Protecting privacy from CCTV

Size: px
Start display at page:

Download "Protecting privacy from CCTV"

Transcription

1 Protecting privacy from CCTV Ori Brostovski March 2, 2008

2 Introduction In this presentation I am going to talk about: The abuse potential of CCTV-s. The PrivacyCam model that was offered in Enabling Video Privacy Through Computer Vision. An outline of the irregularity detection algorithm offered in Detecting Irregularities in Images and in Video, this algorithm can be used by the PrivacyCam.

3 The PrivacyCam

4 The Problem CCTV cameras are widely used, recording videos of most people. The ability to use computer vision to detect a specific person makes abuse of these videos too convenient.

5 Abuses of CCTV The American Civil Liberties Union has defined possible abuses of CCTV: Criminal abuse. Abuse for personal purposes. Discriminatory targeting. Voyeurism.

6 Legitimate uses of CCTV It should be noted that CCTV-s has many legitimate uses: Security - By stopping crimes from occurring in real-time. Crime prevention - By being able to identify the criminal after the crime has occurred Automated buildings - Allows heating/lighting/elevators/phones to automatically adjust to people within the building.

7 Preventing abuse by limiting access In order to be able to protect data from abuse, we need to think about the following limitations: What data can be obtained from the video? Who can see the data? How long are the data kept? (Personally I do not feel that there is really a way to check this) What meta-data are attached to the data? (i.e. time, place, etc.) Is the data stored safely?

8 A solution - The PrivacyCam A PrivacyCam system with specific properties is offered as a solution to the problems posed previously. The PrivacyCam will be composed of: PrivacyCam - A camera that sends pictures to a privacy console. The PrivacyCam may also do visual analysis on the videos. Privacy Console - users can get access from it videos or meta-data that have been modified to ensure anonymity.

9 Encryption The PrivacyCam should work by sending encrypted videos to a privacy console. The purpose of such an encryption is to prevent a user from tapping into the camera s communication channel with the console in order to get raw video information.

10 Video analysis The privacy console should analyze the video, extract privacy related information from it and create copies with different parts of the removed information and encrypting each copy with a different key.

11 Permission hierarchy The PrivacyCam will implement a hierarchy of permission to allow different users access to different parts of the video and/or metadata. There may be many users, possibly including anonymous ones or devices in the building.

12 Logging All information queries to the privacy console should be securely logged. The logging acts as a deterrent for potential abusers of the PrivacyCam.

13 Object recognition can miss There are a few problems with the PrivacyCam. Object recognition can sometimes fail to identify an object that should be hidden. This can be solved partially by defining an operating point. The operating point is a threshold that specifies to recognition algorithm how interesting something needs to be in order for it to be hidden by the PrivacyCam. Higher authority gets access to copies with a lower operating point.

14 Lack of knowledge about the adversary Even if object recognition and filtering is perfect, there is still the problem of not knowing what the adversary knows. Furthermore, the adversary of tomorrow may have access to different video analysis technologies than the PrivacyCam of today, which will allow him better data extraction ability than anticipated today.

15 Logs may give out information If many people can see the logs than this allows for a state where information can be harvested based on watching who watched what. If few people can see the logs than corruption becomes easier.

16 Summary In this presentation we have: We have described the possible abuse of CCTV cameras. We have described a possible solution to prevent such abuse. We have shown that while the ideas behind the solution are good, there are several problems in it.

17 Detecting Irregularities

18 The setting Let us limit our setting to security-related CCTV-s. Let database be some database of regular behaviors. Let query be a video we want to check. We show an algorithm that can detect irregular video events in a query, based on the regular video events in database.

19 Definition of videos For our purposes, we will think of videos as a three dimensional matrix with it s dimensions corresponding to width, height and time accordingly.

20 Definition of descriptors A descriptor represents a specialized way of looking at a specific part of the image. Similar images should have similar descriptors.

21 The temporal derivative descriptor Let Y, X, T be coordinates of row, column and time accordingly. We define D [i][j][k] be the temporal derivative of a video pixel at [Y + i][x + j][t + k]. We define D := D D, D is the temporal derivative descriptor. The intuition behind D is that it describes the motion at it s 7 7 patch.

