<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>MediaEval 2015 Drone Protect Task: Privacy Protection in Surveillance Systems Using False Coloring</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serdar Çiftçi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavel Korshunov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ahmet Og˘ uz Akyüz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Touradj Ebrahimi</string-name>
          <email>touradj.ebrahimi@ep</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>. Department of Computer Engineering, Middle East Technical University</institution>
          ,
          <addr-line>Ankara</addr-line>
          ,
          <country country="TR">Turkey</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>. Multimedia Signal Processing Group, Ecole Polytechnique Fedéralé de Lausanne</institution>
          ,
          <country country="CH">Switzerland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>14</fpage>
      <lpage>15</lpage>
      <abstract>
        <p>This paper describes privacy protection method based on a false coloring approach for Drone Protect Task of MediaEval 2015. The aim is to obscure regions of a video that are privacy sensitive without sacri cing intelligibility and pleasantness. False coloring transforms the original colors of pixels using a color palette into a di erent set of colors in which private information is harder to recognize. The method can be applied globally to an entire frame of the video or to a speci c region of interest (ROI). The privacy protected output is expected to remain pleasant, and when needed, a close approximation of the original input can be recovered. Benchmarking evaluations on the mini-drone dataset show promising results, especially, for intelligibility and pleasantness criteria.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        Video surveillance systems are being widely used to
protect the safety of public and private perimeters. An ideal
surveillance system should balance well between two
objectives: e ciently execute a security task (intelligibility ) and
carefully preserve subjects' privacy (privacy). The most
commonly used methods to protect privacy such as
blurring, masking, and pixelization do not achieve a good
balance. For this reason, second generation solutions such as
scrambling [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], warping [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and in-painting [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] are proposed.
However, these solutions have their own weaknesses such as
dependency on compression and format, visually disturbing
results, negative impact on intelligibility, and irreversibility.
      </p>
      <p>Furthermore, most methods strongly rely on e cient
computer vision algorithms for instance when regions that
require privacy protection must be automatically detected (e.g.,
faces, license plates, etc.). However, computer vision
algorithms are known to fail at times. If a sensitive region is
missed, even in a single frame, it will severely compromise
privacy. Therefore, there is a need to develop robust and
effective algorithms for privacy protection that can e ciently
cope with situations when computer vision algorithms fail.</p>
      <p>We propose to protect privacy via false coloring, which
does not rely on computer vision and can be applied either
on an entire frame or a region of interest. It is simple to
Currently with Idiap research institute (Switzerland)
2.</p>
    </sec>
    <sec id="sec-2">
      <title>FALSE COLOR BASED PRIVACY PRO</title>
    </sec>
    <sec id="sec-3">
      <title>TECTION</title>
      <p>
        The main idea in false color based privacy protection is in
transforming colors of pixels in a frame such that the
private information becomes unrecognizable while the impact
on intelligibility is kept as small as possible. Previous work
on false coloring has demonstrated the applicability of such
an approach for privacy protection against both human
observers and automatic face recognition algorithms [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>This algorithm rst converts a color frame into grayscale.
The pixel intensities of the grayscaled frame are then used as
keys to a look-up a table that represents a color palette.
