SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Visual Privacy by Context: 
A Level-Based Visualisation 
Scheme 
José R. Padilla-López, Alexandros A. Chaaraoui 
and Francisco Flórez-Revuelta
2 
Protection methods 
Naïve Blurring Pixelating Emboss 
Silhouette / Masking Skeleton 3D Avatar Invisibility
3 
Why (visual) privacy? 
AAL services provide help to 
people in need of long-term 
care. 
Development of novel video-based 
AAL services for private 
spaces. 
Some AAL services may require 
human access to video 
stream. 
... 
Camera 1 Camera 2 Camera N 
... 
... 
Long-term 
analysis 
Setup and Profiles 
DB (Activities, 
Inhabitants, 
Objects, ...) 
Log 
Event 
Alarm Actuators 
Caregiver 
Motion 
Detection 
Motion 
Detection 
Motion 
Detection 
Human 
Behaviour 
Analysis 
Human 
Behaviour 
Analysis 
Human 
Behaviour 
Analysis 
Multi-view Human Behaviour Analysis 
Environmental 
Sensor Information 
Reasoning 
System 
Privacy 
Architecture of our Intelligent Monitoring System
4 
but... What is privacy? 
Privacy: Sphere of the private life that an individual has right 
to protect from intruders. 
However... 
The notion of privacy is highly subjective. It depends on the 
individual. 
Several factors are involved: 
● The private “thing” 
● Observer / intruder
5 
The private “thing” 
“A picture is worth a thousand words” 
An image conveys the following information about individuals: 
● Identity (Who?) 
● Appearance (How?) 
● Location (Where?) 
● Activity / Behaviour (What?) 
● Time (When?)
Image Redaction: Modify an image or a sequence of 
images so as to protect objects (visual clues) appearing on 
them. 
6 
How to ensure (visual) privacy? 
But... 
● Image must retain its utility 
● A trade-off between privacy protection and image utility is 
needed 
● Privacy must be adaptable to the individual
7 
Privacy by Context 
● We propose a privacy 
protection scheme that is 
aware of the context 
● A set of redaction methods 
is used 
● A context describes “any” 
situation. 
● Users provide their privacy 
preferences by linking 
instances of the context with 
protection methods 
Blur 
Pixel 
Emboss 
Naïve 
Skeleton Avatar 3D 
Silhouette 
Invisibility Selected Method 
Skeleton 
Set of redaction 
methods 
User-given 
Matching 
Context 
Composed of several 
variables
8 
Used Context 
● The observer / viewer / watcher 
● Identity of the person (to retrieve the privacy profile) 
● Closeness between person and observer (e.g. relative, 
doctor, acquaintance, … ) 
● Appearance (dressed?) 
● Location (e.g. kitchen) 
● Event (e.g. cooking, watching TV, fall, ...)
9 
Redaction methods 
Demo
10 
Conclusions 
● Visual Privacy by Context covers several research fields 
Computer vision (HBA, Object detection, Person Re-id, …), Image processing and 
in-painting, AI, Sociology. 
● As privacy is highly subjective, any solution should be 
adaptable to each individual 
● Need of a privacy measure so as to objectively evaluate 
protection methods
Thank you for your attention 
Questions?

Contenu connexe

Similaire à Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014

A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
sipij
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
CSCJournals
 
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
cscpconf
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
csandit
 

Similaire à Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014 (20)

UCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa RicaUCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa Rica
 
Visual Monitoring of People in Private Spaces
Visual Monitoring of People in Private SpacesVisual Monitoring of People in Private Spaces
Visual Monitoring of People in Private Spaces
 
Vision-based monitoring of people in private spaces
Vision-based monitoring of people in private spacesVision-based monitoring of people in private spaces
Vision-based monitoring of people in private spaces
 
seminar Islideshow.pptx
seminar Islideshow.pptxseminar Islideshow.pptx
seminar Islideshow.pptx
 
590 599
590 599590 599
590 599
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION  DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION  DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Kognit – Cognitive Assistants for Dementia Patients
Kognit – Cognitive Assistants for Dementia PatientsKognit – Cognitive Assistants for Dementia Patients
Kognit – Cognitive Assistants for Dementia Patients
 
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
Java Implementation based Heterogeneous Video Sequence Automated Surveillance...
 
