Protecting privacy from CCTV
|
|
- Grant Leonard
- 5 years ago
- Views:
Transcription
1 Protecting privacy from CCTV Ori Brostovski March 2, 2008
2 Introduction In this presentation I am going to talk about: The abuse potential of CCTV-s. The PrivacyCam model that was offered in Enabling Video Privacy Through Computer Vision. An outline of the irregularity detection algorithm offered in Detecting Irregularities in Images and in Video, this algorithm can be used by the PrivacyCam.
3 The PrivacyCam
4 The Problem CCTV cameras are widely used, recording videos of most people. The ability to use computer vision to detect a specific person makes abuse of these videos too convenient.
5 Abuses of CCTV The American Civil Liberties Union has defined possible abuses of CCTV: Criminal abuse. Abuse for personal purposes. Discriminatory targeting. Voyeurism.
6 Legitimate uses of CCTV It should be noted that CCTV-s has many legitimate uses: Security - By stopping crimes from occurring in real-time. Crime prevention - By being able to identify the criminal after the crime has occurred Automated buildings - Allows heating/lighting/elevators/phones to automatically adjust to people within the building.
7 Preventing abuse by limiting access In order to be able to protect data from abuse, we need to think about the following limitations: What data can be obtained from the video? Who can see the data? How long are the data kept? (Personally I do not feel that there is really a way to check this) What meta-data are attached to the data? (i.e. time, place, etc.) Is the data stored safely?
8 A solution - The PrivacyCam A PrivacyCam system with specific properties is offered as a solution to the problems posed previously. The PrivacyCam will be composed of: PrivacyCam - A camera that sends pictures to a privacy console. The PrivacyCam may also do visual analysis on the videos. Privacy Console - users can get access from it videos or meta-data that have been modified to ensure anonymity.
9 Encryption The PrivacyCam should work by sending encrypted videos to a privacy console. The purpose of such an encryption is to prevent a user from tapping into the camera s communication channel with the console in order to get raw video information.
10 Video analysis The privacy console should analyze the video, extract privacy related information from it and create copies with different parts of the removed information and encrypting each copy with a different key.
11 Permission hierarchy The PrivacyCam will implement a hierarchy of permission to allow different users access to different parts of the video and/or metadata. There may be many users, possibly including anonymous ones or devices in the building.
12 Logging All information queries to the privacy console should be securely logged. The logging acts as a deterrent for potential abusers of the PrivacyCam.
13 Object recognition can miss There are a few problems with the PrivacyCam. Object recognition can sometimes fail to identify an object that should be hidden. This can be solved partially by defining an operating point. The operating point is a threshold that specifies to recognition algorithm how interesting something needs to be in order for it to be hidden by the PrivacyCam. Higher authority gets access to copies with a lower operating point.
14 Lack of knowledge about the adversary Even if object recognition and filtering is perfect, there is still the problem of not knowing what the adversary knows. Furthermore, the adversary of tomorrow may have access to different video analysis technologies than the PrivacyCam of today, which will allow him better data extraction ability than anticipated today.
15 Logs may give out information If many people can see the logs than this allows for a state where information can be harvested based on watching who watched what. If few people can see the logs than corruption becomes easier.
16 Summary In this presentation we have: We have described the possible abuse of CCTV cameras. We have described a possible solution to prevent such abuse. We have shown that while the ideas behind the solution are good, there are several problems in it.
17 Detecting Irregularities
18 The setting Let us limit our setting to security-related CCTV-s. Let database be some database of regular behaviors. Let query be a video we want to check. We show an algorithm that can detect irregular video events in a query, based on the regular video events in database.
19 Definition of videos For our purposes, we will think of videos as a three dimensional matrix with it s dimensions corresponding to width, height and time accordingly.
20 Definition of descriptors A descriptor represents a specialized way of looking at a specific part of the image. Similar images should have similar descriptors.
21 The temporal derivative descriptor Let Y, X, T be coordinates of row, column and time accordingly. We define D [i][j][k] be the temporal derivative of a video pixel at [Y + i][x + j][t + k]. We define D := D D, D is the temporal derivative descriptor. The intuition behind D is that it describes the motion at it s 7 7 patch.
22 Partition to regions We can partition the video to overlapping regions. Each query region will get a likelihood score, which says how much it s similar to a region to a data region.