22 Partition to regions We can partition the video to overlapping regions. Each query region will get a likelihood score, which says how much it s similar to a region to a data region.

23 Partition of regions to patches Each region is partitioned to patches q 1,..., q n. Each patch has a position vector l 1 y,..., l n y and a descriptor value d 1 y,..., d n y. Each region has an origin position c y.

24 Database regions The set database contains regions in the same manner as the query regions. We will use a similar notation for them, but replace y with x (i.e. positions are l 1 x,... ) We will refer to the database patches as r 1, r 2,....

25 Similarity score of two patches Given a database patch r j and a query patch q i. We can define the likelihood between the two as: P(r j, q i ) = e ( (l j x c x ) (l i y c y ) 2) e ( dj x d i y 2 )

26 Likelihood of a query patch We can define this by finding the database patch that resembles the query patch the most: mlc i (c x) = max P(r j, q i ) j Note that c x is given as an input since we move the database patch a bit inside the query region.

27 Likelihood of a query region We simply propagate the likelihood values from patches: m c (c x ) = i m i lc (c x)

28 Likelihood score of a pixel We define the likelihood of a pixel as the maximum of it s likelihoods in each of the regions that contains it. Occlusion may cause us to get low likelihood values and requires special treatment.

29 Using the likelihood score Using a simple threshold, one can use now check the likelihood score in order to find out suspicious movements. This can be used in the PrivacyCam in a way such that parts of the video with suspicious movements are accessible to more people than the rest of the video.

30 Bibliography A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y. Tian, A. Ekin. Enabling Video Privacy Through Computer Vision. O. Boiman and M. Irani, Detecting Irregularities in Images and in Video

Video Privacy in the Age of Automated Surveillance

Video Privacy in the Age of Automated Surveillance Video Privacy in the Age of Automated Surveillance Lisa M. Brown, Senem Velipasalar, Andrew W. Senior, Sharath Pankanti, Arun Hampapur, Chiao-fe Shu, Ying-li Tian IBM T.J Watson Research Center Yorktown

More information

De-identifying Facial Images using k-anonymity

De-identifying Facial Images using k-anonymity De-identifying Facial Images using k-anonymity Ori Brostovski March 2, 2008 Outline Introduction General notions Our Presentation Basic terminology Exploring popular de-identification algorithms Examples

More information

Local features: detection and description. Local invariant features

Local features: detection and description. Local invariant features Local features: detection and description Local invariant features Detection of interest points Harris corner detection Scale invariant blob detection: LoG Description of local patches SIFT : Histograms

More information

Robert Collins CSE486, Penn State. Lecture 09: Stereo Algorithms

Robert Collins CSE486, Penn State. Lecture 09: Stereo Algorithms Lecture 09: Stereo Algorithms left camera located at (0,0,0) Recall: Simple Stereo System Y y Image coords of point (X,Y,Z) Left Camera: x T x z (, ) y Z (, ) x (X,Y,Z) z X right camera located at (T x,0,0)

More information

Introduction to SLAM Part II. Paul Robertson

Introduction to SLAM Part II. Paul Robertson Introduction to SLAM Part II Paul Robertson Localization Review Tracking, Global Localization, Kidnapping Problem. Kalman Filter Quadratic Linear (unless EKF) SLAM Loop closing Scaling: Partition space

More information

CS 231A Computer Vision (Winter 2018) Problem Set 3

CS 231A Computer Vision (Winter 2018) Problem Set 3 CS 231A Computer Vision (Winter 2018) Problem Set 3 Due: Feb 28, 2018 (11:59pm) 1 Space Carving (25 points) Dense 3D reconstruction is a difficult problem, as tackling it from the Structure from Motion

More information

Frequently asked questions on video-surveillance: prior checking

Frequently asked questions on video-surveillance: prior checking Last updated on 17 March 2010 Frequently asked questions on video-surveillance: prior checking 1. What is prior checking? Article 27 of the Data Protection Regulation 1 provides that "processing operations

More information

Local features: detection and description May 12 th, 2015

Local features: detection and description May 12 th, 2015 Local features: detection and description May 12 th, 2015 Yong Jae Lee UC Davis Announcements PS1 grades up on SmartSite PS1 stats: Mean: 83.26 Standard Dev: 28.51 PS2 deadline extended to Saturday, 11:59