3d
3d3d
3d
 
3D
3D3D
3D
 
3D Television no more a fantasy
3D Television no more a fantasy3D Television no more a fantasy
3D Television no more a fantasy
 
E0364024030
E0364024030E0364024030
E0364024030
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
 
A Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal FeaturesA Framework for Human Action Detection via Extraction of Multimodal Features
A Framework for Human Action Detection via Extraction of Multimodal Features
 
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique  Biometric Iris Recognition Based on Hybrid Technique
Biometric Iris Recognition Based on Hybrid Technique
 

Plus de Francisco (Paco) Florez-Revuelta

Plus de Francisco (Paco) Florez-Revuelta (11)

AAL Forum 2016
AAL Forum 2016AAL Forum 2016
AAL Forum 2016
 
Visual monitoring of people in private spaces
Visual monitoring of people in private spacesVisual monitoring of people in private spaces
Visual monitoring of people in private spaces
 
Topology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary AlgorithmTopology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
 
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
 
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
 
Continuous human action recognition in ambient assisted living scenarios
Continuous human action recognition in ambient assisted living scenariosContinuous human action recognition in ambient assisted living scenarios
Continuous human action recognition in ambient assisted living scenarios
 
Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...
 
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
 
Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...
 
Use of Kinect in a Smart Home
Use of Kinect in a Smart HomeUse of Kinect in a Smart Home
Use of Kinect in a Smart Home
 
Metaltic
MetalticMetaltic
Metaltic
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014

  • 1. Visual Privacy by Context: A Level-Based Visualisation Scheme José R. Padilla-López, Alexandros A. Chaaraoui and Francisco Flórez-Revuelta
  • 2. 2 Protection methods Naïve Blurring Pixelating Emboss Silhouette / Masking Skeleton 3D Avatar Invisibility
  • 3. 3 Why (visual) privacy? AAL services provide help to people in need of long-term care. Development of novel video-based AAL services for private spaces. Some AAL services may require human access to video stream. ... Camera 1 Camera 2 Camera N ... ... Long-term analysis Setup and Profiles DB (Activities, Inhabitants, Objects, ...) Log Event Alarm Actuators Caregiver Motion Detection Motion Detection Motion Detection Human Behaviour Analysis Human Behaviour Analysis Human Behaviour Analysis Multi-view Human Behaviour Analysis Environmental Sensor Information Reasoning System Privacy Architecture of our Intelligent Monitoring System
  • 4. 4 but... What is privacy? Privacy: Sphere of the private life that an individual has right to protect from intruders. However... The notion of privacy is highly subjective. It depends on the individual. Several factors are involved: ● The private “thing” ● Observer / intruder
  • 5. 5 The private “thing” “A picture is worth a thousand words” An image conveys the following information about individuals: ● Identity (Who?) ● Appearance (How?) ● Location (Where?) ● Activity / Behaviour (What?) ● Time (When?)
  • 6. Image Redaction: Modify an image or a sequence of images so as to protect objects (visual clues) appearing on them. 6 How to ensure (visual) privacy? But... ● Image must retain its utility ● A trade-off between privacy protection and image utility is needed ● Privacy must be adaptable to the individual
  • 7. 7 Privacy by Context ● We propose a privacy protection scheme that is aware of the context ● A set of redaction methods is used ● A context describes “any” situation. ● Users provide their privacy preferences by linking instances of the context with protection methods Blur Pixel Emboss Naïve Skeleton Avatar 3D Silhouette Invisibility Selected Method Skeleton Set of redaction methods User-given Matching Context Composed of several variables
  • 8. 8 Used Context ● The observer / viewer / watcher ● Identity of the person (to retrieve the privacy profile) ● Closeness between person and observer (e.g. relative, doctor, acquaintance, … ) ● Appearance (dressed?) ● Location (e.g. kitchen) ● Event (e.g. cooking, watching TV, fall, ...)
  • 10. 10 Conclusions ● Visual Privacy by Context covers several research fields Computer vision (HBA, Object detection, Person Re-id, …), Image processing and in-painting, AI, Sociology. ● As privacy is highly subjective, any solution should be adaptable to each individual ● Need of a privacy measure so as to objectively evaluate protection methods
  • 11. Thank you for your attention Questions?