BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Reversible visual privacy protection
1. 1
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Reversible visual
privacy protection
Touradj Ebrahimi
touradj.ebrahimi@epfl.ch
COST IC1206 Training School
De-identification for privacy protection in multimedia content
7-11 October 2015, Limassol, Cyprus
2. 2
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Outline
• Part I:
– Motivations and context
– Conventional privacy protection
filters
– Advanced privacy protection
filters
• Part II:
– Visual privacy evaluation
framework
– Impact of new imaging
modalities on privacy
– Illustrative example
3. 3
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Motivation
• People are increasingly exposed:
– video surveillance
– social media
4. 4
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Proliferation of video surveillance applications
• Surveillance of sensitive locations
– Embassies, airports, nuclear plants, military zone, border
control, …
• Intrusion detection
– Residential surveillance, retail surveillance, …
• Traffic control
– Speed control
• Access to places
– Car license plate recognition in cities
• Event detection
– Child/Elderly care
• Marketing/statistics
– Customers habits
– Number of visitors
• …
5. 5
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Proliferation of social media applications
6. 6
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Main security solutions for visual content protection
• Encryption
– Secure communication
– Conditional access
• Integrity verification
– Digital signature
– Proof for lack of manipulation after capture
7. 7
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Alternatives to implement video surveillance with privacy
• Fully automatic surveillance without intervention of
human operators
– False positives and false negatives
• Encrypting the whole video
– Not good for monitoring
• Distorting/blocking sensitive regions
– Impact on intelligibility
• Reversible encryption/scrambling of sensitive regions
with a key
– Identification can take place when crime happens
• Legal and best practices in video surveillance
– Recorded materials locked in secure locations
• Only extract/record needed information from the scene
– MPEG-7 visual descriptors
8. 8
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Privacy-sensitive visual information
• Predefined zones
– Windows, doors
– Bank teller
– Casino playing tables
– …
• Automatic identification of Regions of Interest (ROI)
– People in the scene
– Human faces
– Cars license plates
– Moving objects
– …
• Advanced image/video analytics
– Deep learning
– Big data analytics
9. 9
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Social media/networks business model
• User profiling
• Targeted advertisement/marketing
10. 10
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Requirements for visual privacy protection
• Maximize intelligibility
• Minimize invasion of privacy
• Visually pleasing
• Reversible
• Reasonable computational resources
• Format preserving/independent
• Reliable
• Secure
• …
11. 11
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Legacy solutions to visual privacy protection
• Masking
• Blur
• Pixelization
15. 15
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
More recent solutions for privacy protection
• (ROI) Encryption
• (ROI) Scrambling
19. 19
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Bitstream encryption
• Selective encryption of the bitstream at packet level
• One or more secret keys
• Symmetric encryption
– Packet body
– Block cipher: e.g. AES
packet
encrypted
packet
private key
20. 20
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling approaches
• Image-domain
– Randomly flip bits in one or more bit planes
• Pros
– Very simple
– Independent from the subsequent encoding scheme
– Does not affect the bitstream syntax → standard compliance
• Cons
– Significantly alter statistics of video signal
– Ensuing compression less efficient
bitstreamimage Scrambling
Encoder
Transform Entropy Coding
21. 21
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling approaches
• Transform-domain
– Randomly flip sign of transform coefficients
• Pros
– Does not adversely affect subsequent entropy coding
– Strength of scrambling can be controlled
– Does not affect the bitstream syntax → standard compliance
• Cons
– Must be integrated inside the encoder
bitstreamimage Transform
Encoder
Scrambling Entropy Coding
22. 22
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling approaches
• Bitstream-domain
– Randomly flip bits in bitstream
• Pros
– Applied on bitstream after encoding
• Cons
– Require parsing of bitstream
– Difficult to guarantee syntax remains compliant and will not crash a
decoder
bitstreamimage
Encoder
Transform Entropy Coding Scrambling
23. 23
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG
(a) (b) DC
PRNG
pseudo-randomly
inverse sign
scrambled
codestream
public key
assymetric
encryption
seed
(c) DC
PRNG
pseudo-randomly
inverse sign
scrambled
codestream
public key
assymetric
encryption
seed
(d) DC
PRNG
pseudo-randomly
inverse sign
scrambled
codestream
public key
assymetric
encryption
seed
Figure 4 – AC coefficients scrambling:
(a) 63 AC coefficients, (b) 60 AC coefficients, (c) 55 AC coefficients, (d) 48 AC coefficients.
Straightforwardly, as the scrambling is merely flipping signs of selected coefficients, the technique requires negligible
computational complexity. Clearly, the shape of the scrambled region is restricted to match the 8x8 DCT blocks
boundaries.