23 Partition of regions to patches Each region is partitioned to patches q 1,..., q n. Each patch has a position vector l 1 y,..., l n y and a descriptor value d 1 y,..., d n y. Each region has an origin position c y.
24 Database regions The set database contains regions in the same manner as the query regions. We will use a similar notation for them, but replace y with x (i.e. positions are l 1 x,... ) We will refer to the database patches as r 1, r 2,....
25 Similarity score of two patches Given a database patch r j and a query patch q i. We can define the likelihood between the two as: P(r j, q i ) = e ( (l j x c x ) (l i y c y ) 2) e ( dj x d i y 2 )
26 Likelihood of a query patch We can define this by finding the database patch that resembles the query patch the most: mlc i (c x) = max P(r j, q i ) j Note that c x is given as an input since we move the database patch a bit inside the query region.
27 Likelihood of a query region We simply propagate the likelihood values from patches: m c (c x ) = i m i lc (c x)
28 Likelihood score of a pixel We define the likelihood of a pixel as the maximum of it s likelihoods in each of the regions that contains it. Occlusion may cause us to get low likelihood values and requires special treatment.
29 Using the likelihood score Using a simple threshold, one can use now check the likelihood score in order to find out suspicious movements. This can be used in the PrivacyCam in a way such that parts of the video with suspicious movements are accessible to more people than the rest of the video.
30 Bibliography A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y. Tian, A. Ekin. Enabling Video Privacy Through Computer Vision. O. Boiman and M. Irani, Detecting Irregularities in Images and in Video
Video Privacy in the Age of Automated Surveillance
Video Privacy in the Age of Automated Surveillance Lisa M. Brown, Senem Velipasalar, Andrew W. Senior, Sharath Pankanti, Arun Hampapur, Chiao-fe Shu, Ying-li Tian IBM T.J Watson Research Center Yorktown
More informationDe-identifying Facial Images using k-anonymity
De-identifying Facial Images using k-anonymity Ori Brostovski March 2, 2008 Outline Introduction General notions Our Presentation Basic terminology Exploring popular de-identification algorithms Examples
More informationLocal features: detection and description. Local invariant features
Local features: detection and description Local invariant features Detection of interest points Harris corner detection Scale invariant blob detection: LoG Description of local patches SIFT : Histograms
More informationRobert Collins CSE486, Penn State. Lecture 09: Stereo Algorithms
Lecture 09: Stereo Algorithms left camera located at (0,0,0) Recall: Simple Stereo System Y y Image coords of point (X,Y,Z) Left Camera: x T x z (, ) y Z (, ) x (X,Y,Z) z X right camera located at (T x,0,0)
More informationIntroduction to SLAM Part II. Paul Robertson
Introduction to SLAM Part II Paul Robertson Localization Review Tracking, Global Localization, Kidnapping Problem. Kalman Filter Quadratic Linear (unless EKF) SLAM Loop closing Scaling: Partition space
More informationCS 231A Computer Vision (Winter 2018) Problem Set 3
CS 231A Computer Vision (Winter 2018) Problem Set 3 Due: Feb 28, 2018 (11:59pm) 1 Space Carving (25 points) Dense 3D reconstruction is a difficult problem, as tackling it from the Structure from Motion
More informationFrequently asked questions on video-surveillance: prior checking
Last updated on 17 March 2010 Frequently asked questions on video-surveillance: prior checking 1. What is prior checking? Article 27 of the Data Protection Regulation 1 provides that "processing operations
More informationLocal features: detection and description May 12 th, 2015
Local features: detection and description May 12 th, 2015 Yong Jae Lee UC Davis Announcements PS1 grades up on SmartSite PS1 stats: Mean: 83.26 Standard Dev: 28.51 PS2 deadline extended to Saturday, 11:59
More informationStatistical image models
Chapter 4 Statistical image models 4. Introduction 4.. Visual worlds Figure 4. shows images that belong to different visual worlds. The first world (fig. 4..a) is the world of white noise. It is the world
More informationRecall: Derivative of Gaussian Filter. Lecture 7: Correspondence Matching. Observe and Generalize. Observe and Generalize. Observe and Generalize
Recall: Derivative of Gaussian Filter G x I x =di(x,y)/dx Lecture 7: Correspondence Matching Reading: T&V Section 7.2 I(x,y) G y convolve convolve I y =di(x,y)/dy Observe and Generalize Derivative of Gaussian
More informationMidterm Wed. Local features: detection and description. Today. Last time. Local features: main components. Goal: interest operator repeatability
Midterm Wed. Local features: detection and description Monday March 7 Prof. UT Austin Covers material up until 3/1 Solutions to practice eam handed out today Bring a 8.5 11 sheet of notes if you want Review
More informationCHAPTER 3. Single-view Geometry. 1. Consequences of Projection
CHAPTER 3 Single-view Geometry When we open an eye or take a photograph, we see only a flattened, two-dimensional projection of the physical underlying scene. The consequences are numerous and startling.