More information

Statistical image models

Statistical image models Chapter 4 Statistical image models 4. Introduction 4.. Visual worlds Figure 4. shows images that belong to different visual worlds. The first world (fig. 4..a) is the world of white noise. It is the world

More information

Recall: Derivative of Gaussian Filter. Lecture 7: Correspondence Matching. Observe and Generalize. Observe and Generalize. Observe and Generalize

Recall: Derivative of Gaussian Filter. Lecture 7: Correspondence Matching. Observe and Generalize. Observe and Generalize. Observe and Generalize Recall: Derivative of Gaussian Filter G x I x =di(x,y)/dx Lecture 7: Correspondence Matching Reading: T&V Section 7.2 I(x,y) G y convolve convolve I y =di(x,y)/dy Observe and Generalize Derivative of Gaussian

More information

Midterm Wed. Local features: detection and description. Today. Last time. Local features: main components. Goal: interest operator repeatability

Midterm Wed. Local features: detection and description. Today. Last time. Local features: main components. Goal: interest operator repeatability Midterm Wed. Local features: detection and description Monday March 7 Prof. UT Austin Covers material up until 3/1 Solutions to practice eam handed out today Bring a 8.5 11 sheet of notes if you want Review

More information

CHAPTER 3. Single-view Geometry. 1. Consequences of Projection

CHAPTER 3. Single-view Geometry. 1. Consequences of Projection CHAPTER 3 Single-view Geometry When we open an eye or take a photograph, we see only a flattened, two-dimensional projection of the physical underlying scene. The consequences are numerous and startling.

More information

Understanding Geospatial Data Models

Understanding Geospatial Data Models Understanding Geospatial Data Models 1 A geospatial data model is a formal means of representing spatially referenced information. It is a simplified view of physical entities and a conceptualization of

More information

Introduction to Homogeneous coordinates

Introduction to Homogeneous coordinates Last class we considered smooth translations and rotations of the camera coordinate system and the resulting motions of points in the image projection plane. These two transformations were expressed mathematically

More information

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO

More information

1. Mesh Coloring a.) Assign unique color to each polygon based on the polygon id.

1. Mesh Coloring a.) Assign unique color to each polygon based on the polygon id. 1. Mesh Coloring a.) Assign unique color to each polygon based on the polygon id. Figure 1: The dragon model is shown rendered using a coloring scheme based on coloring each triangle face according to

More information

Bioimage Informatics

Bioimage Informatics Bioimage Informatics Lecture 13, Spring 2012 Bioimage Data Analysis (IV) Image Segmentation (part 2) Lecture 13 February 29, 2012 1 Outline Review: Steger s line/curve detection algorithm Intensity thresholding

More information

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 29-33 Analysis of Image and Video Using Color, Texture and Shape Features

More information

Joint design of data analysis algorithms and user interface for video applications

Joint design of data analysis algorithms and user interface for video applications Joint design of data analysis algorithms and user interface for video applications Nebojsa Jojic Microsoft Research Sumit Basu Microsoft Research Nemanja Petrovic University of Illinois Brendan Frey University

More information

s, Texts and Social Media: What Physicians Need to Know

s, Texts and Social Media: What Physicians Need to Know Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text

More information

Scale Invariant Feature Transform

Scale Invariant Feature Transform Scale Invariant Feature Transform Why do we care about matching features? Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Image

More information

CS395T Visual Recogni5on and Search. Gautam S. Muralidhar

CS395T Visual Recogni5on and Search. Gautam S. Muralidhar CS395T Visual Recogni5on and Search Gautam S. Muralidhar Today s Theme Unsupervised discovery of images Main mo5va5on behind unsupervised discovery is that supervision is expensive Common tasks include

More information

CS4670: Computer Vision

CS4670: Computer Vision CS4670: Computer Vision Noah Snavely Lecture 6: Feature matching and alignment Szeliski: Chapter 6.1 Reading Last time: Corners and blobs Scale-space blob detector: Example Feature descriptors We know

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

Does the Brain do Inverse Graphics?

