Visual privacy protection methods: A survey

This work is the first comprehensive review about visual privacy protection.Several categories are established for all of the available privacy protection methods.A review of intelligent monitoring systems that takes privacy into account is provided.An overall vision of the state of the art is given to introduce novel researchers.A critical discussion about relevant key topics and open issues is provided. Recent advances in computer vision technologies have made possible the development of intelligent monitoring systems for video surveillance and ambient-assisted living. By using this technology, these systems are able to automatically interpret visual data from the environment and perform tasks that would have been unthinkable years ago. These achievements represent a radical improvement but they also suppose a new threat to individual's privacy. The new capabilities of such systems give them the ability to collect and index a huge amount of private information about each individual. Next-generation systems have to solve this issue in order to obtain the users' acceptance. Therefore, there is a need for mechanisms or tools to protect and preserve people's privacy. This paper seeks to clarify how privacy can be protected in imagery data, so as a main contribution a comprehensive classification of the protection methods for visual privacy as well as an up-to-date review of them are provided. A survey of the existing privacy-aware intelligent monitoring systems and a valuable discussion of important aspects of visual privacy are also provided.

[1]  Juan Carlos Augusto,et al.  Ambient Intelligence and Smart Environments: A State of the Art , 2010, Handbook of Ambient Intelligence and Smart Environments.

[2]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[3]  Henry A. Kautz,et al.  Privacy-Preserving Recognition of Activities in Daily Living from Multi-view Silhouettes and RFID-based Training , 2008, AAAI Fall Symposium: AI in Eldercare: New Solutions to Old Problems.

[4]  John Stasko,et al.  The Awareness-Privacy Tradeoff in Video Supported Informal Awareness: A Study of Image-Filtering Based Techniques , 1998 .

[5]  Yingli Tian,et al.  Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras , 2012, ICCHP.

[6]  Mourad Ouaret,et al.  Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.

[7]  Jean-Michel Morel,et al.  Level lines based disocclusion , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Rong Yan,et al.  Protecting Personal Identification in Video , 2009, Protecting Privacy in Video Surveillance.

[9]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[10]  Chin-Hsing Chen,et al.  A vision-based regression model to evaluate Parkinsonian gait from monocular image sequences , 2012, Expert Syst. Appl..

[11]  Z. Zivkovic Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.

[12]  Jessica K. Hodgins,et al.  Perception of Human Motion With Different Geometric Models , 1998, IEEE Trans. Vis. Comput. Graph..

[13]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[14]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[15]  Madhusudana V. S. Shashanka,et al.  A Privacy Preserving Framework for Gaussian Mixture Models , 2010, 2010 IEEE International Conference on Data Mining Workshops.

[16]  Norihiro Hagita,et al.  Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[17]  Jovan Popovic,et al.  Automatic rigging and animation of 3D characters , 2007, ACM Trans. Graph..

[18]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[19]  Toshihisa Tanaka,et al.  A new concept of real-time security camera monitoring with privacy protection by masking moving objects , 2006, Electronic Imaging.

[20]  Yin Chen,et al.  Fast capture of personalized avatar using two Kinects , 2014 .

[21]  Jian Zhao,et al.  Protecting and Managing Privacy Information in Video Surveillance Systems , 2009, Protecting Privacy in Video Surveillance.

[22]  Mohan S. Kankanhalli,et al.  W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video , 2012, Multimedia Tools and Applications.

[23]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[24]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[25]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[26]  Yasuyuki Matsushita,et al.  Video Completion by Motion Field Transfer , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[27]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[28]  Touradj Ebrahimi,et al.  PEViD: privacy evaluation video dataset , 2013, Optics & Photonics - Optical Engineering + Applications.

[29]  Tomoji Toriyama,et al.  Factors on the sense of privacy in video surveillance , 2006, CARPE '06.

[30]  Bernhard Rinner,et al.  Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..

[31]  D. L. Donoho,et al.  Compressed sensing , 2006, IEEE Trans. Inf. Theory.

[32]  Habibollah Haron,et al.  Computer Generated Caricature: A Survey , 2010, 2010 International Conference on Cyberworlds.

[33]  Timothy F. Cootes,et al.  Active Appearance Models , 1998, ECCV.

