Using face morphing to protect privacy

The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important properties such as security of protected visual data, reversibility (ability to undo privacy protection), simplicity, and independence from the video encoding used. To overcome these shortcomings, in this paper, we propose a morphing-based privacy protection method and focus on its robustness, reversibility, and security properties. We morph faces from a standard FERET dataset and run face detection and recognition algorithms on the resulted images to demonstrate that morphed faces retain the likeness of a face, while making them unrecognizable, which ensures the protection of privacy. Our experiments also demonstrate the influence of morphing strength on robustness and security. We also show how to determine the right parameters of the method.

[1]  Martin Gründl,et al.  Beautycheck - Ursachen und Folgen von Attraktivität , 2003 .

[2]  Wei Tsang Ooi,et al.  Video quality for face detection, recognition, and tracking , 2011, TOMCCAP.

[3]  Isabel Martinez-Ponte,et al.  ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .

[4]  Touradj Ebrahimi,et al.  Subjective study of privacy filters in video surveillance , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).

[5]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[6]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Nalini Venkatasubramanian,et al.  Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.

[8]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[9]  Touradj Ebrahimi,et al.  Crowdsourcing approach for evaluation of privacy filters in video surveillance , 2012, CrowdMM '12.

[10]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[11]  Chi-Ho Chan Multi-scale local Binary Pattern Histogram for Face Recognition , 2007, ICB.

[12]  Bernhard Rinner,et al.  TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[13]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Philip J. Benson,et al.  Morph transformation of the facial image , 1994, Image Vis. Comput..

[15]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[16]  P. Jonathon Phillips,et al.  Face Recognition Vendor Test 2002 Performance Metrics , 2003, AVBPA.