Optionally, the grayscale frame can be compressed or quantized
to further distort the visual information prior to table
lookup. The pixel values of the original frame are then replaced
by the values from the table. This algorithm can be applied
on an entire frame or on one or more ROIs. The strength of
the protection is controlled by the color distribution of the
selected color palette (Figure 1).</p>
      <p>The protected frames can be reversed to obtain a close
approximation of the originals by performing an inverse table
look-up. However, due to the initial grayscale conversion,
the recovered frames will be in grayscale. Also, if the
lookup table contains duplicate values, full recovery may not be
possible due to the initial many-to-one mapping. Finally,
the reversion is only possible if one knows the properties of
the color map used during protection. Thus, security can be
enhanced by utilizing a custom color palette.</p>
    </sec>
    <sec id="sec-4">
      <title>EVALUATION RESULTS</title>
      <p>
        We applied false coloring to the annotated ROIs of the
provided mini-drone dataset [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] using the following color
maps: Radiance default (DEF) for high, rainbow color scale
(RBS) for medium, and linearized optimal color scale (LOCS)
for low privacy regions. This selection was motivated by the
e ectiveness of each color map for privacy protection as
determined by earlier work [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>A sample result is shown in Figure 2, where (a) represents
an original video frame, (c) its privacy protected version, and
(e) its recovered version. The close-up views can be observed
in the bottom row. It can be noted in (c) and (d) that the
face of the individual is represented in the DEF color scale,
whereas his body is represented in the RBS color scale. The
vehicle, on the other hand, is represented in the LOCS color
scale based on expert annotations.</p>
      <p>The recovered ROIs shown in (e) and (f) do not
contain color information and have some artifacts near the ROI
boundaries. This is due to the compression of the protected
frames. As the compression works at block rather than pixel
level, the false colored pixels a ect the colors of the
neighboring pixels and are not corrected during the inverse look-up.</p>
      <p>The MediaEval benchmarking results reported in Table 1
show that our intelligibility and pleasantness scores are above
the average of all submissions whereas the privacy level score
is below the average. This can be explained by the fact that
false coloring is a point operation and, unlike most other
methods, it does not introduce structural distortions.
Nevertheless, privacy level could be improved by using custom
color palettes that are better tailored to privacy protection.</p>
      <p>Intelligibility
FC AVG
0.76 0.59
0.75 0.58
0.755 0.59</p>
      <p>Pleasantness
FC AVG
0.73 0.60
0.75 0.61
0.74 0.60
4.</p>
    </sec>
    <sec id="sec-5">
      <title>CONCLUSION</title>
      <p>In this paper, we described a simple and e ective method
for protecting privacy using false coloring. Benchmarking
evaluations indicated high preference for the pleasantness
and intelligibility of this method, whereas it was found to
be less e ective for preserving privacy. Future work will
investigate designing custom color scales to improve privacy
protection and the quality of reversibility while enhancing
security.
5.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGEMENTS</title>
      <p>The work was conducted in the framework of FP7 NoE
VideoSense and TUBITAK project number 114E445.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Badii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Korshunov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Oudi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Piatrik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Eiselein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ruchaud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fedorczak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-L.</given-names>
            <surname>Dugelay</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Vazquez</surname>
          </string-name>
          .
          <article-title>Overview of the MediaEval 2015 drone protect task</article-title>
          .
          <source>In MediaEval 2015 Workshop</source>
          , Wurzen, Germany, Sept.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bonetto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Korshunov</surname>
          </string-name>
          , G. Ramponi, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          .
          <article-title>Privacy in Mini-drone Based Video Surveillance</article-title>
          . In Workshop on De-
          <article-title>identi cation for privacy protection in multimedia</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.-C.</given-names>
            <surname>Cheung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Venkatesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Paruchuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          .
          <article-title>Protecting and managing privacy information in video surveillance systems</article-title>
          .
          <source>In Protecting Privacy in Video Surveillance</source>
          , pages
          <volume>11</volume>
          {
          <fpage>33</fpage>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ciftci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Korshunov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Akyu</surname>
          </string-name>
          <article-title>z, and</article-title>
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          .
          <article-title>Using false colors to protect visual privacy of sensitive content</article-title>
          .
          <source>In SPIE Human Vision and Electronic Imaging XX, pages 93941L{93941L{13</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Dufaux</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          .
          <article-title>Scrambling for Privacy Protection in Video Surveillance Systems</article-title>
          .
          <source>IEEE Trans. on Circuits and Systems for Video Technology</source>
          , vol.
          <volume>18</volume>
          (no. 8):
          <volume>1168</volume>
          {
          <fpage>1174</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Korshunov</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          .
          <article-title>Using Warping for Privacy Protection in Video Surveillance</article-title>
          .
          <source>In 18th International Conference on Digital Signal Processing (DSP)</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>