25. 25
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG 2000 (JPSEC)
• Codeblock-based bitstream domain scrambling
≥
<+=
→
900
900900mod)('
xxifx
xxifxmxx
x
Preserve the markers in the bitstream; do not introduce erroneous markers
x=current byte, y=preceding byte
1. If x=0xFF, no modification
2. If y=0xFF
3. Otherwise
where m is an 8-bit pseudo-
random number in [0x00,0x8F]
where n is an 8-bit pseudo-
random number in [0x00,0xFE]
xFFnxxx 0mod)(' +=→
selective
scrambling
PRNG
seed encryption
encrypted
seed
scrambled
codestream
JPSEC
codestream
JPSEC
syntax
codestream
quantizer selective
scrambling
PRNG
seed
wavelet
transform
arithmetic
coder
encryption
encrypted
seed
scrambled
codestream
JPSEC
codestream
JPSEC
syntax
image
Encoder Decoder
26. 26
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in JPEG 2000 (JPSEC)
• ROI-based wavelet domain scrambling
– Arbitrary-shape regions
• Exploit ROI mechanisms in JPEG 2000
Encoder
Decoder
quantizerwavelet
transform
arithmetic
coder
segmentation
mask ?
image
down-shift
wavelet
coefficient
PRNG
seeds
encrypt
seeds
ROI-based scrambled
JPSEC code-stream
scramble
wavelet
coefficient
resolution
level l
< TI ?
up-scale
code-block
distortion
foreground
objects background
keys
resolution
level l
≥ TS ?
yes
no
yesno
inverse
quantizer
inv. wavelet
transform
arithmetic
decoder
coefficient
< 2
s
?
image
up-shift
wavelet
coefficient
PRNG
seeds
decrypt
seeds
ROI-based scrambled
JPSEC code-stream
unscramble
wavelet
coefficient
foreground
objects background
keys
resolution
level l
≥ TS ?
yes
no
Decoder
33. 33
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
An existing product
Scrambler Unscrambler
34. 34
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in DVCScrambling in DVC
• Key frame privacy (JPEG)
– Scrambling in the transform domain on the DCT coefficients.
– Driven by a Pseudo-Random Number Generator (PRNG) to pseudo-
randomly invert the sign of the DCT Coefficients.
• WZ frames
DCT scrambler
DVC scheme with privacy protection
35. 35
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Scrambling in DVCScrambling in DVC
a) Key frame (JPEG). b) Wyner-Ziv transform domain scrambling.
36. 36
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera
XML scene description
The MPEG-7 camera describes a scene in terms of
semantic objects and of their properties
37. 37
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera
– Image analysis: segmentation, change detection, and tracking
(implemented on the camera DSP).
– MPEG-7 coder: scene description represented using MPEG-7 (XML).
– MPEG-7 decoder: MPEG-7 description is parsed. Extraction of the
information related to the specific applications.
39. 39
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
MPEG-7 camera for video surveillance
original frame segmentation mask bounding box
41. 41
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Warping-based privacy filter
• Compute map between original and shifted points
• Interpolate in-between pixels with ‘cubic’
original points shifted points
transformation
42. 42
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Recovery from warping
• Know original points and seed for random
algorithm to compute shifted points
• Perform reverse mapping and interpolation
shifted points original points
transformation
43. 43
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
mild medium strong
Facial features-based warping
49. 49
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
JPEG Security and Privacy
SOI
APP1 (Exif)
EOI
SOI
APP1 (Exif)
EOI
APP11
(protected
metadata)
JPEG-1 decoder
JPEG Privacy &
Security
decoder
APP1 (Exif)
APP1 (Exif)
original JPEG
codestream
JPEG compatible
codestream with
data protection
Image Data
Image data
APP11
(protected
image data)
Image Data
APP11
(protected
metadata)
Image data
APP11
(protected
image data)
APP3 (JPSearch)
APP3 (JPSearch)
APP3 (JPSearch)
50. 50
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Homework!
• Any non-reversible privacy protection filter
can be converted into a reversible
version!
– Propose how this can be done!
51. 51
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Thanks for your attention!
End of Part I
52. 52
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Outline
• Part I:
– Motivations and context
– Conventional privacy protection
filters
– Advanced privacy protection
filters
• Part II:
– Visual privacy evaluation
framework
– Impact of new imaging
modalities on privacy
– Illustrative example
54. 54
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Privacy-intelligibility tradeoff
• Protect privacy – obfuscate or remove
personal information from the video
• Perform surveillance – determine
suspicious event/person, apprehend
and prosecute criminals
• Where is the balance?
55. 55
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Evaluation tools
• Subjective evaluation
• Crowdsourcing
• Objective metrics
56. 56
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Subjective evaluation
• Three naïve filters: blurring, pixelization,
and masking
• Dataset of 8 annotated videos
– People acting normally or abnormally
– Wearing glasses, scarf, hats, etc.
