Augmented Privacy with Virtual Humans

Visual privacy is a sensitive subject because it literally deals with human private parts. It presents a bold challenge to the field of Computer Science. The goal of this study is to build a virtual human model for designing and evaluating visual privacy technologies before a security system is built. Given the available databases of anthropological models from CAESAR, 3D scanners and the physical parameters of human imaging systems, we simulate the scanning imagery data with the High Frequency Structure Simulator (HFSS). The proportion and template matching algorithms have been developed to find the human surface features from 3D scanning data. The concealed object detection algorithms are developed according to the wave intensity and surface characteristics. Then the privacy-aware rendering methods are evaluated by usability studies. This forward-thinking approach intends to transform the development of visual privacy technologies from device-specific and proprietary to device-independent and open source. It also advances privacy research from an ad-hoc problem-solving process to a systematic design process, enabling multi-disciplinary innovations in digital human modeling, computer vision, information visualization, and computational aesthetics. The results of this study can be used in the privacy-aware imaging systems in airports and medical systems. They can also benefit the custom-fit products that are designed from personal 3D scanning data. Furthermore, our results can be used in the reconstruction of objects in digital archeology and medical imaging technologies such as virtual colonoscopy.

[1]  Jean-Philippe Martin-Flatin,et al.  Self-Managed Networks, Systems, and Services , 2006, Lecture Notes in Computer Science.

[2]  Jean Ponce,et al.  Describing surfaces , 1985, Comput. Vis. Graph. Image Process..

[3]  Yang Cai,et al.  A Privacy Algorithm for 3D Human Body Scans , 2006, International Conference on Computational Science.

[4]  David A. Forsyth,et al.  Identifying nude pictures , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[5]  R. Nevatia,et al.  3-D Surface Description Using Curvature Properties , 1987, Photonics West - Lasers and Applications in Science and Engineering.

[6]  Thomas E. Hall,et al.  Millimeter-wave high-resolution holographic surveillance system , 1994, Other Conferences.

[7]  C. Calladine Gaussian curvature and shell structures , 1984 .

[8]  Peter R. M. Jones,et al.  Three-dimensional surface anthropometry: Applications to the human body , 1997 .

[9]  Yang Cai,et al.  Feature Hiding in 3D Human Body Scans* , 2006, Inf. Vis..

[10]  M. Soumekh Fourier Array Imaging , 1994 .

[11]  Gaile G. Gordon,et al.  Face recognition based on depth and curvature features , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[12]  Andrew W. Moore,et al.  Rapid detection of significant spatial clusters , 2004, KDD.

[13]  David A. Forsyth,et al.  Automatic Detection of Human Nudes , 1999, International Journal of Computer Vision.

[14]  Choonsik Park,et al.  Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.

[15]  Roberto Cipolla,et al.  Computer Vision — ECCV '96 , 1996, Lecture Notes in Computer Science.

[16]  Fabio A. González,et al.  An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[17]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[18]  David M. Sheen,et al.  Privacy algorithm for cylindrical holographic weapons surveillance system , 2000 .

[19]  Xinhua Zhuang,et al.  Image Analysis Using Mathematical Morphology , 1987, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Thomas E. Hall,et al.  Wideband millimeter-wave holographic weapons surveillance systems , 1995, Other Conferences.

[21]  J. Goodman Introduction to Fourier optics , 1969 .

[22]  Xiang Liu,et al.  3D characterization and localization of anatomical landmarks of the foot , 2004, VRCAI '04.

[23]  Stephen Gilmore,et al.  Combining Measurement and Stochastic Modelling to Enhance Scheduling Decisions for a Parallel Mean Value Analysis Algorithm , 2006, International Conference on Computational Science.

[24]  D. Souvaine,et al.  An intuitive approach to measuring protein surface curvature , 2005, Proteins.

[25]  Juhnyoung Lee,et al.  Data Engineering Issues in E-Commerce and Services, Second International Workshop, DEECS 2006, San Francisco, CA, USA, June 26, 2006, Proceedings , 2006, DEECS.

[26]  Hein A.M. Daanen,et al.  Automatic feature detection in 3D human body scans , 2004 .

[27]  M. Shyu,et al.  A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .

[28]  Andrew W. Moore,et al.  Anomalous Spatial Cluster Detection , 2005 .

[29]  Thomas S. Huang,et al.  MAXIMAL MATCHING OF TWO THREE-DIMENSIONAL POINT SETS. , 1986 .

[30]  Mehrdad Soumekh Bistatic synthetic aperture radar inversion with application in dynamic object imaging , 1991, IEEE Trans. Signal Process..

[31]  J. A. Gregory The Mathematics of Surfaces. , 1987 .

[32]  Yang Cai,et al.  Visual transformation for interactive spatiotemporal data mining , 2007, Knowledge and Information Systems.

[33]  David A. Forsyth,et al.  Body plans , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[34]  Simin Nadjm-Tehrani,et al.  ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.

[35]  Thomas E. Hall,et al.  Weapon detection using a wideband millimeter-wave linear array imaging technique , 1994, Other Conferences.

[36]  Mohammad Zulkernine,et al.  Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.

[37]  David A. Forsyth,et al.  Probabilistic Methods for Finding People , 2001, International Journal of Computer Vision.

[38]  Dmitry B. Goldgof,et al.  Feature extraction and terrain matching , 1988, Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition.

[39]  Stan Salvador,et al.  FastDTW: Toward Accurate Dynamic Time Warping in Linear Time and Space , 2004 .

[40]  Dmitry B. Goldgof,et al.  A Curvature-Based Approach to Terrain Recognition , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[41]  H. D. Collins,et al.  Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system , 1996, Defense, Security, and Sensing.

[42]  David M. Sheen,et al.  Circular scanned millimeter-wave imaging system for weapon detection , 1995, Other Conferences.

[43]  James J. Thomas,et al.  Visualizing the non-visual: spatial analysis and interaction with information from text documents , 1995, Proceedings of Visualization 1995 Conference.

[44]  Ramesh C. Jain,et al.  Three-dimensional object recognition , 1985, CSUR.

[45]  Peter Ratner 3-d human modelling and animation , 1997 .

[46]  David A. Forsyth,et al.  Finding Naked People , 1996, ECCV.

[47]  AZRIEL ROSENFELD,et al.  Digital Straight Line Segments , 1974, IEEE Transactions on Computers.