Does the Brain do Inverse Graphics? Does the Brain do Inverse Graphics? Geoffrey Hinton, Alex Krizhevsky, Navdeep Jaitly, Tijmen Tieleman & Yichuan Tang Department of Computer Science University of Toronto How to learn many layers of features

More information

Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma

Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Presented by Hu Han Jan. 30 2014 For CSE 902 by Prof. Anil K. Jain: Selected

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 14th International Conference of the Biometrics Special Interest Group, BIOSIG, Darmstadt, Germany, 9-11 September,

More information

Panoramic Image Stitching

Panoramic Image Stitching Mcgill University Panoramic Image Stitching by Kai Wang Pengbo Li A report submitted in fulfillment for the COMP 558 Final project in the Faculty of Computer Science April 2013 Mcgill University Abstract

More information

CPSC 425: Computer Vision

CPSC 425: Computer Vision CPSC 425: Computer Vision Image Credit: https://docs.adaptive-vision.com/4.7/studio/machine_vision_guide/templatematching.html Lecture 9: Template Matching (cont.) and Scaled Representations ( unless otherwise

More information

Reconstruction of Images Distorted by Water Waves

Reconstruction of Images Distorted by Water Waves Reconstruction of Images Distorted by Water Waves Arturo Donate and Eraldo Ribeiro Computer Vision Group Outline of the talk Introduction Analysis Background Method Experiments Conclusions Future Work

More information

Scale Invariant Feature Transform

Scale Invariant Feature Transform Why do we care about matching features? Scale Invariant Feature Transform Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Automatic

More information

SW013 SW013C (Optional 2nd Camera) USER MANUAL WWW.SILENTWITNESS.CO.UK 1 Menu 4 About your SW013 5 Key functions 6 Installing the SW013 07-12 Menu options 13-14 Optional 2nd camera 15 Media playback 15

More information

SOLUTION BRIEF. Video Changes the Future of Policing

SOLUTION BRIEF. Video Changes the Future of Policing SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to

More information

Positioning in CSS: There are 5 different ways we can set our position:

Positioning in CSS: There are 5 different ways we can set our position: Positioning in CSS: So you know now how to change the color and style of the elements on your webpage but how do we get them exactly where we want them to be placed? There are 5 different ways we can set

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Detecting Irregularities in Images and in Video

Detecting Irregularities in Images and in Video Detecting Irregularities in Images and in Video Oren Boiman Michal Irani Dept. of Computer Science and Applied Math The Weizmann Institute of Science 76100 Rehovot, Israel Abstract We address the problem

More information

Universiteit Leiden Computer Science

Universiteit Leiden Computer Science Universiteit Leiden Computer Science Optimizing octree updates for visibility determination on dynamic scenes Name: Hans Wortel Student-no: 0607940 Date: 28/07/2011 1st supervisor: Dr. Michael Lew 2nd

More information

3D Reconstruction of a Hopkins Landmark

3D Reconstruction of a Hopkins Landmark 3D Reconstruction of a Hopkins Landmark Ayushi Sinha (461), Hau Sze (461), Diane Duros (361) Abstract - This paper outlines a method for 3D reconstruction from two images. Our procedure is based on known

More information

Predicting 3D People from 2D Pictures

Predicting 3D People from 2D Pictures Predicting 3D People from 2D Pictures Leonid Sigal Michael J. Black Department of Computer Science Brown University http://www.cs.brown.edu/people/ls/ CIAR Summer School August 15-20, 2006 Leonid Sigal

More information

Lecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa

Lecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa Instructors: Parth Shah, Riju Pahwa Lecture 2 Notes Outline 1. Neural Networks The Big Idea Architecture SGD and Backpropagation 2. Convolutional Neural Networks Intuition Architecture 3. Recurrent Neural

More information

Detection and Classification of Vehicles

Detection and Classification of Vehicles Detection and Classification of Vehicles Gupte et al. 2002 Zeeshan Mohammad ECG 782 Dr. Brendan Morris. Introduction Previously, magnetic loop detectors were used to count vehicles passing over them. Advantages

