<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">UNIZA@Mediaeval 2014 Visual Privacy Task: Object Transparency Approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Martin</forename><surname>Paralič</surname></persName>
							<email>martin.paralic@fel.uniza.sk</email>
						</author>
						<author>
							<persName><forename type="first">Roman</forename><surname>Jarina</surname></persName>
							<email>roman.jarina@fel.uniza.sk</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Electrical Engineering</orgName>
								<orgName type="institution">University of Žilina</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Department of Telecommunications and Multimedia Univerzitná</orgName>
								<address>
									<postCode>01026</postCode>
									<settlement>Žilina</settlement>
									<country key="SK">Slovakia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Faculty of Electrical Engineering</orgName>
								<orgName type="institution">University of Žilina</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">Department of Telecommunications and Multimedia Univerzitná</orgName>
								<address>
									<postCode>01026</postCode>
									<settlement>Žilina</settlement>
									<country key="SK">Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">UNIZA@Mediaeval 2014 Visual Privacy Task: Object Transparency Approach</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C04FD26E904EC87E45825BAF4A0BE667</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:11+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper describes our approach for the Visual Privacy Task (VPT) of the MediaEval 2014. Video privacy filtering based on privacy-sensitive-object transparency is proposed. The background (hidden behind the object) is estimated by median filtering over time sequence of pixel values. We focus only on the areas labeled as high privacy sensitive (i.e. face). Low and medium privacy areas were rather untouched to keep the most of information about person activities. Despite of simplicity of the proposed method it gives promising performance. The performance is at or slightly above the average among the VPT participants.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>The problem of privacy protection in video surveillance is again concerned in this year's MediaEval Visual Privacy Task (VPT) <ref type="bibr" target="#b2">[2]</ref>. The PEViD dataset <ref type="bibr" target="#b7">[7]</ref> is used for the impact assessment of alternative solutions. Recently, a variety of image processing methods have been developed to protect privacy in multimedia content. A common approach is based on replacing the sensitive information by color boxes or distorting the pixels. More sophisticated methods utilize person silhouettes detection followed by blurring the whole person <ref type="bibr" target="#b1">[1]</ref>. Other methods are based on encrypting sensitive regions where the process is reversible for authorized persons only who know the encryption key <ref type="bibr" target="#b4">[4]</ref>.</p><p>The disadvantage of covering privacy information is the fact that the person's activities detection of which is crucial for surveillance purposes, are often also hidden or altered. The aim of this research activity is development of the visual filtering method that keeps as much information as possible about person's activities in video while keeping the person's privacy intact.</p><p>We propose the filtering that yields to transparency of the privacy sensitive objects. The background (hidden behind the object) estimation is based on computing median over time-sequence of pixel values for each pixel. We have focused only on the areas labeled as high privacy sensitive (i.e. face). Low and medium privacy areas were rather untouched to keep the most of information about person activities. This method is aimed to minimize discomfort of watching filtered</p><p>Copyright is held by the author/owner(s).</p><p>MediaEval 2014 Workshop, October 16-17, 2014,Barcelona, Spain video. Thus we utilized only the face position labels from the provided XML metadata.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">OBJECT SEGMENTATION</head><p>One of the requirements for the privacy filtering is object segmentation. In this task, two kinds of segmentations were at disposal. The first one, automatic segmentation as described in <ref type="bibr" target="#b1">[1]</ref>, was utilized for background estimation. Second one, manual annotation of video stream in the XML form <ref type="bibr" target="#b7">[7]</ref>. We extracted a face bounding box information from the provided XML metadata and used it for filtering. The box was fitted by masking ellipse.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">THE PROPOSED METHOD</head><p>We examined a simple and straightforward method based on the filtering that replaces high privacy sensitive pixel areas by background pixels as depicted in Figure <ref type="figure" target="#fig_0">1</ref>. The key part of the proposed algorithm is proper estimation of the whole background scene, with the aim to uncover the background parts that are of high privacy (e.g. face). However in some scenes, the background can be partially invisible as depicted in Figure <ref type="figure" target="#fig_1">2</ref>. The procedure of the background estimation is as follows. Time sequence of RGB values of each pixel is transformed into a time sequence of grayscale values because of sorting purpose. Then median over each time sequence is computed. In addition , the foreground objects, detected by automatic segmentation <ref type="bibr" target="#b1">[1]</ref>, are obscured by black pixels [R, G, B] = [0, 0, 0]. This step is applied to avoid inclusion of the foreground objects in background pixel estimation. It is obvious that for sufficient background estimation it is crucial that each background pixel has to be visible at least in one video frame. The background image is built from RGB values from the middle of the sorted time sequences of the pixel values.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">THE EVALUATION FRAMEWORK</head><p>The video sequences were evaluated to fulfill the UI-REF privacy protection requirements. Overall results of the crowd evaluation for submitted entries were qualified in terms of the following criteria <ref type="bibr" target="#b3">[3]</ref>, <ref type="bibr">[6]</ref>, <ref type="bibr" target="#b5">[5]</ref>:</p><p>• The Privacy Protection Level -an average level of privacy protection across all clips.