[34]  Chris J. Mitchell,et al.  Improving the Security of CardSpace , 2009, EURASIP J. Inf. Secur..

[35]  Noboru Babaguchi,et al.  Privacy Preserving: Hiding a Face in a Face , 2007, ACCV.

[36]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[37]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[38]  Eli Shechtman,et al.  Space-Time Completion of Video , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[39]  Shanshan Li,et al.  Image scrambling based on chaotic sequences and Veginère cipher , 2013, Multimedia Tools and Applications.

[40]  Kah Phooi Seng,et al.  Privacy preserving stereoscopic vision with One-Bit transform , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[41]  Liu Xiangdong,et al.  Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation , 2008 .

[42]  Yongdong Zhang,et al.  Compressive sensing based video scrambling for privacy protection , 2011, 2011 Visual Communications and Image Processing (VCIP).

[43]  Yong Rui,et al.  Light Weight Background Blurring for Video Conferencing Applications , 2006, 2006 International Conference on Image Processing.

[44]  Honghai Liu,et al.  GMM-QNT hybrid framework for vision-based human motion analysis , 2009, 2009 IEEE International Conference on Fuzzy Systems.

[45]  Michael J. Lyons,et al.  Avatar creation using automatic face processing , 1998, MULTIMEDIA '98.

[46]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[47]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[48]  Sen-Ching S. Cheung,et al.  Joint optimization of data hiding and video compression , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[49]  Wesley De Neve,et al.  Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[50]  Fabien Cardinaux,et al.  Video based technology for ambient assisted living: A review of the literature , 2011, J. Ambient Intell. Smart Environ..

[51]  Håkan Johansson,et al.  An Approach for Synthesis of Modulated-Channel FIR Filter Banks Utilizing the Frequency-Response Masking Technique , 2006, EURASIP J. Adv. Signal Process..

[52]  Tony F. Chan,et al.  Total Variation Wavelet Inpainting , 2006, Journal of Mathematical Imaging and Vision.

[53]  Craig A. Knoblock,et al.  A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..

[54]  Mubarak Shah,et al.  Motion Layer Based Object Removal in Videos , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.

[55]  Carman Neustaedter,et al.  The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.

[56]  Andrew Zisserman,et al.  Get Out of my Picture! Internet-based Inpainting , 2009, BMVC.

[57]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[58]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[59]  Andrew A. Adams,et al.  The future of video analytics for surveillance and its ethical implications , 2015 .

[60]  Mohsen Soryani,et al.  Contour-Based Video Inpainting , 2011, 2011 7th Iranian Conference on Machine Vision and Image Processing.

[61]  Alexei A. Efros,et al.  Image quilting for texture synthesis and transfer , 2001, SIGGRAPH.

[62]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[63]  Faisal Z. Qureshi,et al.  Negotiating Privacy Preferences in Video Surveillance Systems , 2011, IEA/AIE.

[64]  V. Kshirsagar,et al.  Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.

[65]  Bernhard Rinner,et al.  Securing Embedded Smart Cameras with Trusted Computing , 2011, EURASIP J. Wirel. Commun. Netw..

[66]  Sergio A. Velastin,et al.  How close are we to solving the problem of automated visual surveillance? , 2008, Machine Vision and Applications.

[67]  Andrew Hogue,et al.  Automated avatar creation for 3D games , 2007, Future Play.

[68]  K. J. Miller,et al.  Smart-Home Technologies to Assist Older People to Live Well at Home , 2013 .

[69]  Anil C. Kokaram,et al.  Interpolation of missing data in image sequences , 1995, IEEE Trans. Image Process..

[70]  Allen R. Hanson,et al.  Distributed Smart Cameras for Aging in Place , 2006 .

[71]  Yong Man Ro,et al.  Privacy-Preserving Watch List Screening in Video Surveillance System , 2010, PCM.

[72]  Sharath Pankanti,et al.  Privacy Protection and Face Recognition , 2011, Handbook of Face Recognition.

[73]  Alexandros André Chaaraoui,et al.  A review on vision techniques applied to Human Behaviour Analysis for Ambient-Assisted Living , 2012, Expert Syst. Appl..