More informationUnderstanding Geospatial Data Models
Understanding Geospatial Data Models 1 A geospatial data model is a formal means of representing spatially referenced information. It is a simplified view of physical entities and a conceptualization of
More informationIntroduction to Homogeneous coordinates
Last class we considered smooth translations and rotations of the camera coordinate system and the resulting motions of points in the image projection plane. These two transformations were expressed mathematically
More informationMATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA
Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO
More information1. Mesh Coloring a.) Assign unique color to each polygon based on the polygon id.
1. Mesh Coloring a.) Assign unique color to each polygon based on the polygon id. Figure 1: The dragon model is shown rendered using a coloring scheme based on coloring each triangle face according to
More informationBioimage Informatics
Bioimage Informatics Lecture 13, Spring 2012 Bioimage Data Analysis (IV) Image Segmentation (part 2) Lecture 13 February 29, 2012 1 Outline Review: Steger s line/curve detection algorithm Intensity thresholding
More informationAnalysis of Image and Video Using Color, Texture and Shape Features for Object Identification
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 29-33 Analysis of Image and Video Using Color, Texture and Shape Features
More informationJoint design of data analysis algorithms and user interface for video applications
Joint design of data analysis algorithms and user interface for video applications Nebojsa Jojic Microsoft Research Sumit Basu Microsoft Research Nemanja Petrovic University of Illinois Brendan Frey University
More informations, Texts and Social Media: What Physicians Need to Know
Emails, Texts and Social Media: What Physicians Need to Know 1 Today s Learning Objectives By the end of today s program, you will be able to : Identify the risks to patients privacy which email, text
More informationScale Invariant Feature Transform
Scale Invariant Feature Transform Why do we care about matching features? Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Image
More informationCS395T Visual Recogni5on and Search. Gautam S. Muralidhar
CS395T Visual Recogni5on and Search Gautam S. Muralidhar Today s Theme Unsupervised discovery of images Main mo5va5on behind unsupervised discovery is that supervision is expensive Common tasks include
More informationCS4670: Computer Vision
CS4670: Computer Vision Noah Snavely Lecture 6: Feature matching and alignment Szeliski: Chapter 6.1 Reading Last time: Corners and blobs Scale-space blob detector: Example Feature descriptors We know
More informationStorage and File System
COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File
More informationDoes the Brain do Inverse Graphics?