More information

Deep Tracking: Biologically Inspired Tracking with Deep Convolutional Networks

Deep Tracking: Biologically Inspired Tracking with Deep Convolutional Networks Deep Tracking: Biologically Inspired Tracking with Deep Convolutional Networks Si Chen The George Washington University sichen@gwmail.gwu.edu Meera Hahn Emory University mhahn7@emory.edu Mentor: Afshin

More information

Creating Hair Textures with highlights using The GIMP

Creating Hair Textures with highlights using The GIMP Creating Hair Textures with highlights using The GIMP Most users out there use either Photoshop or Paint Shop Pro, but have any of you ever actually heard of The GIMP? It is a free image editing software,

More information

Computer Vesion Based Music Information Retrieval

Computer Vesion Based Music Information Retrieval Computer Vesion Based Music Information Retrieval Philippe De Wagter pdewagte@andrew.cmu.edu Quan Chen quanc@andrew.cmu.edu Yuqian Zhao yuqianz@andrew.cmu.edu Department of Electrical and Computer Engineering

More information

Cs : Computer Vision Final Project Report

Cs : Computer Vision Final Project Report Cs 600.461: Computer Vision Final Project Report Giancarlo Troni gtroni@jhu.edu Raphael Sznitman sznitman@jhu.edu Abstract Given a Youtube video of a busy street intersection, our task is to detect, track,

More information

Graphical Models for Computer Vision

Graphical Models for Computer Vision Graphical Models for Computer Vision Pedro F Felzenszwalb Brown University Joint work with Dan Huttenlocher, Joshua Schwartz, Ross Girshick, David McAllester, Deva Ramanan, Allie Shapiro, John Oberlin

More information

Handling Your Data in SPSS. Columns, and Labels, and Values... Oh My! The Structure of SPSS. You should think about SPSS as having three major parts.

Handling Your Data in SPSS. Columns, and Labels, and Values... Oh My! The Structure of SPSS. You should think about SPSS as having three major parts. Handling Your Data in SPSS Columns, and Labels, and Values... Oh My! You might think that simple intuition will guide you to a useful organization of your data. If you follow that path, you might find

More information

Real Time Unattended Object Detection and Tracking Using MATLAB

Real Time Unattended Object Detection and Tracking Using MATLAB Real Time Unattended Object Detection and Tracking Using MATLAB Sagar Sangale 1, Sandip Rahane 2 P.G. Student, Department of Electronics Engineering, Amrutvahini College of Engineering, Sangamner, Maharashtra,

More information

(Sample) Final Exam with brief answers

(Sample) Final Exam with brief answers Name: Perm #: (Sample) Final Exam with brief answers CS/ECE 181B Intro to Computer Vision March 24, 2017 noon 3:00 pm This is a closed-book test. There are also a few pages of equations, etc. included

More information

Early Fundamentals of Coordinate Changes and Rotation Matrices for 3D Computer Vision

Early Fundamentals of Coordinate Changes and Rotation Matrices for 3D Computer Vision Early Fundamentals of Coordinate Changes and Rotation Matrices for 3D Computer Vision Ricardo Fabbri Benjamin B. Kimia Brown University, Division of Engineering, Providence RI 02912, USA Based the first

More information

Object Detection System

Object Detection System A Trainable View-Based Object Detection System Thesis Proposal Henry A. Rowley Thesis Committee: Takeo Kanade, Chair Shumeet Baluja Dean Pomerleau Manuela Veloso Tomaso Poggio, MIT Motivation Object detection

More information

CHAPTER 8 Multimedia Information Retrieval

CHAPTER 8 Multimedia Information Retrieval CHAPTER 8 Multimedia Information Retrieval Introduction Text has been the predominant medium for the communication of information. With the availability of better computing capabilities such as availability

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

From Structure-from-Motion Point Clouds to Fast Location Recognition

From Structure-from-Motion Point Clouds to Fast Location Recognition From Structure-from-Motion Point Clouds to Fast Location Recognition Arnold Irschara1;2, Christopher Zach2, Jan-Michael Frahm2, Horst Bischof1 1Graz University of Technology firschara, bischofg@icg.tugraz.at

More information

Chapter 2: Graphical Summaries of Data 2.1 Graphical Summaries for Qualitative Data. Frequency: Frequency distribution:

