photographer anonymity
play

Photographer anonymity Joint work with Peter Schaffer (Uni. of - PowerPoint PPT Presentation

Photographer anonymity Joint work with Peter Schaffer (Uni. of Luxembourg) Djamila Aouada (Uni. of Luxembourg) Presented by: Shishir Nagaraja (IIIT Delhi) nagaraja@iiitd.ac.in WPES 2011 The perils of being on camera Person X is falsely on


  1. Photographer anonymity Joint work with Peter Schaffer (Uni. of Luxembourg) Djamila Aouada (Uni. of Luxembourg) Presented by: Shishir Nagaraja (IIIT Delhi) nagaraja@iiitd.ac.in WPES 2011

  2. The perils of being on camera Person X is falsely on medical-disability leave but is visiting the UK Person Y happens to be visiting UK and accidently takes pictures of X and posts it on the Internet Defenses: Pixellation, blurring, ...

  3. A different privacy problem: photographer anonymity 1. Photograph Citizen journalist Secret meeting 2. Blog article

  4. Photographer anonymity problem 1. Photograph Citizen journalist with hidden camera Secret meeting 2. Blog article

  5. Naive defense: hidden cameras

  6. Anonymity set with hidden camera Hidden photographer

  7. 1. Photograph Citizen journalist with hidden camera Secret meeting 2. Post image 4. Consult on the Internet CCTV to deanonymise 3. Image analysis to photographer determine hidden camera location Camera-location De-anonymisation attack

  8. Our approach towards a defense technique: View Synthesis Source: L. Fei-fei, Stanford Vision Lab

  9. Anonymity set with view-synthesis Hidden Hidden photographer2 photographer1

  10. 1. Photograph Citizen journalist with hidden camera Secret meeting 2. Post image 4. Consult on the Internet CCTV to deanonymise 3. Image analysis to photographer determine hidden camera location ? Camera-location De-anonymisation attack

  11. Problem definition ● Input: ● Two images taken from locations L and R respectively ● Two projection matrices specifying image viewpoints ● Output projection matrix specifying synthetic viewpoint ● Output: synthetic image ● Security properties: minimal information about L or R should be leaked ● Threat model: external passive adversary

  12. Privacy enhancing technology: view synthesis

  13. View synthesis process ● Stereo matching

  14. View synthesis process ● Stereo matching ● Disparity computation

  15. View synthesis process ● Stereo matching ● Disparity computation ● Warping

  16. View synthesis process ● Stereo matching ● Disparity computation ● Warping b: distance between the cameras D: disparity map

  17. View synthesis process ● Stereo matching ● Disparity computation ● Warping ● Occlusion handling

  18. View synthesis with partial occlusion

  19. Challenges: hole handling Hole handling Input images Source: middlebury.edu

  20. View synthesis with partial occlusion

  21. View synthesis with partial occlusion

  22. View synthesis with full occlusion

  23. View synthesis with full occlusion

  24. View synthesis with full occlusion

  25. Anonymity

  26. Interpolation

  27. So, does it work? nagaraja@iiitd.ac.in

  28. Artifacts

  29. Artifacts

  30. Conclusions ● We have posed a new privacy problem: camera-location anonymity ● We propose view-synthesis as a defense technique to improve camera-location anonymity and photographer anonymity ● Analytical results ● Preliminary results show some promise

  31. Questions? nagaraja@iiitd.ac.in

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend