SlideShare a Scribd company logo
1 of 22
Person De-identification
in Videos
Athul R K
Roll No:19
Guided by :Ms Renjini
What is De -identification
De-identification is a process which aims to
remove all identification information of the
person from an image or video, while
maintaining as much information on the
action and its context
Why De-Identification
•Advance in cameras and web technology have made it
easy to capture and share large amounts of video data
over the internet.
•This has raised new concerns regarding the privacy of
individuals
•An increasing number of video cameras observe public
spaces. While there may be a possible security need to see
the individuals in them, identifying the action suffices in
most cases. The actor need be identified only rarely and
only to authorized personnel.
Why De-Identification Cont…
•Recognition and de-identification are opposites,
identify of all possible features to identify a
person and the latter trying to obfuscate the
features towards recognition.
•De-identification should be resistant to
recognition by humans and algorithms.
GOOGLE STREET VIEW
Public surveillance cameras
DE-IDENTIFICATION: GENERAL FRAMEWORK
• It involves the detection and a transformation of images or videos of
individuals to make them unrecognizable , without compromising on
the action and other contextual content
• The goal is to protect the privacy of the individuals while providing
sufficient feel for the human activities in the space being imaged
• Privacy protection provided should be immune to recognition using
computer vision as well as using human vision.
Different Scenarios and De-
identification
There are three types of videos need de-identification
1. Casual videos are captured for other purposes and
get shared
2. Public surveillance videos come from cameras
watching spaces such as airports, streets.
3. Private surveillance videos come from cameras
placed at the entrances of semi-private spaces like
offices.
Criteria for De-identification
1. Face plays a dominant role in automatic and
manual identification. Thus, the de-
identification transformation should pay
more attention to detect and obfuscate faces
in the video more than other aspects
2. The body silhouette and the gait are
important clues available in videos which
need to be obfuscated.
3. Other information about individuals may be
critical to specific aspects of privacy, such as
the race and gender.
Subverting De-identification
1. Reversing the de-identification transformation is
the most obvious line of attack.
2. Recognizing persons from face, silhouette, gait,
etc., is being pursued actively in Computer Vision
3. Manual identification is another subvert de
identification
4. Brute-force verification is a way to attack a de-
identified video.
Storage of Videos
• The de-identification process should support
untransformed video to be viewed if the situation
demands.
• The safest approach is to de-identify the video at the
capture-camera
• Clear video can be viewed only by reversing the
transformation
• The parameters needed for reversing the
transformation should be saved along with the video
using sufficiently strong encryption.
DE-IDENTIFICATION: PROPOSED APPROACH
a) Detect and Track
• The first step is to detect the presence of a person in the scene.
• HOG based human detector gives good results with a low miss rate
• apply the human detector every frames F. The output of the human detector
becomes the input to the tracking module
b) Segmentation
• The bounding boxes of the human in every frame, provided by the tracking
module, are stacked across time to generate a video tube of the person.
• Multiple video tubes are formed if there are multiple people in the video
• The video space is first divided into fixed voxels of size (x × y × t)
• Block based segmentation reduces the computation required in the large
video space.
DE-IDENTIFICATION: PROPOSED APPROACH cont…..
• Segmentation assigns each voxel a label, 1 for foreground and 0 for
background
C) De-identification
i. exponential blur of pixels of the voxel
ii. line integral convolution(LIC)
Overview of the method.
Exponential blur of pixels of the voxel
• all neighbouring voxels of a foreground voxel within the distance a
participate In de-identification
• The parameter a controls the amount of de-identification
• The output color for each pixel in a foreground voxel is a weighted
combination of its neighbouring voxels’ average colors
• The weight corresponding to each voxel decreases exponentially with
the distance from the voxel center to the pixel
Distances for pixel (3, 3) of a voxel from each neighbouring
voxel.
Line integral convolution(LIC)
• Use LIC to distort the boundaries of the person
• Different vector fields can be used for achieving different effects
• LIC is applied to the foreground pixels obtained after segmentation.
• The amount of de-identification acquired can be controlled by the
line length L, of the convolution filter.
The first column shows the clear frame. The next four columns show the output of Blur-2, Blur-4,
LIC-10, LIC-20.
Limitations
• This algorithm consists of many modules and the
results are sensitive to proper functioning of all the
modules involved. It is necessary for each module to
function perfectly for de identification to work
• The segmentation module is largely dependent on
colour and light.
Conclusions
• analyzed the issues relating to de-identification of
individuals in videos to protect their privacy by going
beyond face recognition
• System to protect privacy against algorithmic and human
recognition
• Blurring is a good way to hide the identity if gait is not
involved
• Gait and gender is difficult to hide
• The de-identification system against recognition by
computer vision algorithms. That is likely to be easier than
guarding against manual identification of individuals.
THANK YOU

More Related Content

Similar to person de identification in videos

Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analyticsidescitation
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 publicAlan Smeaton
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemIRJET Journal
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET Journal
 
Blockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemicBlockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemicAboul Ella Hassanien
 
Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Arkadev Kundu
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategiesidescitation
 
Design of Shadow Detection and Removal System
Design of Shadow Detection and Removal SystemDesign of Shadow Detection and Removal System
Design of Shadow Detection and Removal Systemijsrd.com
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognitionPankaj Thakur
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 

Similar to person de identification in videos (20)

AcademicProject
AcademicProjectAcademicProject
AcademicProject
 
Surveillance using Video Analytics
Surveillance using Video AnalyticsSurveillance using Video Analytics
Surveillance using Video Analytics
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
Home work
Home workHome work
Home work
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
 
F04613040
F04613040F04613040
F04613040
 
smarthome
smarthomesmarthome
smarthome
 
Blockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemicBlockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemic
 
Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...Development of wearable object detection system & blind stick for visuall...
Development of wearable object detection system & blind stick for visuall...
 
An Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection StrategiesAn Exploration based on Multifarious Video Copy Detection Strategies
An Exploration based on Multifarious Video Copy Detection Strategies
 
Design of Shadow Detection and Removal System
Design of Shadow Detection and Removal SystemDesign of Shadow Detection and Removal System
Design of Shadow Detection and Removal System
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Image processing
Image processingImage processing
Image processing
 

Recently uploaded

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 

Recently uploaded (20)

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 

person de identification in videos

  • 1. Person De-identification in Videos Athul R K Roll No:19 Guided by :Ms Renjini
  • 2. What is De -identification De-identification is a process which aims to remove all identification information of the person from an image or video, while maintaining as much information on the action and its context
  • 3. Why De-Identification •Advance in cameras and web technology have made it easy to capture and share large amounts of video data over the internet. •This has raised new concerns regarding the privacy of individuals •An increasing number of video cameras observe public spaces. While there may be a possible security need to see the individuals in them, identifying the action suffices in most cases. The actor need be identified only rarely and only to authorized personnel.
  • 4. Why De-Identification Cont… •Recognition and de-identification are opposites, identify of all possible features to identify a person and the latter trying to obfuscate the features towards recognition. •De-identification should be resistant to recognition by humans and algorithms.
  • 7. DE-IDENTIFICATION: GENERAL FRAMEWORK • It involves the detection and a transformation of images or videos of individuals to make them unrecognizable , without compromising on the action and other contextual content • The goal is to protect the privacy of the individuals while providing sufficient feel for the human activities in the space being imaged • Privacy protection provided should be immune to recognition using computer vision as well as using human vision.
  • 8. Different Scenarios and De- identification There are three types of videos need de-identification 1. Casual videos are captured for other purposes and get shared 2. Public surveillance videos come from cameras watching spaces such as airports, streets. 3. Private surveillance videos come from cameras placed at the entrances of semi-private spaces like offices.
  • 9. Criteria for De-identification 1. Face plays a dominant role in automatic and manual identification. Thus, the de- identification transformation should pay more attention to detect and obfuscate faces in the video more than other aspects 2. The body silhouette and the gait are important clues available in videos which need to be obfuscated. 3. Other information about individuals may be critical to specific aspects of privacy, such as the race and gender.
  • 10. Subverting De-identification 1. Reversing the de-identification transformation is the most obvious line of attack. 2. Recognizing persons from face, silhouette, gait, etc., is being pursued actively in Computer Vision 3. Manual identification is another subvert de identification 4. Brute-force verification is a way to attack a de- identified video.
  • 11. Storage of Videos • The de-identification process should support untransformed video to be viewed if the situation demands. • The safest approach is to de-identify the video at the capture-camera • Clear video can be viewed only by reversing the transformation • The parameters needed for reversing the transformation should be saved along with the video using sufficiently strong encryption.
  • 12. DE-IDENTIFICATION: PROPOSED APPROACH a) Detect and Track • The first step is to detect the presence of a person in the scene. • HOG based human detector gives good results with a low miss rate • apply the human detector every frames F. The output of the human detector becomes the input to the tracking module b) Segmentation • The bounding boxes of the human in every frame, provided by the tracking module, are stacked across time to generate a video tube of the person. • Multiple video tubes are formed if there are multiple people in the video • The video space is first divided into fixed voxels of size (x × y × t) • Block based segmentation reduces the computation required in the large video space.
  • 13. DE-IDENTIFICATION: PROPOSED APPROACH cont….. • Segmentation assigns each voxel a label, 1 for foreground and 0 for background C) De-identification i. exponential blur of pixels of the voxel ii. line integral convolution(LIC)
  • 14. Overview of the method.
  • 15. Exponential blur of pixels of the voxel • all neighbouring voxels of a foreground voxel within the distance a participate In de-identification • The parameter a controls the amount of de-identification • The output color for each pixel in a foreground voxel is a weighted combination of its neighbouring voxels’ average colors • The weight corresponding to each voxel decreases exponentially with the distance from the voxel center to the pixel
  • 16. Distances for pixel (3, 3) of a voxel from each neighbouring voxel.
  • 17. Line integral convolution(LIC) • Use LIC to distort the boundaries of the person • Different vector fields can be used for achieving different effects • LIC is applied to the foreground pixels obtained after segmentation. • The amount of de-identification acquired can be controlled by the line length L, of the convolution filter.
  • 18.
  • 19. The first column shows the clear frame. The next four columns show the output of Blur-2, Blur-4, LIC-10, LIC-20.
  • 20. Limitations • This algorithm consists of many modules and the results are sensitive to proper functioning of all the modules involved. It is necessary for each module to function perfectly for de identification to work • The segmentation module is largely dependent on colour and light.
  • 21. Conclusions • analyzed the issues relating to de-identification of individuals in videos to protect their privacy by going beyond face recognition • System to protect privacy against algorithmic and human recognition • Blurring is a good way to hide the identity if gait is not involved • Gait and gender is difficult to hide • The de-identification system against recognition by computer vision algorithms. That is likely to be easier than guarding against manual identification of individuals.