– Blinking into the camera
58. 58
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Questions asked to subjects
race white asian I don’t know
gender female male I don’t know
glasses yes no I don’t know
sunglasses yes no I don’t know
scarf yes no I don’t know
blinking yes no I don’t know
Privacy
Intelligibility
59. 59
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Subjective results
0
0.2
0.4
0.6
0.8
1
0 0.2 0.4 0.6 0.8 1
blurring filter
pixelization filter
masking filter
Privacy
60. 60
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Facebook-based evaluations
• The same experiment as for subjective
evaluations
• Facebook-based system
– Shows videos
– Collects answers
– Trusted workers
61. 61
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Offline results
Onlineresults
blurring
masking
pixelization
Crowdsourcing: privacy
62. 62
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Offline results
Onlineresults
blurring
masking
pixelization
Crowdsourcing: intelligibility
63. 63
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
• The cheapest and the most scalable option
• People counting in public transport
– Face recognition is the metric of privacy
– Face detection is the metric of intelligibility
• An ideal privacy protection filter
– Degrades face recognition
– Does not affect face detection
Objective evaluations
64. 64
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
• Increase strength of privacy filter
• Note relative decrease in accuracy of face
detection and recognition
Evaluation examples
65. 65
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Detection Recognition
Gaussian kernel size
Accuracy
Blurring, FERET dataset
75. 75
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Subjective evaluations of privacy
• 4K UHD Sony reference monitor
• Evaluation questions about
– People’s accessories
– Main action
– Visible items
– Gender
– Race
• Accompanied questions on certainty
78. 78
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Woman
Elderly
Wears sunglasses
Woman??
Woman
Young??
Woman
Young??
Man?? Middle Age??Man?? Middle Age??
Man
Middle Aged
Man
Middle Aged
Woman
Young
Woman
Young
• HDR surveillance cameras
• More details in the scene
• More privacy intrusive?
• HDR monitor is needed
• Tone-mapped images
Implications of HDR
83. 83
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Crowdsourcing evaluations of images
• About 400 people participated
• Evaluation questions about
– Gender
– Race
– Age
– Color of clothes
– How many people
86. 86
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Drones & surveillance
• Can collect sensitive data
– Different heights
– Different angles
– Fly over fences
• Bird-fly view
• Harass and follow targets
• Privacy protection?
87. 87
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Privacy protection filters
• Blurring
• Pixelization
• Masking
• Warping
• Morphing
88. 88
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Privacy protection filters
• Different strength levels
– Mild
– Noticeable
– Obfuscating
– Completely obfuscating
89. 89
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Crowdsourcing evaluations
• Seven selected video contents
– 5 privacy filters at 4 levels of strength +
original = 21 versions of each content
• 850 online workers from around the world
(Microworkers platform)
– Worker accesses one version of the content
• Six questions about personal privacy and
intelligibility of surveillance
– Also, asked how certain is the answer
90. 90
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Evaluation framework
• Questions
– Activity in the scene
– Number of people
– Items (camera, wallet, etc.)
– Accessories people wear (jacket, hat, helmet,
sunglasses, etc.)
– Gender
– Ethnicity
96. 96
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
ProShare: A privacy-aware photo sharing platform
97. 97
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Illustrative example
User 1
Client-side
Notify User 2
Server-side
Protect User 2
User 2
User 3
User 1User 2
Protect User 1
Friend relationship:
User 1 & 2: ✔ User 1 & 3: ✔ User 2 & 3: ✖
Social Networking Services
URL
• Sender-side operations
– Protection and upload
• Server-side operations
– Hosting and Access control
• Recipient-side operations
– Download and Reconstruction
99. 99
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
JPEG Security and Privacy
SOI
APP1 (Exif)
EOI
SOI
APP1 (Exif)
EOI
APP11
(protected
metadata)
JPEG-1 decoder
JPEG Privacy &
Security
decoder
APP1 (Exif)
APP1 (Exif)
original JPEG
codestream
JPEG compatible
codestream with
data protection
Image Data
Image data
APP11
(protected
image data)
Image Data
APP11
(protected
metadata)
Image data
APP11
(protected
image data)
APP3 (JPSearch)
APP3 (JPSearch)
APP3 (JPSearch)
100. 100
Multimedia Signal Processing Group
Swiss Federal Institute of Technology, Lausanne
Thanks for your attention!
End of Part II
Notas do Editor
We first checked FERET dataset as being the most popular for face recognition. On the graphs, we see how accuracy of face detection (or recognition on the right) are changing when we increase the gaussian kernel of the blurring filter. Detection is not affected by the blurring but recognition is, especially recognition of LBP (local binary pattern) based algorithm