Chapter 2: Graphical Summaries of Data 2.1 Graphical Summaries for Qualitative Data. Frequency: Frequency distribution: Chapter 2: Graphical Summaries of Data 2.1 Graphical Summaries for Qualitative Data Frequency: Frequency distribution: Example 2.1 The following are survey results from Fall 2014 Statistics class regarding

More information

Tor2web: exposing the darknet on Internet. Giovanni Pellerano, E-Privacy, Florence June

Tor2web: exposing the darknet on Internet. Giovanni Pellerano, E-Privacy, Florence June Tor2web: exposing the darknet on Internet Giovanni Pellerano, E-Privacy, Florence June 8 2013 Who am I? Giovanni Pellerano Independent Security Researcher Co-Founder of Hermes Association Actually involved

More information

CAP 6412 Advanced Computer Vision

CAP 6412 Advanced Computer Vision CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha

More information

Bus Detection and recognition for visually impaired people

Bus Detection and recognition for visually impaired people Bus Detection and recognition for visually impaired people Hangrong Pan, Chucai Yi, and Yingli Tian The City College of New York The Graduate Center The City University of New York MAP4VIP Outline Motivation

More information

Multi-Camera Calibration, Object Tracking and Query Generation

Multi-Camera Calibration, Object Tracking and Query Generation MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Multi-Camera Calibration, Object Tracking and Query Generation Porikli, F.; Divakaran, A. TR2003-100 August 2003 Abstract An automatic object

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind

More information

(Refer Slide Time: 00:01:27 min)

(Refer Slide Time: 00:01:27 min) Computer Aided Design Prof. Dr. Anoop Chawla Department of Mechanical engineering Indian Institute of Technology, Delhi Lecture No. # 01 An Introduction to CAD Today we are basically going to introduce

More information

Small Business Guide to CCTV. Getting the most out of your Surveillance Camera System

Small Business Guide to CCTV. Getting the most out of your Surveillance Camera System Small Business Guide to CCTV Getting the most out of your Surveillance Camera System November 2018 Small Business Guide to CCTV Getting the most out of your Surveillance Camera System This document offers

More information

1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi?

1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi? Page: 1 of 7 1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi? 2 Stephanie Yes. 3 R1 That was you have

More information

Face Hallucination Based on Eigentransformation Learning

Face Hallucination Based on Eigentransformation Learning Advanced Science and Technology etters, pp.32-37 http://dx.doi.org/10.14257/astl.2016. Face allucination Based on Eigentransformation earning Guohua Zou School of software, East China University of Technology,

More information

Deep Convolutional Neural Networks. Nov. 20th, 2015 Bruce Draper

Deep Convolutional Neural Networks. Nov. 20th, 2015 Bruce Draper Deep Convolutional Neural Networks Nov. 20th, 2015 Bruce Draper Background: Fully-connected single layer neural networks Feed-forward classification Trained through back-propagation Example Computer Vision

More information

Statistical Databases: Query Restriction

Statistical Databases: Query Restriction Statistical Databases: Query Restriction Nina Mishra January 21, 2004 Introduction A statistical database typically contains information about n individuals where n is very large. A statistical database

More information

Numenta Node Algorithms Guide NuPIC 1.7

Numenta Node Algorithms Guide NuPIC 1.7 1 NuPIC 1.7 includes early implementations of the second generation of the Numenta HTM learning algorithms. These algorithms are available as two node types: SpatialPoolerNode and TemporalPoolerNode. This

More information

Single link clustering: 11/7: Lecture 18. Clustering Heuristics 1

Single link clustering: 11/7: Lecture 18. Clustering Heuristics 1 Graphs and Networks Page /7: Lecture 8. Clustering Heuristics Wednesday, November 8, 26 8:49 AM Today we will talk about clustering and partitioning in graphs, and sometimes in data sets. Partitioning

More information

Tracking Computer Vision Spring 2018, Lecture 24

Tracking Computer Vision Spring 2018, Lecture 24 Tracking http://www.cs.cmu.edu/~16385/ 16-385 Computer Vision Spring 2018, Lecture 24 Course announcements Homework 6 has been posted and is due on April 20 th. - Any questions about the homework? - How

More information

Storage Industry Resource Domain Model

Storage Industry Resource Domain Model Storage Industry Resource Domain Model A Technical Proposal from the SNIA Technical Council Topics Abstract Data Storage Interfaces Storage Resource Domain Data Resource Domain Information Resource Domain

More information

Understanding Tracking and StroMotion of Soccer Ball

Understanding Tracking and StroMotion of Soccer Ball Understanding Tracking and StroMotion of Soccer Ball Nhat H. Nguyen Master Student 205 Witherspoon Hall Charlotte, NC 28223 704 656 2021 rich.uncc@gmail.com ABSTRACT Soccer requires rapid ball movements.

