raspberry pi based video filtration system
play

Raspberry Pi-based video filtration system A novel approach to - PowerPoint PPT Presentation

Raspberry Pi-based video filtration system A novel approach to reversible PII anonymization in videostreams using commodity hardware C.H.J Kuipers & S. Scholtes February 6, 2018 Research Project 1 Master of System and Network Engineering


  1. Raspberry Pi-based video filtration system A novel approach to reversible PII anonymization in videostreams using commodity hardware C.H.J Kuipers & S. Scholtes February 6, 2018 Research Project 1 Master of System and Network Engineering Institute of Informatics University of Amsterdam

  2. Introduction

  3. 1. What types of PII? Research question How can commodity hardware be used to filter PII from video streams? 2. What anonymization techniques? 3. Tailoring to commodity hardware? 1

  4. Research question How can commodity hardware be used to filter PII from video streams? 2. What anonymization techniques? 3. Tailoring to commodity hardware? 1 1. What types of PII?

  5. Research question How can commodity hardware be used to filter PII from video streams? 2. What anonymization techniques? 3. Tailoring to commodity hardware? 1 1. What types of PII?

  6. Research question How can commodity hardware be used to filter PII from video streams? 2. What anonymization techniques? 3. Tailoring to commodity hardware? 1 1. What types of PII?

  7. Process Video input Detection Filtration Video output Figure 1: Video processing overview 2

  8. Personally Identifiable Information

  9. Definition Any information related to a natural person, that can be used to directly or indirectly identify the person 1 . 1 “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (May 2016), pp. 1–88. url: http://eur-lex.europa.eu/legal- content/EN/TXT/?uri=OJ:L:2016:119:TOC . 3 (General Data Protection Regulation)”. In: Official Journal of the European Union L119

  10. Filtration

  11. Filtration Video input Detection Filtration Video output Figure 2: The filtration process 4

  12. Filtration Reversibility of the filtration process • Contextual Image manipulation • Container Encryption in transit & at rest 5

  13. Filtration Reversibility of the filtration process • Contextual Image manipulation • Container Encryption in transit & at rest 5

  14. Filtration - anonymization techniques Reversible methods: • Pixelrelocation • Warping • Chaos Cryptography One-way methods: • Masking • Blurring (a.k.a. Normalized Blurring) 6

  15. Filtration - anonymization techniques Reversible methods: • Pixelrelocation • Warping • Chaos Cryptography One-way methods: • Masking • Blurring (a.k.a. Normalized Blurring) 6

  16. Filtration - techniques Figure 3: Blur 7

  17. Filtration - techniques Reversible methods: • Pixelrelocation • Warping • Chaos Cryptography One-way methods: • Masking • Blurring (a.k.a. Normalized Blurring) • Gaussian blurring 8

  18. Filtration - techniques Figure 4: Gaussian blur 9

  19. Proof of Concept

  20. Proof of Concept Figure 5: Overview 10

  21. Proof of Concept Components used for the Proof of Concept Hardware: • IP Camera • Interception device • Router Software: • Ubuntu 16.0.4.3 LTS • Stretch 9.3 • Python 3.5.1-3 • OpenCV 3.3.0 • Caffenet Caffemodel 11

  22. Proof of Concept Components used for the Proof of Concept Hardware: • IP Camera • Interception device • Router Software: • Ubuntu 16.0.4.3 LTS • Stretch 9.3 • Python 3.5.1-3 • OpenCV 3.3.0 • Caffenet Caffemodel 11

  23. Proof of Concept Test overview • Baseline 12

  24. Proof of Concept Test overview • Baseline 12

  25. Proof of Concept Figure 6: Baseline 13

  26. Proof of Concept Test overview • Baseline • Detection • Draw boxes 14

  27. Proof of Concept Test overview • Baseline • Detection • Draw boxes 14

  28. Proof of Concept Test overview • Baseline • Detection • Draw boxes 14

  29. Proof of Concept Figure 7: Draw boxes 15

  30. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels 16

  31. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels 16

  32. Proof of Concept Figure 8: Label detections 17

  33. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  34. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  35. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  36. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  37. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  38. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring 18

  39. Proof of Concept Figure 9: Blurring detections 19

  40. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring 20

  41. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring 20

  42. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring 20

  43. Proof of Concept Figure 10: Gaussian blurring 21

  44. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring • Gaussian blurring + padding • Masking 22

  45. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring • Gaussian blurring + padding • Masking 22

  46. Proof of Concept Test overview • Baseline • Detection • Draw boxes • Labels • Save anonymized stream • Save original stream • Encrypt original stream • Re-stream anonymized stream • Blurring • Blurring + padding • Gaussian blurring • Gaussian blurring + padding • Masking 22

  47. Proof of Concept Figure 11: Masking detections 23

  48. Proof of Concept • Re-stream anonymized stream • Masking + padding • Masking • Gaussian blurring + padding • Gaussian blurring • Blurring + padding • Blurring • Encrypt original stream Test overview • Save original stream • Save anonymized stream • Labels • Draw boxes • Detection • Baseline 24

  49. Proof of Concept • Re-stream anonymized stream • Masking + padding • Masking • Gaussian blurring + padding • Gaussian blurring • Blurring + padding • Blurring • Encrypt original stream Test overview • Save original stream • Save anonymized stream • Labels • Draw boxes • Detection • Baseline 24

  50. Proof of Concept Detection Table 1: Shows how the different tests are constructed Masking + padding Masking Gaussian blur + padding Gaussian blur Blur + padding Blur Re-stream AES Encrypting original stream Save original stream Save anonymized stream 1 Labeling Drawing boxes 25 8 7 Baseline 2 14 13 12 3 11 4 10 5 9 6 � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � �

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend