Privacy preserving optics for miniature vision sensors

The next wave of micro and nano devices will create a world with trillions of small networked cameras. This will lead to increased concerns about privacy and security. Most privacy preserving algorithms for computer vision are applied after image/video data has been captured. We propose to use privacy preserving optics that filter or block sensitive information directly from the incident light-field before sensor measurements are made, adding a new layer of privacy. In addition to balancing the privacy and utility of the captured data, we address trade-offs unique to miniature vision sensors, such as achieving high-quality field-of-view and resolution within the constraints of mass and volume. Our privacy preserving optics enable applications such as depth sensing, full-body motion tracking, people counting, blob detection and privacy preserving face recognition. While we demonstrate applications on macro-scale devices (smartphones, webcams, etc.) our theory has impact for smaller devices.

[1]  Esther Rodriguez-Villegas,et al.  Compressive sensing: From “Compressing while Sampling” to “Compressing and Securing while Sampling” , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[2]  M. Mrityunjay,et al.  The De-Identification Camera , 2011, 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics.

[3]  Richard G. Baraniuk,et al.  A new compressive imaging camera architecture using optical-domain compression , 2006, Electronic Imaging.

[4]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[5]  Wayne H. Wolf,et al.  Smart Cameras as Embedded Systems , 2002, Computer.

[6]  Stan Sclaroff,et al.  Automated camera layout to satisfy task-specific and floor plan-specific coverage requirements , 2006, Comput. Vis. Image Underst..

[7]  LiFeng,et al.  A Coprime Blur Scheme for Data Security in Video Surveillance , 2013 .

[8]  W.B. Heinzelman,et al.  On the coverage problem in video-based wireless sensor networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[9]  Naveen Verma,et al.  Micropower wireless sensors , 2006 .

[10]  HadidAbdenour,et al.  Facial Deblur Inference Using Subspace Analysis for Recognition of Blurred Faces , 2011 .

[11]  Shree K. Nayar,et al.  Lensless Imaging with a Controllable Aperture , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[12]  Sharmeen Browarek High resolution, low cost, privacy preserving human motion tracking system via passive thermal sensing , 2010 .

[13]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[14]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Changhuei Yang,et al.  Physical key-protected one-time pad , 2013, Scientific Reports.

[16]  A. Wilhelm,et al.  Evaluation of a micro fuel cell as applied to a mobile robot , 2005, IEEE International Conference Mechatronics and Automation, 2005.

[17]  Masashi Nishiyama,et al.  Facial deblur inference to improve recognition of blurred faces , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[18]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[19]  Markus Dürmuth,et al.  Achieving Anonymity against Major Face Recognition Algorithms , 2013, Communications and Multimedia Security.

[20]  R.S. Fearing,et al.  Dynamometer Power Output Measurements of Miniature Piezoelectric Actuators , 2009, IEEE/ASME Transactions on Mechatronics.

[21]  Frédo Durand,et al.  Image and depth from a conventional camera with a coded aperture , 2007, SIGGRAPH 2007.

[22]  Kenro Miyamoto,et al.  Fish Eye Lens , 1964 .

[23]  Giuseppe Valenzise,et al.  Privacy-Enabled Object Tracking in Video Sequences Using Compressive Sensing , 2009, 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.

[24]  P. J. Narayanan,et al.  Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[25]  J. Goodman Introduction to Fourier optics , 1969 .

[26]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[27]  Jian Sun,et al.  Face Alignment by Explicit Shape Regression , 2012, International Journal of Computer Vision.

[28]  Naveen Verma,et al.  Design considerations for ultra-low energy wireless microsensor nodes , 2005, IEEE Transactions on Computers.

[29]  Matthew O'Toole,et al.  Primal-dual coding to probe light transport , 2012, ACM Trans. Graph..

[30]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[31]  Shree K. Nayar,et al.  Caustics of catadioptric cameras , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[32]  Ramesh Raskar,et al.  Coded exposure photography: motion deblurring using fluttered shutter , 2006, SIGGRAPH 2006.

[33]  Shree K. Nayar,et al.  Programmable Imaging: Towards a Flexible Camera , 2006, International Journal of Computer Vision.

[34]  Lei Zhang,et al.  Image Deblurring and Super-Resolution by Adaptive Sparse Domain Selection and Adaptive Regularization , 2010, IEEE Transactions on Image Processing.

