{"title":"Achieving $\\epsilon$-Object Indistinguishability in Surveillance Videos Through Trajectory Randomization","authors":"Medhavi Srivastava;Debanjan Sadhya","doi":"10.1109/TII.2024.3495789","DOIUrl":null,"url":null,"abstract":"Data has become an integral part of our digital lives. Specifically, there is an explosive growth in the application of video data. Video information is quite different from other data formats in the sense that it possesses unique characteristics such as high dimensions, complex content, and multiple forms of representation. All these properties make the protection of privacy in videos a complex and challenging task. Simple obscuration techniques cannot address the conclusions or deductions extrapolated from the background information of the entities in the video. In this work, we explore a video sanitization technique that generates synthetic videos following the perturbation of the objects of interest. In our model, we combine the naive detect and obscure technique with randomization in the presence of the objects of interest in each frame and their trajectories. Essentially, our holistic model fulfills the privacy notion of <inline-formula><tex-math>$\\epsilon$</tex-math></inline-formula>-object indistinguishability. The generated videos achieve our aim of preserving privacy while being accurate enough for utility analysis. We tested our system on the MOT16 videos dataset and observed a reasonable count of 20% lost objects, mean square error ranging in <inline-formula><tex-math>$[0.2-0.3]$</tex-math></inline-formula>, and trajectories deviation between <inline-formula><tex-math>$[0.2-0.6]$</tex-math></inline-formula>.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 2","pages":"1970-1979"},"PeriodicalIF":9.9000,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10767868/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Data has become an integral part of our digital lives. Specifically, there is an explosive growth in the application of video data. Video information is quite different from other data formats in the sense that it possesses unique characteristics such as high dimensions, complex content, and multiple forms of representation. All these properties make the protection of privacy in videos a complex and challenging task. Simple obscuration techniques cannot address the conclusions or deductions extrapolated from the background information of the entities in the video. In this work, we explore a video sanitization technique that generates synthetic videos following the perturbation of the objects of interest. In our model, we combine the naive detect and obscure technique with randomization in the presence of the objects of interest in each frame and their trajectories. Essentially, our holistic model fulfills the privacy notion of $\epsilon$-object indistinguishability. The generated videos achieve our aim of preserving privacy while being accurate enough for utility analysis. We tested our system on the MOT16 videos dataset and observed a reasonable count of 20% lost objects, mean square error ranging in $[0.2-0.3]$, and trajectories deviation between $[0.2-0.6]$.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.