</p><p>• Level of Intelligibility -the amount of useful information is retined after filtering.  • The Appropriateness -aesthetic perceptual appeal to human viewers.</p><p>The evaluation scenario is composed the following three streams:</p><p>Stream 1 For the crowdsourcing evaluation, about 290 workers answered several privacy, intelligibility, and pleasantness related questions for 6 pre-selected videos from the test videos submitted by participants.</p><p>Stream 2 A focus group comprising 65 participants (15 females), from Thales, France took part in this evaluation. The majority of the participants were staff from the R&amp;D departments, while the rest were from Management, Security, and other departments.</p><p>Stream 3 A focus group comprising 59 participants (22 females), from sectors including R&amp;D, data protection, law enforcement, from around the world took part in this study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">EVALUATION RESULTS</head><p>The evaluation results of the proposed filter performance were obtained in the 3 streams according to the VPT 2014 evaluation scenario. The reported results of the test among the VPT 2014 participants, which were evaluated in terms of the defined criteria, are presented as median score over ten teams. This median serves as a baseline to compare our obtained results. The performance of the proposed approach compared to median results is depicted in Figure <ref type="figure" target="#fig_2">3</ref>. Despite of simplicity of the proposed method it gives surprisingly promising performance. The obtained score is at, or slightly above the average in terms of all the three criteria.</p><p>The challenging problem is detection and estimation of the partially invisible background as shown in Figure <ref type="figure" target="#fig_1">2</ref>. In </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Filtered persons face replaced by the background.</figDesc><graphic coords="2,74.14,208.67,198.39,111.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Partially invisible background.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Experiment results of 3 streams compared to median among others participants.</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><surname>References</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Mediaeval 2013 visual privacy task: Holistic evaluation framework for privacy by co-design impact assessment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Badii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Obaidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Einig</surname></persName>
		</author>
		<ptr target="CEUR-WS.org" />
	</analytic>
	<monogr>
		<title level="m">MediaEval&apos;2013</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="1" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Overview of the mediaeval 2014 visual privacy task</title>
		<author>
			<persName><forename type="first">A</forename><surname>Badii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ebrahimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Fedorczak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Korshunov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Piatrik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Eiselein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Obaidi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">MediaEval 2014</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Visual context identification for privacy-respecting video analytics</title>
		<author>
			<persName><forename type="first">A</forename><surname>Badii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Einig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tiemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Thiemert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lallah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14th IEEE MMSP International Workshop on Multimedia Signal Processing</title>
				<imprint>
			<date type="published" when="2012-09">September 2012</date>
			<biblScope unit="page" from="366" to="371" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Pico: Privacy through invertible cryptographic obscuration</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">E</forename><surname>Boult</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Vision for Interactive and Intelligent Environments</title>
				<imprint>
			<date type="published" when="2005-11">November 2005</date>
			<biblScope unit="page" from="27" to="38" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Crowd context-dependent privacy protection filters</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fradi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Eiselein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Keller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-L</forename><surname>Dugelay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sikora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">18th International Conference on Digital Signal Processing</title>
				<imprint>
			<date type="published" when="2013-07">July 2013</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Crowdsourcing approach for evaluation of privacy filters in video surveillance</title>
		<author>
			<persName><forename type="first">P</forename><surname>Korshunov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ebrahimi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">18th International Conference on Digital Signal Processing (DSP)</title>
				<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012">2013. 2012</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Pevid: Privacy evaluation video dataset applications of digital image processing xxxvi</title>
		<author>
			<persName><forename type="first">P</forename><surname>Korshunov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ebrahimi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SPIE International Society for Optics and Photonics</title>
				<imprint>
			<date type="published" when="2013-08">August 2013</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