Does the Brain do Inverse Graphics? Geoffrey Hinton, Alex Krizhevsky, Navdeep Jaitly, Tijmen Tieleman & Yichuan Tang Department of Computer Science University of Toronto How to learn many layers of features
More informationRobust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma
Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Presented by Hu Han Jan. 30 2014 For CSE 902 by Prof. Anil K. Jain: Selected
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 14th International Conference of the Biometrics Special Interest Group, BIOSIG, Darmstadt, Germany, 9-11 September,
More informationPanoramic Image Stitching
Mcgill University Panoramic Image Stitching by Kai Wang Pengbo Li A report submitted in fulfillment for the COMP 558 Final project in the Faculty of Computer Science April 2013 Mcgill University Abstract
More informationCPSC 425: Computer Vision
CPSC 425: Computer Vision Image Credit: https://docs.adaptive-vision.com/4.7/studio/machine_vision_guide/templatematching.html Lecture 9: Template Matching (cont.) and Scaled Representations ( unless otherwise
More informationReconstruction of Images Distorted by Water Waves
Reconstruction of Images Distorted by Water Waves Arturo Donate and Eraldo Ribeiro Computer Vision Group Outline of the talk Introduction Analysis Background Method Experiments Conclusions Future Work
More informationScale Invariant Feature Transform
Why do we care about matching features? Scale Invariant Feature Transform Camera calibration Stereo Tracking/SFM Image moiaicing Object/activity Recognition Objection representation and recognition Automatic
More informationSW013 SW013C (Optional 2nd Camera) USER MANUAL WWW.SILENTWITNESS.CO.UK 1 Menu 4 About your SW013 5 Key functions 6 Installing the SW013 07-12 Menu options 13-14 Optional 2nd camera 15 Media playback 15
More informationSOLUTION BRIEF. Video Changes the Future of Policing
SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to
More informationPositioning in CSS: There are 5 different ways we can set our position:
Positioning in CSS: So you know now how to change the color and style of the elements on your webpage but how do we get them exactly where we want them to be placed? There are 5 different ways we can set
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More informationDetecting Irregularities in Images and in Video
Detecting Irregularities in Images and in Video Oren Boiman Michal Irani Dept. of Computer Science and Applied Math The Weizmann Institute of Science 76100 Rehovot, Israel Abstract We address the problem
More informationUniversiteit Leiden Computer Science
Universiteit Leiden Computer Science Optimizing octree updates for visibility determination on dynamic scenes Name: Hans Wortel Student-no: 0607940 Date: 28/07/2011 1st supervisor: Dr. Michael Lew 2nd
More information3D Reconstruction of a Hopkins Landmark
3D Reconstruction of a Hopkins Landmark Ayushi Sinha (461), Hau Sze (461), Diane Duros (361) Abstract - This paper outlines a method for 3D reconstruction from two images. Our procedure is based on known
More informationPredicting 3D People from 2D Pictures
Predicting 3D People from 2D Pictures Leonid Sigal Michael J. Black Department of Computer Science Brown University http://www.cs.brown.edu/people/ls/ CIAR Summer School August 15-20, 2006 Leonid Sigal
More informationLecture 2 Notes. Outline. Neural Networks. The Big Idea. Architecture. Instructors: Parth Shah, Riju Pahwa
Instructors: Parth Shah, Riju Pahwa Lecture 2 Notes Outline 1. Neural Networks The Big Idea Architecture SGD and Backpropagation 2. Convolutional Neural Networks Intuition Architecture 3. Recurrent Neural
More informationDetection and Classification of Vehicles
Detection and Classification of Vehicles Gupte et al. 2002 Zeeshan Mohammad ECG 782 Dr. Brendan Morris. Introduction Previously, magnetic loop detectors were used to count vehicles passing over them. Advantages
More informationDeep Tracking: Biologically Inspired Tracking with Deep Convolutional Networks
Deep Tracking: Biologically Inspired Tracking with Deep Convolutional Networks Si Chen The George Washington University sichen@gwmail.gwu.edu Meera Hahn Emory University mhahn7@emory.edu Mentor: Afshin
More informationCreating Hair Textures with highlights using The GIMP
Creating Hair Textures with highlights using The GIMP Most users out there use either Photoshop or Paint Shop Pro, but have any of you ever actually heard of The GIMP? It is a free image editing software,
More informationComputer Vesion Based Music Information Retrieval
Computer Vesion Based Music Information Retrieval Philippe De Wagter pdewagte@andrew.cmu.edu Quan Chen quanc@andrew.cmu.edu Yuqian Zhao yuqianz@andrew.cmu.edu Department of Electrical and Computer Engineering
More informationCs : Computer Vision Final Project Report
Cs 600.461: Computer Vision Final Project Report Giancarlo Troni gtroni@jhu.edu Raphael Sznitman sznitman@jhu.edu Abstract Given a Youtube video of a busy street intersection, our task is to detect, track,
More informationGraphical Models for Computer Vision
Graphical Models for Computer Vision Pedro F Felzenszwalb Brown University Joint work with Dan Huttenlocher, Joshua Schwartz, Ross Girshick, David McAllester, Deva Ramanan, Allie Shapiro, John Oberlin
More informationHandling Your Data in SPSS. Columns, and Labels, and Values... Oh My! The Structure of SPSS. You should think about SPSS as having three major parts.
Handling Your Data in SPSS Columns, and Labels, and Values... Oh My! You might think that simple intuition will guide you to a useful organization of your data. If you follow that path, you might find
More informationReal Time Unattended Object Detection and Tracking Using MATLAB
Real Time Unattended Object Detection and Tracking Using MATLAB Sagar Sangale 1, Sandip Rahane 2 P.G. Student, Department of Electronics Engineering, Amrutvahini College of Engineering, Sangamner, Maharashtra,
More information(Sample) Final Exam with brief answers
Name: Perm #: (Sample) Final Exam with brief answers CS/ECE 181B Intro to Computer Vision March 24, 2017 noon 3:00 pm This is a closed-book test. There are also a few pages of equations, etc. included
More informationEarly Fundamentals of Coordinate Changes and Rotation Matrices for 3D Computer Vision
Early Fundamentals of Coordinate Changes and Rotation Matrices for 3D Computer Vision Ricardo Fabbri Benjamin B. Kimia Brown University, Division of Engineering, Providence RI 02912, USA Based the first
More informationObject Detection System
A Trainable View-Based Object Detection System Thesis Proposal Henry A. Rowley Thesis Committee: Takeo Kanade, Chair Shumeet Baluja Dean Pomerleau Manuela Veloso Tomaso Poggio, MIT Motivation Object detection
More informationCHAPTER 8 Multimedia Information Retrieval
CHAPTER 8 Multimedia Information Retrieval Introduction Text has been the predominant medium for the communication of information. With the availability of better computing capabilities such as availability
More informationThe Table Privacy Policy Last revised on August 22, 2012
The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed
More information(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)
Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application
More informationFrom Structure-from-Motion Point Clouds to Fast Location Recognition
From Structure-from-Motion Point Clouds to Fast Location Recognition Arnold Irschara1;2, Christopher Zach2, Jan-Michael Frahm2, Horst Bischof1 1Graz University of Technology firschara, bischofg@icg.tugraz.at
More informationChapter 2: Graphical Summaries of Data 2.1 Graphical Summaries for Qualitative Data. Frequency: Frequency distribution:
Chapter 2: Graphical Summaries of Data 2.1 Graphical Summaries for Qualitative Data Frequency: Frequency distribution: Example 2.1 The following are survey results from Fall 2014 Statistics class regarding
More informationTor2web: exposing the darknet on Internet. Giovanni Pellerano, E-Privacy, Florence June
Tor2web: exposing the darknet on Internet Giovanni Pellerano, E-Privacy, Florence June 8 2013 Who am I? Giovanni Pellerano Independent Security Researcher Co-Founder of Hermes Association Actually involved
More informationCAP 6412 Advanced Computer Vision
CAP 6412 Advanced Computer Vision http://www.cs.ucf.edu/~bgong/cap6412.html Boqing Gong April 21st, 2016 Today Administrivia Free parameters in an approach, model, or algorithm? Egocentric videos by Aisha
More informationBus Detection and recognition for visually impaired people
Bus Detection and recognition for visually impaired people Hangrong Pan, Chucai Yi, and Yingli Tian The City College of New York The Graduate Center The City University of New York MAP4VIP Outline Motivation
More informationMulti-Camera Calibration, Object Tracking and Query Generation
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Multi-Camera Calibration, Object Tracking and Query Generation Porikli, F.; Divakaran, A. TR2003-100 August 2003 Abstract An automatic object
More informationCOS 318: Operating Systems
COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind
More information(Refer Slide Time: 00:01:27 min)
Computer Aided Design Prof. Dr. Anoop Chawla Department of Mechanical engineering Indian Institute of Technology, Delhi Lecture No. # 01 An Introduction to CAD Today we are basically going to introduce
More informationSmall Business Guide to CCTV. Getting the most out of your Surveillance Camera System
Small Business Guide to CCTV Getting the most out of your Surveillance Camera System November 2018 Small Business Guide to CCTV Getting the most out of your Surveillance Camera System This document offers
More information1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi?