More information

Computer Vision 5 Segmentation by Clustering

Computer Vision 5 Segmentation by Clustering Computer Vision 5 Segmentation by Clustering MAP-I Doctoral Programme Miguel Tavares Coimbra Outline Introduction Applications Simple clustering K-means clustering Graph-theoretic clustering Acknowledgements:

More information

Does the Brain do Inverse Graphics?

Does the Brain do Inverse Graphics? Does the Brain do Inverse Graphics? Geoffrey Hinton, Alex Krizhevsky, Navdeep Jaitly, Tijmen Tieleman & Yichuan Tang Department of Computer Science University of Toronto The representation used by the

More information

Tracking. Hao Guan( 管皓 ) School of Computer Science Fudan University

Tracking. Hao Guan( 管皓 ) School of Computer Science Fudan University Tracking Hao Guan( 管皓 ) School of Computer Science Fudan University 2014-09-29 Multimedia Video Audio Use your eyes Video Tracking Use your ears Audio Tracking Tracking Video Tracking Definition Given

More information

Data-driven Approaches to Simulation (Motion Capture)

Data-driven Approaches to Simulation (Motion Capture) 1 Data-driven Approaches to Simulation (Motion Capture) Ting-Chun Sun tingchun.sun@usc.edu Preface The lecture slides [1] are made by Jessica Hodgins [2], who is a professor in Computer Science Department

More information

Why is computer vision difficult?

Why is computer vision difficult? Why is computer vision difficult? Viewpoint variation Illumination Scale Why is computer vision difficult? Intra-class variation Motion (Source: S. Lazebnik) Background clutter Occlusion Challenges: local

More information

Elementary Statistics. Organizing Raw Data

Elementary Statistics. Organizing Raw Data Organizing Raw Data What is a Raw Data? Raw Data (sometimes called source data) is data that has not been processed for meaningful use. What is a Frequency Distribution Table? A Frequency Distribution

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

Multidimensional Data and Modelling

Multidimensional Data and Modelling Multidimensional Data and Modelling 1 Problems of multidimensional data structures l multidimensional (md-data or spatial) data and their implementation of operations between objects (spatial data practically

More information

Combining PGMs and Discriminative Models for Upper Body Pose Detection

Combining PGMs and Discriminative Models for Upper Body Pose Detection Combining PGMs and Discriminative Models for Upper Body Pose Detection Gedas Bertasius May 30, 2014 1 Introduction In this project, I utilized probabilistic graphical models together with discriminative

More information

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++

Dietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++ Dietrich Paulus Joachim Hornegger Pattern Recognition of Images and Speech in C++ To Dorothea, Belinda, and Dominik In the text we use the following names which are protected, trademarks owned by a company

More information

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Final Report Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This report describes a method to align two videos.

More information

CPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017

CPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017 CPSC 340: Machine Learning and Data Mining Principal Component Analysis Fall 2017 Assignment 3: 2 late days to hand in tonight. Admin Assignment 4: Due Friday of next week. Last Time: MAP Estimation MAP

More information

AUTOMATIC VIDEO INDEXING

AUTOMATIC VIDEO INDEXING AUTOMATIC VIDEO INDEXING Itxaso Bustos Maite Frutos TABLE OF CONTENTS Introduction Methods Key-frame extraction Automatic visual indexing Shot boundary detection Video OCR Index in motion Image processing

More information

Exam. Material for Exam. Exam Location. Time. Lecture 24:Resource Bounded Reasoning. Location GSMN 51 Goessmann Lab