[35]  Alanson P. Sample,et al.  Design of an RFID-Based Battery-Free Programmable Sensing Platform , 2008, IEEE Transactions on Instrumentation and Measurement.

[36]  Paolo Fiorini,et al.  Human++: autonomous wireless sensors for body area networks , 2005, Proceedings of the IEEE 2005 Custom Integrated Circuits Conference, 2005..

[37]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[38]  Martin J. Wainwright,et al.  Privacy Aware Learning , 2012, JACM.

[39]  Shree K. Nayar,et al.  Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.

[40]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[41]  Takeo Kanade,et al.  Computational sensor for visual tracking with attention , 1998, IEEE J. Solid State Circuits.

[42]  M. Amaç Güvensan,et al.  On coverage issues in directional sensor networks: A survey , 2011, Ad Hoc Networks.

[43]  Harald Dyckhoff,et al.  A typology of cutting and packing problems , 1990 .

[44]  Feng Li,et al.  A Coprime Blur Scheme for Data Security in Video Surveillance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[45]  Marc Levoy,et al.  High performance imaging using large camera arrays , 2005, SIGGRAPH 2005.

[46]  Yuning Jiang,et al.  Learning Deep Face Representation , 2014, ArXiv.

[47]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[48]  Paolo Toth,et al.  Knapsack Problems: Algorithms and Computer Implementations , 1990 .

[49]  Larry A. Wasserman,et al.  Compressed and Privacy-Sensitive Sparse Regression , 2009, IEEE Transactions on Information Theory.

[50]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[51]  Michael Elad,et al.  Fast and robust multiframe super resolution , 2004, IEEE Transactions on Image Processing.

[52]  Richard E. Korf,et al.  Optimal rectangle packing , 2010, Ann. Oper. Res..

[53]  Feng Li,et al.  A theory of Coprime Blurred Pairs , 2011, 2011 International Conference on Computer Vision.

[54]  Bernhard Rinner,et al.  TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[55]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[56]  Ankur Chattopadhyay,et al.  PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[57]  Ralph Gross,et al.  Semi-supervised learning of multi-factor models for face de-identification , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[58]  Geoffrey L. Barrows,et al.  Wide-angle micro sensors for vision on a tight budget , 2011, CVPR 2011.

[59]  Tony Lindeberg,et al.  Scale-Space Theory in Computer Vision , 1993, Lecture Notes in Computer Science.

[60]  Thomas S. Huang,et al.  Close the loop: Joint blind image restoration and recognition with sparse representation prior , 2011, 2011 International Conference on Computer Vision.

[61]  R. Fergus,et al.  Random Lens Imaging , 2006 .

[62]  Richard G. Baraniuk,et al.  An Architecture for Compressive Imaging , 2006, 2006 International Conference on Image Processing.

[63]  Francis T. S. Yu,et al.  Optical Pattern Recognition , 2008 .

[64]  Shree K. Nayar,et al.  Catadioptric Stereo Using Planar Mirrors , 2001, International Journal of Computer Vision.

[65]  Hyunsung Park,et al.  Toward Wide-Angle Microvision Sensors , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[66]  Richard G. Baraniuk,et al.  The smashed filter for compressive classification and target recognition , 2007, Electronic Imaging.

[67]  Andrew Blake,et al.  Motion Deblurring and Super-resolution from an Image Sequence , 1996, ECCV.

[68]  Ren Ng Fourier Slice Photography , 2005 .

[69]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[70]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[71]  Ming-Hsuan Yang,et al.  Deblurring Face Images with Exemplars , 2014, ECCV.

[72]  Grigorios Loukides,et al.  Data utility and privacy protection trade-off in k-anonymisation , 2008, PAIS '08.

[73]  Simon Haykin,et al.  GradientBased Learning Applied to Document Recognition , 2001 .

[74]  Seiichi Serikawa,et al.  Development of privacy-preserving sensor for person detection , 2010 .

[75]  MOHIT GUPTA,et al.  Phasor Imaging , 2015, ACM Trans. Graph..

[76]  Masashi Nishiyama,et al.  Facial Deblur Inference Using Subspace Analysis for Recognition of Blurred Faces , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[77]  Leonidas J. Guibas,et al.  Optimal Placement and Selection of Camera Network Nodes for Target Localization , 2006, DCOSS.