Proceedings of the 2001 Workshop on Perceptive User Interfaces 2001
DOI: 10.1145/971478.971519
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection by concealing persons in circumstantial video image

Abstract: A circumstantial video image should convey sufficient situation information, while protecting specific person's privacy information in the scene. This paper proposes a system which automatically identifies a person by face recognition, tracks him or her, and displays the image of the person in modified form such as silhouette with or without name, or only name in characters (i.e. invisible person). A subjective evaluation experiment was carried out in order to know how people prefer each modified video image e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
29
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 5 publications
1
29
0
Order By: Relevance
“…More specifically, the filter G used is a 3 × 3 matrix of the form: Edge detection when applied to matrices U CA and V CA results in matrices U f inal and V f inal . Similar to the SVD-CA step, only a percentage of the resulting matrix is used in computing the output image according to (2), (3). The output of this individual step is show in Figure 5.…”
Section: ) Svd Modified Sobel Filtering (Svd-msf)mentioning
confidence: 99%
See 2 more Smart Citations
“…More specifically, the filter G used is a 3 × 3 matrix of the form: Edge detection when applied to matrices U CA and V CA results in matrices U f inal and V f inal . Similar to the SVD-CA step, only a percentage of the resulting matrix is used in computing the output image according to (2), (3). The output of this individual step is show in Figure 5.…”
Section: ) Svd Modified Sobel Filtering (Svd-msf)mentioning
confidence: 99%
“…After solving 17 radius R can be calculated as: 2 2 , x i is a support vector or a i > 0} (18) With the above approach it is possible to calculate a good estimate of radius R that will provide with the required distortion to de-identify the input facial images.…”
Section: Projections Used For De-identifficationmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper focuses on an objective evaluation method due to its advantages over a subjective evaluation such as the support for automatic operation (no human assessment required), the reduced costs of implementation, and the increased reproducibility. Many techniques have been proposed for visual privacy protection [3, 5, 15, 18-20, 22, 29, 30, 34-36, 40, 41, 49, 59], but only a few papers have been published on how to evaluate, assess or compare these techniques [6,11,17,27,31,45,51,52]. The main motivation behind this work was therefore to comprehensively explore the objective evaluation of the privacy-utility design space for visual privacy filters.…”
Section: Introductionmentioning
confidence: 99%
“…Many systems for video privacy protection have been proposed for applications with specific tasks, such as video surveillance [1]- [4], Google Street View [5], [6], and lifelogging [7]. These systems basically detect all or a predetermined set of persons and obscure them using such appearance obscuration methods as blurring and blocking out.…”
Section: Introductionmentioning
confidence: 99%