Page: 1 of 7 1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi? 2 Stephanie Yes. 3 R1 That was you have
More informationFace Hallucination Based on Eigentransformation Learning
Advanced Science and Technology etters, pp.32-37 http://dx.doi.org/10.14257/astl.2016. Face allucination Based on Eigentransformation earning Guohua Zou School of software, East China University of Technology,
More informationDeep Convolutional Neural Networks. Nov. 20th, 2015 Bruce Draper
Deep Convolutional Neural Networks Nov. 20th, 2015 Bruce Draper Background: Fully-connected single layer neural networks Feed-forward classification Trained through back-propagation Example Computer Vision
More informationStatistical Databases: Query Restriction
Statistical Databases: Query Restriction Nina Mishra January 21, 2004 Introduction A statistical database typically contains information about n individuals where n is very large. A statistical database
More informationNumenta Node Algorithms Guide NuPIC 1.7
1 NuPIC 1.7 includes early implementations of the second generation of the Numenta HTM learning algorithms. These algorithms are available as two node types: SpatialPoolerNode and TemporalPoolerNode. This
More informationSingle link clustering: 11/7: Lecture 18. Clustering Heuristics 1
Graphs and Networks Page /7: Lecture 8. Clustering Heuristics Wednesday, November 8, 26 8:49 AM Today we will talk about clustering and partitioning in graphs, and sometimes in data sets. Partitioning
More informationTracking Computer Vision Spring 2018, Lecture 24
Tracking http://www.cs.cmu.edu/~16385/ 16-385 Computer Vision Spring 2018, Lecture 24 Course announcements Homework 6 has been posted and is due on April 20 th. - Any questions about the homework? - How
More informationStorage Industry Resource Domain Model
Storage Industry Resource Domain Model A Technical Proposal from the SNIA Technical Council Topics Abstract Data Storage Interfaces Storage Resource Domain Data Resource Domain Information Resource Domain
More informationUnderstanding Tracking and StroMotion of Soccer Ball
Understanding Tracking and StroMotion of Soccer Ball Nhat H. Nguyen Master Student 205 Witherspoon Hall Charlotte, NC 28223 704 656 2021 rich.uncc@gmail.com ABSTRACT Soccer requires rapid ball movements.
More informationComputer Vision 5 Segmentation by Clustering
Computer Vision 5 Segmentation by Clustering MAP-I Doctoral Programme Miguel Tavares Coimbra Outline Introduction Applications Simple clustering K-means clustering Graph-theoretic clustering Acknowledgements:
More informationDoes the Brain do Inverse Graphics?
Does the Brain do Inverse Graphics? Geoffrey Hinton, Alex Krizhevsky, Navdeep Jaitly, Tijmen Tieleman & Yichuan Tang Department of Computer Science University of Toronto The representation used by the
More informationTracking. Hao Guan( 管皓 ) School of Computer Science Fudan University
Tracking Hao Guan( 管皓 ) School of Computer Science Fudan University 2014-09-29 Multimedia Video Audio Use your eyes Video Tracking Use your ears Audio Tracking Tracking Video Tracking Definition Given
More informationData-driven Approaches to Simulation (Motion Capture)
1 Data-driven Approaches to Simulation (Motion Capture) Ting-Chun Sun tingchun.sun@usc.edu Preface The lecture slides [1] are made by Jessica Hodgins [2], who is a professor in Computer Science Department
More informationWhy is computer vision difficult?
Why is computer vision difficult? Viewpoint variation Illumination Scale Why is computer vision difficult? Intra-class variation Motion (Source: S. Lazebnik) Background clutter Occlusion Challenges: local
More informationElementary Statistics. Organizing Raw Data
Organizing Raw Data What is a Raw Data? Raw Data (sometimes called source data) is data that has not been processed for meaningful use. What is a Frequency Distribution Table? A Frequency Distribution
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationMultidimensional Data and Modelling
Multidimensional Data and Modelling 1 Problems of multidimensional data structures l multidimensional (md-data or spatial) data and their implementation of operations between objects (spatial data practically
More informationCombining PGMs and Discriminative Models for Upper Body Pose Detection
Combining PGMs and Discriminative Models for Upper Body Pose Detection Gedas Bertasius May 30, 2014 1 Introduction In this project, I utilized probabilistic graphical models together with discriminative
More informationDietrich Paulus Joachim Hornegger. Pattern Recognition of Images and Speech in C++
Dietrich Paulus Joachim Hornegger Pattern Recognition of Images and Speech in C++ To Dorothea, Belinda, and Dominik In the text we use the following names which are protected, trademarks owned by a company
More informationVideo Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin
Final Report Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This report describes a method to align two videos.
More informationCPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017
CPSC 340: Machine Learning and Data Mining Principal Component Analysis Fall 2017 Assignment 3: 2 late days to hand in tonight. Admin Assignment 4: Due Friday of next week. Last Time: MAP Estimation MAP
More informationAUTOMATIC VIDEO INDEXING
AUTOMATIC VIDEO INDEXING Itxaso Bustos Maite Frutos TABLE OF CONTENTS Introduction Methods Key-frame extraction Automatic visual indexing Shot boundary detection Video OCR Index in motion Image processing
More informationExam. Material for Exam. Exam Location. Time. Lecture 24:Resource Bounded Reasoning. Location GSMN 51 Goessmann Lab
Exam Lecture 24:Resource Bounded Reasoning Victor Lesser CMPSCI 683 Fall 2004 Time Friday 12/17 8-10am. Location GSMN 51 Goessmann Lab Open Book Only on Material not covered on Midterm 2 Exam Location
More informationI am sure most readers will agree that designing
Text and illustrations by Vlado Damjanovski CCTV focus I am sure most readers will agree that designing a CCTV system is not a simple task. Not everybody can design a system, and this is why very often
More informationIncluding the Size of Regions in Image Segmentation by Region Based Graph
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 4, April 2015, PP 81-85 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Including the Size of Regions in Image Segmentation
More informationAttentional Based Multiple-Object Tracking
Attentional Based Multiple-Object Tracking Mark Calafut Stanford University mcalafut@stanford.edu Abstract This paper investigates the attentional based tracking framework of Bazzani et al. (2011) and
More informationCSE 158 Lecture 6. Web Mining and Recommender Systems. Community Detection
CSE 158 Lecture 6 Web Mining and Recommender Systems Community Detection Dimensionality reduction Goal: take high-dimensional data, and describe it compactly using a small number of dimensions Assumption:
More informationCS1114 Section: SIFT April 3, 2013
CS1114 Section: SIFT April 3, 2013 Object recognition has three basic parts: feature extraction, feature matching, and fitting a transformation. In this lab, you ll learn about SIFT feature extraction
More informationWe will only ask you for information which is absolutely necessary for us to help you and that which you have consented to providing,
Privacy Policy Here at frank. we understand that your information is valuable to you and the trust you place in us to look after it is not something we take for granted. The policy outlined below outlines
More informationSiri, Is it really secure?
Bouncing News To You What Do YOU think? Got Suggestions or questions? Email: ronnie.hiscockjournalist@gma il.com Or join us on Google+ The Boomerang Website: victorianewspaper.weebly.com Contents Page
More informationCountermeasure for the Protection of Face Recognition Systems Against Mask Attacks
Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationPrivacy Policy. LAST UPDATED: 23 June March 2017
Privacy Policy LAST UPDATED: 23 June 20156 March 2017 VERSION 3.0 2.0 Comment [A1]: The Privacy Policy has been updated because we now use Google Analytics, to help improve our services and our communications
More informationProject Updates Short lecture Volumetric Modeling +2 papers
Volumetric Modeling Schedule (tentative) Feb 20 Feb 27 Mar 5 Introduction Lecture: Geometry, Camera Model, Calibration Lecture: Features, Tracking/Matching Mar 12 Mar 19 Mar 26 Apr 2 Apr 9 Apr 16 Apr 23
More informationObject Recognition with Invariant Features
Object Recognition with Invariant Features Definition: Identify objects or scenes and determine their pose and model parameters Applications Industrial automation and inspection Mobile robots, toys, user
More informationDatabase Management System Fall Introduction to Information and Communication Technologies CSD 102
Database Management System Fall 2016 Introduction to Information and Communication Technologies CSD 102 Outline What a database is, the individuals who use them, and how databases evolved Important database
More informationHere are some of the more basic curves that we ll need to know how to do as well as limits on the parameter if they are required.
1 of 10 23/07/2016 05:15 Paul's Online Math Notes Calculus III (Notes) / Line Integrals / Line Integrals - Part I Problems] [Notes] [Practice Problems] [Assignment Calculus III - Notes Line Integrals Part
More informationCryptography Worksheet
Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private
More information