Exam. Material for Exam. Exam Location. Time. Lecture 24:Resource Bounded Reasoning. Location GSMN 51 Goessmann Lab Exam Lecture 24:Resource Bounded Reasoning Victor Lesser CMPSCI 683 Fall 2004 Time Friday 12/17 8-10am. Location GSMN 51 Goessmann Lab Open Book Only on Material not covered on Midterm 2 Exam Location

More information

I am sure most readers will agree that designing

I am sure most readers will agree that designing Text and illustrations by Vlado Damjanovski CCTV focus I am sure most readers will agree that designing a CCTV system is not a simple task. Not everybody can design a system, and this is why very often

More information

Including the Size of Regions in Image Segmentation by Region Based Graph

Including the Size of Regions in Image Segmentation by Region Based Graph International Journal of Emerging Engineering Research and Technology Volume 3, Issue 4, April 2015, PP 81-85 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Including the Size of Regions in Image Segmentation

More information

Attentional Based Multiple-Object Tracking

Attentional Based Multiple-Object Tracking Attentional Based Multiple-Object Tracking Mark Calafut Stanford University mcalafut@stanford.edu Abstract This paper investigates the attentional based tracking framework of Bazzani et al. (2011) and

More information

CSE 158 Lecture 6. Web Mining and Recommender Systems. Community Detection

CSE 158 Lecture 6. Web Mining and Recommender Systems. Community Detection CSE 158 Lecture 6 Web Mining and Recommender Systems Community Detection Dimensionality reduction Goal: take high-dimensional data, and describe it compactly using a small number of dimensions Assumption:

More information

CS1114 Section: SIFT April 3, 2013

CS1114 Section: SIFT April 3, 2013 CS1114 Section: SIFT April 3, 2013 Object recognition has three basic parts: feature extraction, feature matching, and fitting a transformation. In this lab, you ll learn about SIFT feature extraction

More information

We will only ask you for information which is absolutely necessary for us to help you and that which you have consented to providing,

We will only ask you for information which is absolutely necessary for us to help you and that which you have consented to providing, Privacy Policy Here at frank. we understand that your information is valuable to you and the trust you place in us to look after it is not something we take for granted. The policy outlined below outlines

More information

Siri, Is it really secure?

Siri, Is it really secure? Bouncing News To You What Do YOU think? Got Suggestions or questions? Email: ronnie.hiscockjournalist@gma il.com Or join us on Google+ The Boomerang Website: victorianewspaper.weebly.com Contents Page

More information

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr

More information

Privacy Policy. LAST UPDATED: 23 June March 2017

Privacy Policy. LAST UPDATED: 23 June March 2017 Privacy Policy LAST UPDATED: 23 June 20156 March 2017 VERSION 3.0 2.0 Comment [A1]: The Privacy Policy has been updated because we now use Google Analytics, to help improve our services and our communications

More information

Project Updates Short lecture Volumetric Modeling +2 papers

Project Updates Short lecture Volumetric Modeling +2 papers Volumetric Modeling Schedule (tentative) Feb 20 Feb 27 Mar 5 Introduction Lecture: Geometry, Camera Model, Calibration Lecture: Features, Tracking/Matching Mar 12 Mar 19 Mar 26 Apr 2 Apr 9 Apr 16 Apr 23

More information

Object Recognition with Invariant Features

Object Recognition with Invariant Features Object Recognition with Invariant Features Definition: Identify objects or scenes and determine their pose and model parameters Applications Industrial automation and inspection Mobile robots, toys, user

More information

Database Management System Fall Introduction to Information and Communication Technologies CSD 102

Database Management System Fall Introduction to Information and Communication Technologies CSD 102 Database Management System Fall 2016 Introduction to Information and Communication Technologies CSD 102 Outline What a database is, the individuals who use them, and how databases evolved Important database

More information

Here are some of the more basic curves that we ll need to know how to do as well as limits on the parameter if they are required.

Here are some of the more basic curves that we ll need to know how to do as well as limits on the parameter if they are required. 1 of 10 23/07/2016 05:15 Paul's Online Math Notes Calculus III (Notes) / Line Integrals / Line Integrals - Part I Problems] [Notes] [Practice Problems] [Assignment Calculus III - Notes Line Integrals Part

More information

Cryptography Worksheet

Cryptography Worksheet Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private

More information