Minor Privacy Protection Through Real-time Video Processing at the Edge

The collection of a lot of personal information about individuals, including the minor members of a family, by closed-circuit television (CCTV) cameras creates a lot of privacy concerns. Particularly, revealing children’s identifications or activities may compromise their well-being. In this paper, we investigate lightweight solutions that are affordable to edge surveillance systems, which is made feasible and accurate to identify minors such that appropriate privacy-preserving measures can be applied accordingly. State of the art deep learning architectures are modified and re-purposed in a cascaded fashion to maximize the accuracy of our model. A pipeline extracts faces from the input frames and classifies each one to be of an adult or a child. Over 20,000 labeled sample points are used for classification. We explore the timing and resources needed for such a model to be used in the Edge-Fog architecture at the edge of the network, where we can achieve near real-time performance on the CPU. Quantitative experimental results show the superiority of our proposed model with an accuracy of 92.1% in classification compared to some other face recognition based child detection approaches.

[1]  Frank Rattay,et al.  Comparison of Random Subspace and Voting Ensemble Machine Learning Methods for Face Recognition , 2018, Symmetry.

[2]  Daniel González-Jiménez,et al.  Face recognition for authentication on mobile devices , 2016, Image Vis. Comput..

[3]  Yu Chen,et al.  I-ViSE: Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries , 2020, IEEE Internet of Things Journal.

[4]  Emmeline Taylor,et al.  I Spy with My Little Eye: The Use of CCTV in Schools and the Impact on Privacy , 2010 .

[5]  A. Cavallaro Privacy in Video Surveillance , 2007 .

[6]  Kin-Man Lam,et al.  Age-invariant face recognition based on identity inference from appearance age , 2018, Pattern Recognit..

[7]  Nicolas Pinto,et al.  Beyond simple features: A large-scale feature search approach to unconstrained face recognition , 2011, Face and Gesture 2011.

[8]  M. Berson,et al.  Children and Their Digital Dossiers: Lessons in Privacy Rights in the Digital Age. , 2006 .

[9]  Lujo Bauer,et al.  Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.

[10]  Mithun Haridas T. P.,et al.  Face Recognition based Surveillance System Using FaceNet and MTCNN on Jetson TX2 , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[11]  Jakob Svensson,et al.  Promoting Social Change and Democracy through Information Technology , 2015 .

[12]  Erik Blasch,et al.  Decentralized smart surveillance through microservices platform , 2019, Defense + Commercial Sensing.

[13]  Andrea Cavallaro,et al.  Privacy in Video Surveillance [In the Spotlight] , 2007 .

[14]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[15]  Yu Chen,et al.  Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).

[16]  Tal Hassner,et al.  Age and gender classification using convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[17]  Stephenson Waters,et al.  The Effects of Mass Surveillance on Journalists’ Relations With Confidential Sources , 2018 .

[18]  Ronghua Xu,et al.  Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).

[19]  Atta Badii,et al.  A rule-based methodology and assessment for context-aware privacy , 2014, 2014 IEEE 6th International Conference on Awareness Science and Technology (iCAST).

[20]  Gholamreza Anbarjafari,et al.  Facial image super resolution using sparse representation for improving face recognition in surveillance monitoring , 2016, 2016 24th Signal Processing and Communication Application Conference (SIU).

[21]  Haibin Ling,et al.  A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream , 2016, Journal of Signal Processing Systems.

[22]  Rama Chellappa,et al.  Face-based Active Authentication on mobile devices , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Frederic Dufaux,et al.  Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.

[24]  Mahadev Satyanarayanan,et al.  OpenFace: A general-purpose face recognition library with mobile applications , 2016 .

[25]  Anthony D. Miyazaki,et al.  Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness , 2008 .

[26]  Yu Qiao,et al.  Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.

[27]  Ronghua Xu,et al.  Real-Time Human Objects Tracking for Smart Surveillance at the Edge , 2018, 2018 IEEE International Conference on Communications (ICC).

[28]  Ji-Xiang Du,et al.  Face Aging Simulation Based on NMF Algorithm with Sparseness Constraints , 2011, ICIC.

[29]  Ronghua Xu,et al.  A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology , 2018, 2018 IEEE International Smart Cities Conference (ISC2).

[30]  Benjamin Shmueli,et al.  Privacy for Children , 2011 .

[31]  Anil K. Jain,et al.  How Does Aging Affect Facial Components? , 2012, ECCV Workshops.

[32]  Mousumi Gupta,et al.  A Survey on: Facial Emotion Recognition Invariant to Pose, Illumination and Age , 2019, 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP).

[33]  David Lyon,et al.  Surveillance, Power and Everyday Life , 2009 .

[34]  Ning Zhou,et al.  An agent-administrator-based security mechanism for distributed sensors and drones for smart grid monitoring , 2019, Defense + Commercial Sensing.

[35]  Erik Blasch,et al.  Enabling Smart Urban Surveillance at The Edge , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).

[36]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[37]  Yu Chen,et al.  Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge , 2020, EAI Endorsed Trans. Security Safety.

[38]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[39]  Qing Wang,et al.  Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..

[40]  Sencun Zhu,et al.  No Peeking through My Windows: Conserving Privacy in Personal Drones , 2019, 2019 IEEE International Smart Cities Conference (ISC2).