[74]  Noboru Babaguchi,et al.  Recoverable Privacy Protection for Video Content Distribution , 2009, EURASIP J. Inf. Secur..

[75]  Stuart S. Shapiro,et al.  Privacy by design , 2010, Commun. ACM.

[76]  Adão Silva,et al.  Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..

[77]  Tal Malkin,et al.  Oblivious Image Matching , 2009, Protecting Privacy in Video Surveillance.

[78]  Shin-ichi Hanaki,et al.  Privacy protection by concealing persons in circumstantial video image , 2001, PUI '01.

[79]  Tobias Elbrandt,et al.  Altcare: Safe living for elderly people , 2010, 2010 4th International Conference on Pervasive Computing Technologies for Healthcare.

[80]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[81]  Anu Rachel Abraham,et al.  A Survey on Video Inpainting , 2012 .

[82]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[83]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.

[84]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[85]  Yuan Lin,et al.  Face Swapping under Large Pose Variations: A 3D Model Based Approach , 2012, 2012 IEEE International Conference on Multimedia and Expo.

[86]  Roland Göcke,et al.  Linear Facial Expression Transfer with Active Appearance Models , 2010, 2010 20th International Conference on Pattern Recognition.

[87]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[88]  Khai N. Truong,et al.  Selective Archiving: A Model for Privacy Sensitive Capture and Access Technologies , 2009, Protecting Privacy in Video Surveillance.

[89]  Guillermo Sapiro,et al.  Video Inpainting Under Constrained Camera Motion , 2007, IEEE Transactions on Image Processing.

[90]  Ankur Chattopadhyay,et al.  PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[91]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[92]  Patrick Pérez,et al.  Object removal by exemplar-based inpainting , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[93]  Andrew Nealen,et al.  RigMesh: automatic rigging for part-based shape modeling and deformation , 2012, ACM Trans. Graph..

[94]  Alexandros André Chaaraoui,et al.  An Efficient Approach for Multi-view Human Action Recognition Based on Bag-of-Key-Poses , 2012, HBU.

[95]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[96]  Sarp Ertürk Multiplication-Free One-Bit Transform for Low-Complexity Block-Based Motion Estimation , 2007, IEEE Signal Processing Letters.

[97]  M. Bleyer,et al.  Object Removal by Depth-guided Inpainting ∗ , 2011 .

[98]  Touradj Ebrahimi,et al.  H.264/AVC video scrambling for privacy protection , 2008, 2008 15th IEEE International Conference on Image Processing.

[99]  Xosé Antón Vila-Sobrino,et al.  Eigenspace-based fall detection and activity recognition from motion templates and machine learning , 2012, Expert Syst. Appl..

[100]  Rong Yan,et al.  Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..

[101]  Diane J. Cook,et al.  Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .

[102]  Shai Avidan,et al.  Blind Vision , 2006, ECCV.

[103]  Vicki Bruce,et al.  Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces , 2001 .

[104]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[105]  Marjorie Skubic,et al.  Older adults' privacy considerations for vision based recognition methods of eldercare applications. , 2009, Technology and health care : official journal of the European Society for Engineering and Medicine.

[106]  Frederic Dufaux,et al.  Video scrambling for privacy protection in video surveillance: recent results and validation framework , 2011, Defense + Commercial Sensing.

[107]  Sung Yong Shin,et al.  On pixel-based texture synthesis by non-parametric sampling , 2006, Comput. Graph..

[108]  Jian Zhao,et al.  Efficient Object-Based Video Inpainting , 2006, 2006 International Conference on Image Processing.

[109]  G. Johansson Visual perception of biological motion and a model for its analysis , 1973 .

[110]  Sen-Ching S. Cheung,et al.  Managing privacy data in pervasive camera networks , 2008, 2008 15th IEEE International Conference on Image Processing.

[111]  Serge Gutwirth,et al.  European Data Protection: In Good Health? , 2012, European Data Protection.

[112]  Noboru Babaguchi,et al.  Psychological Study for Designing Privacy Protected Video Surveillance System: PriSurv , 2009, Protecting Privacy in Video Surveillance.

[113]  Bernhard Rinner,et al.  TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[114]  Oliver Grau,et al.  How Not to Be Seen — Object Removal from Videos of Crowded Scenes , 2012, Comput. Graph. Forum.

