow or shrink with merge-split events. This dynamic nature makes it difficult to track groups using conventional trackers. In this paper, we propose a new tracking method named Conjoint Individual and Group Tracker (CIGT) based on particle filter with multi-observation model and particle advection. The proposed multi-observation model uses in-group and out-grou...
Occlusion-aware 3-D multiple object tracking for visual surveillance
Topçu, Osman; Alatan, Abdullah Aydın; Ercan, Ali Özer; Department of Electrical and Electronics Engineering (2013)
This thesis work presents an occlusion-aware particle filter framework for online tracking of multiple people with observations from multiple cameras with overlapping fields of view for surveillance applications. Surveillance problem involves inferring motives of people from their actions, deduced from their trajectories. Visual tracking is required to obtain these trajectories and it is a challenging problem due to motion model variations, size and illumination changes and especially occlusions between mov...
Object Extraction and Classification in Video Surveillance Applications
Civelek, Muhsin; Yazıcı, Adnan (2017-05-01)
In this paper we review a number of methods used in video surveillance applications in order to detect and classify threats. Moreover, the use of those methods in wireless surveillance networks contributes to decreasing the energy consumption of the devices because it reduces the amount of information transferred through the network. In this paper we focus on the most popular object extraction and classification methods that are used in both wired and wireless surveillance applications. We also develop an a...
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
Citation Formats
S. Çiftçi, P. Korshunov, A. O. Akyüz, and T. Ebrahimi, “MediaEval 2015 Drone Protect Task Privacy Protection inSurveillance Systems Using False Coloring,” presented at the MediaEval 2015 Drone Protect Task Privacy Protection inSurveillance Systems Using False Coloring”, MediaEval 2015 Workshop, Wurzen, Almanya, 14 - 15 Eylül 2015, Wurzen, Almanya, 2015, Accessed: 00, 2021. [Online]. Available: http://ceur-ws.org/Vol-1436/Paper84.pdf.