Architecture of an IP camera system using machine learning for privacy protection
DOI:
https://doi.org/10.46793/ICEMIT23.317NKeywords:
machine learning, IP camera, video surveilance, privacy protectionAbstract
The development of technologies and the Internet conditioned the development of video surveillance systems. In modern video surveillance systems, the complete content recorded by a camera can be publicly available, i.e., visible on the Internet. The mass use of this type of camera has led to the fact that the cameras record everything and everyone and that the recorded content violates privacy. In order to protect privacy, different types of technologies and software are applied. One of those technologies is machine learning. By applying machine learning, it is possible to mask people's faces on recorded material. In this way, in publicly available content, as well as in case of unauthorized access, the identity of people is not compromised. This paper describes the architecture of a system that enables the application of machine learning for the purpose of protecting the identity of a person, where only an authorized person would have access to the original unmasked content.
References
Aurélien, G. (2019). Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow. O'Reilly Media.
Fogel, I., & Sagi, D. (1989). Gabor filters as texture discriminator. Biological cybernetics, 61(2), 103-113. https://doi.org/10.1007/BF00204594
Hoory, S., Shapira, T., Shabtai, A., & Elovici, Y. (2020). Dynamic adversarial patch for evading object detection models. arXiv preprint arXiv:2010.13070.
Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260. https://doi.org/10.1126/science.aaa8415
Kapadia A, Henderson T, Fielding JJ, Kotz D (2007) Virtual walls: Protecting digital privacy in pervasive environments. In LaMarca A, Langheinrich M, Truong KN (eds) Pervasive computing (pp. 162–179) Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-72037-910
Ravi, S., Climent-Pérez, P., & Florez-Revuelta, F. (2023). A review on visual privacy preservation techniques for active and assisted living. Multimedia Tools and Applications, 1-41. https://doi.org/10.1007/s11042-023-15775-2
Padilla-López, J. R., Chaaraoui, A. A., & Flórez-Revuelta, F. (2015). Visual privacy protection methods: A survey. Expert Systems with Applications, 42(9), 4177-4195. https://doi.org/10.1016/j.eswa.2015.01.041
Rahim, M. A., Hossain, M. N., Wahid, T., & Azam, M. S. (2013). Face recognition using local binary patterns (LBP). Global Journal of Computer Science and Technology, 13(4), 1-8.
Rong, Y., Shiratori, T., & Joo, H. (2021). Frankmocap: A monocular 3d whole-body pose estimation system via regression and integration. In Proceedings of the IEEE/CVF International Conference on Computer Vision (pp. 1749-1759). https://doi.org/10.1109/iccvw54120.2021.00201
Viola, P., & Jones, M. (2001, December). Rapid object detection using a boosted cascade of simple features. In Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition. CVPR 2001 (Vol. 1, pp. I-I). Ieee. https://doi:10.1109/cvpr.2001.990517
Yeh, R. A., Chen, C., Yian Lim, T., Schwing, A. G., Hasegawa-Johnson, M., & Do, M. N. (2017). Semantic image inpainting with deep generative models. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5485-5493). https://doi.org/10.1109/cvpr.2017.728
Yu, J., Lin, Z., Yang, J., Shen, X., Lu, X., & Huang, T. S. (2018). Generative image inpainting with contextual attention. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5505-5514). https://doi.org/10.1109/cvpr.2018.00577
Zhou, J., & Pun, C. M. (2020). Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming. IEEE Transactions on Information Forensics and Security, 16, 1088-1103. https://doi.org/10.1109/TIFS.2020.3029913
Downloads
Published
How to Cite
Conference Proceedings Volume
Section
License
Copyright (c) 2023 International Scientific Conference on Economy, Management and Information Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.