[115]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[116]  Mohsen Soryani,et al.  Exemplar-based video inpainting with large patches , 2010, Journal of Zhejiang University SCIENCE C.

[117]  Noboru Babaguchi,et al.  PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.

[118]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[119]  Bryan S. Morse,et al.  Isophote-based interpolation , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[120]  P. J. Narayanan,et al.  Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[121]  Wolfgang Straßer,et al.  Smart Camera Based Monitoring System and Its Application to Assisted Living , 2008, Proceedings of the IEEE.

[122]  Shree K. Nayar,et al.  Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.

[123]  Ralph Gross,et al.  Face De-identification , 2009, Protecting Privacy in Video Surveillance.

[124]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[125]  Isabel Martinez-Ponte,et al.  ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .

[126]  Andrea O'Brien,et al.  Survey of Assistive Technology Devices and Applications for Aging in Place , 2009, 2009 Second International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services.

[127]  K. Srinathan,et al.  Fast and Secure Real-Time Video Encryption , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.

[128]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[129]  Deirdre K. Mulligan,et al.  Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[130]  Sen-Ching S. Cheung,et al.  Video Data Hiding for Managing Privacy Information in Surveillance Systems , 2009, EURASIP J. Inf. Secur..

[131]  Touradj Ebrahimi,et al.  A framework for the validation of privacy protection solutions in video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[132]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[133]  Lisa M. Brown,et al.  IBM smart surveillance system (S3): event based video surveillance system with an open and extensible framework , 2008, Machine Vision and Applications.

[134]  F. Petngang,et al.  Security and privacy protection for automated video surveillance , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[135]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[136]  Faisal Z. Qureshi,et al.  Object-Video Streams for Preserving Privacy in Video Surveillance , 2009, 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.

[137]  Mohan Trivedi,et al.  The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.

[138]  Gary J. Sullivan,et al.  HD Photo: a new image coding technology for digital photography , 2007, SPIE Optical Engineering + Applications.

[139]  Prasant Mohapatra,et al.  Securing Multimedia Content Using Joint Compression and Encryption , 2013, IEEE MultiMedia.

[140]  Rong Yan,et al.  People Identification with Limited Labels in Privacy-Protected Video , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[141]  Fanny Coudert,et al.  When video cameras watch and screen: Privacy implications of pattern recognition technologies , 2010, Comput. Law Secur. Rev..

[142]  Wenjuan Ma,et al.  An effective method for removing large object , 2011, 2011 4th International Congress on Image and Signal Processing.

[143]  Touradj Ebrahimi,et al.  UHD video dataset for evaluation of privacy , 2014, 2014 Sixth International Workshop on Quality of Multimedia Experience (QoMEX).

[144]  Michael A. Caloyannides Society cannot function without privacy , 2003, IEEE Security & Privacy Magazine.

[145]  Noboru Babaguchi,et al.  Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.

[146]  James L. Crowley,et al.  CoMedi: using computer vision to support awareness and privacy in mediaspaces , 1999, CHI EA '99.

[147]  Yongdong Zhang,et al.  Prediction restricted H.264/AVC video scrambling for privacy protection , 2010 .

[148]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[149]  Frank Vahid,et al.  Privacy perception and fall detection accuracy for in-home video assistive monitoring with privacy enhancements , 2012, SIGHIT Rec..

[150]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[151]  Shwetak N. Patel,et al.  BlindSpot: Creating Capture-Resistant Spaces , 2009, Protecting Privacy in Video Surveillance.

[152]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[153]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[154]  Lucas Pereira,et al.  Image replacement through texture synthesis , 1997, Proceedings of International Conference on Image Processing.

[155]  Andrew W. Senior,et al.  Privacy Protection in a Video Surveillance System , 2009, Protecting Privacy in Video Surveillance.

[156]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[157]  Marco Zennaro,et al.  Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[158]  Jianping Fan,et al.  A novel approach for privacy-preserving video sharing , 2005, CIKM '05.

[159]  Toshihisa Tanaka,et al.  A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects , 2005, PCM.

[160]  Touradj Ebrahimi,et al.  Subjective study of privacy filters in video surveillance , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).