Photographer anonymity Joint work with Peter Schaffer (Uni. of - - PowerPoint PPT Presentation

photographer anonymity
SMART_READER_LITE
LIVE PREVIEW

Photographer anonymity Joint work with Peter Schaffer (Uni. of - - PowerPoint PPT Presentation

Photographer anonymity Joint work with Peter Schaffer (Uni. of Luxembourg) Djamila Aouada (Uni. of Luxembourg) Presented by: Shishir Nagaraja (IIIT Delhi) nagaraja@iiitd.ac.in WPES 2011 The perils of being on camera Person X is falsely on


slide-1
SLIDE 1

Photographer anonymity

Joint work with

Peter Schaffer (Uni. of Luxembourg) Djamila Aouada (Uni. of Luxembourg) Presented by: Shishir Nagaraja (IIIT Delhi) nagaraja@iiitd.ac.in

WPES 2011

slide-2
SLIDE 2

The perils of being on camera

Person X is falsely on medical-disability leave but is visiting the UK Person Y happens to be visiting UK and accidently takes pictures of X and posts it on the Internet

Defenses: Pixellation, blurring, ...

slide-3
SLIDE 3

A different privacy problem: photographer anonymity

Citizen journalist Secret meeting

  • 1. Photograph
  • 2. Blog article
slide-4
SLIDE 4

Photographer anonymity problem

Citizen journalist with hidden camera Secret meeting

  • 1. Photograph
  • 2. Blog article
slide-5
SLIDE 5

Naive defense: hidden cameras

slide-6
SLIDE 6

Hidden photographer

Anonymity set with hidden camera

slide-7
SLIDE 7

Citizen journalist with hidden camera Secret meeting

  • 1. Photograph
  • 2. Post image
  • n the Internet
  • 3. Image analysis to

determine hidden camera location

  • 4. Consult

CCTV to deanonymise photographer

Camera-location De-anonymisation attack

slide-8
SLIDE 8

Our approach towards a defense technique: View Synthesis

Source: L. Fei-fei, Stanford Vision Lab

slide-9
SLIDE 9

Hidden photographer1 Hidden photographer2

Anonymity set with view-synthesis

slide-10
SLIDE 10

Citizen journalist with hidden camera Secret meeting

  • 1. Photograph
  • 2. Post image
  • n the Internet
  • 3. Image analysis to

determine hidden camera location

  • 4. Consult

CCTV to deanonymise photographer

Camera-location De-anonymisation attack

?

slide-11
SLIDE 11

Problem definition

  • Input:
  • Two images taken from locations L and R respectively
  • Two projection matrices specifying image viewpoints
  • Output projection matrix specifying synthetic viewpoint
  • Output: synthetic image
  • Security properties: minimal information about L or R

should be leaked

  • Threat model: external passive adversary
slide-12
SLIDE 12

Privacy enhancing technology: view synthesis

slide-13
SLIDE 13

View synthesis process

  • Stereo

matching

slide-14
SLIDE 14

View synthesis process

  • Stereo

matching

  • Disparity

computation

slide-15
SLIDE 15

View synthesis process

  • Stereo

matching

  • Disparity

computation

  • Warping
slide-16
SLIDE 16

View synthesis process

  • Stereo

matching

  • Disparity

computation

  • Warping

b: distance between the cameras D: disparity map

slide-17
SLIDE 17

View synthesis process

  • Stereo

matching

  • Disparity

computation

  • Warping
  • Occlusion

handling

slide-18
SLIDE 18

View synthesis with partial occlusion

slide-19
SLIDE 19

Challenges: hole handling

Input images Hole handling Source: middlebury.edu

slide-20
SLIDE 20

View synthesis with partial occlusion

slide-21
SLIDE 21

View synthesis with partial occlusion

slide-22
SLIDE 22

View synthesis with full occlusion

slide-23
SLIDE 23

View synthesis with full occlusion

slide-24
SLIDE 24

View synthesis with full occlusion

slide-25
SLIDE 25

Anonymity

slide-26
SLIDE 26

Interpolation

slide-27
SLIDE 27

So, does it work?

nagaraja@iiitd.ac.in

slide-28
SLIDE 28

Artifacts

slide-29
SLIDE 29

Artifacts

slide-30
SLIDE 30

Conclusions

  • We have posed a new privacy problem:

camera-location anonymity

  • We propose view-synthesis as a defense

technique to improve camera-location anonymity and photographer anonymity

  • Analytical results
  • Preliminary results show some promise
slide-31
SLIDE 31

Questions?

nagaraja@iiitd.ac.in