Predlozak za PhD studentecostic1206.uvigo.es/sites/default/files/Meetings/ZagrebMCM/Consea… ·...

Post on 02-Aug-2020

0 views 0 download

Transcript of Predlozak za PhD studentecostic1206.uvigo.es/sites/default/files/Meetings/ZagrebMCM/Consea… ·...

CONCEALING TATTOOS

Darijan Marčetić darijan.marcetic@fer.hr

Faculty of EE and Computing

PRESENTATION TOPICS

1. Introduction

2. Tattoo identification

3. Tattoo de-identification

4. Conclusion

Literature

1. INTRODUCTION

Laws in democratic countries protect privacy

Technology development resulted with governmental and

corporate invasion of privacy

Massive installation of surveillance equipment at public places

Sensible personal information stored at corporate servers

Private information can be easily misused

Many corporate services like Google maps or Facebook are illegal

because private information is not protected according to the law

Development of „Next Generation Identification” (NGI)

The aim of COST Action IC1206 is to develop de-identification

methods for privacy protection in multimedia content as is

required by the law and EU directives

1. INTRODUCTION Biggest companies with certificate for NGI

ACABIO, Inc.

ARH, Inc.

Advanced Livescan

Tecnologies, Inc.

Antheus, Inc.

Automation Designs &

Solutions, Inc.

Aware, Inc.

BI2 Technologies, LLC

BioEnable Technologies

Pvt Ltd

Biometrics4All, Inc.

Biometrika srl

BSI2000, Inc.

Cogent Systems, Inc.

Comnetix Computer

systems, Inc.

Computer Deductions, Inc.

Corvus Integration, Inc.

Cross Match Tehnologies,

Inc.

DataWorks Plus, LLC

DBA Systems, Inc.

Dermalog Identification

Systems, Gmbh

Digital Biometrics, Inc.

DigitalPersonas, Inc.

Exegenetics, Inc.

FieldPrint, Inc.

FingerMatrix, Inc.

Fulcrum Biometrics, Inc.

Futronic Technology

Company, Ltd

Green Bit S.p.A.

Griaule Biometrics

Heimann Biometrics

Systems

Hongda Opto-Electron Co, I

Hunter Systems Group

Hyndai Information

Technology Company

I/O Software, Inc.

IAFIS Program Office

IBIOS Private Ltd.

IBIS Corporation

ID Networks

Identicator

Identification International

Identix, Inc.

idSoftware, Inc.

IISL, Ltd.

ImageWare Systems, Inc.

Imaging Technologies, Inc.

Improvision Research

Corporation

Integrated Biometric

Technology (IBT), Inc.

Integrated Biometric

Solutions (P) Ltd. (IBIOS)

Integrated Biometric, LLC

ITALDATA Ing. dell'Idea

ITouch Biometrics, LLC

Jobin

L-1 Identity Solutions

Lockheed Martin

Information Systems

Lumidigm, Inc.

M2SYS,LLC

Mantra Softech (India) Pvt

MaxID Corp

MaxVision, LLC

Mentalix, Inc

Mobizent, LLC

MORPHO, Inc.

Motorola, Inc.

National Background

Check, Inc.

NEC Solutions (America)

NEC Technologies, Inc.

Nitrogen Co. Ltd.

North American Morpho

North Grumman Corp.

P.P.H.U. STANIMEX s.c.

Papilon Biometrics

Papilon Systems Ltd.

PRC, Inc.

PrideRock Holding

Company, Inc.

Printrak International, Inc.

Sagem Defense Securite

Sagem SA

Sagem Securite

SecuGen Corp.

Secure Outcomes Inc.

Shriraj Software Solutions

(S3INDIA)

Smartmatic Internationa

Corporation

Smiths Heimann

Biometrics Gmbh

Sonda, Inc.

Spex Forensics, Inc.

Starttek Engineering, Inc.

Suprema, Inc.

Titan Systems Corporation

Tutis Technologies, Ltd.

Ultra-Scan Corporation

Union Community Co., Ltd.

UPEK, Inc.

Vertical Screen, Inc.

Visionics Corporation

Wiseassist Knowledge

Solutions Pvt. Ltd.

WYSE Biometrics Systems

Pvt Ltd.

Zerco Systems

International, Inc.

Zeum, Inc.

1. INTRODUCTION

The main focus of this presentation is on tattoo de-identification

Tattoos have been used for more than 5000 years as a way to express

personal belief and as a confirmation of membership into some groups

14 % of all people in the USA, 32 % of people of age 25-29 and 38% of age

30-39 have at least one tattoo

Systems for removing scars, marks and tattoos (SMT) do not exist at the

present time in the scientific literature

Google service Maps does blur faces but tattoos are not removed from other

body regions (neck, chest, arms, legs), and therefore privacy is violated

1. INTRODUCTION

Tattoos are indexed based on their position on the body by National Crime

Information Centre (NCIC) into 31 main categories (hand, head, …) i 71

subcategories (forehead, right index finger, …)

ANSI/NIST-ITL.1-2011 standard classifies tattoos into 8 classes and 70

subclasses

2. TATTOO IDENTIFICATION

Systems for tattoo identification:

Tattoo-ID, A.K. Jain at al. 2012. Michigan State University i

MorphoTrak

FASTID – D. Manger 2012., Fraunhofer Institute for Optotronics,

System Technologies and Image Explotation IOSB

B. Heflin, W. Scheirer, T.E. Boult, 2012. Securics Inc i University

of Colorado Springs

S. T. Acton, A. Rossi 2008., Platinum Solutions, Univerity of

Virginia

2. TATTOO IDENTIFICATION

Tattoo-ID, A.K. Jain at al. Michigan State University i MorphoTrak

Tatto localization is manuall

Scale Invariant Feature Transform (SIFT) features are used, Lowe 2004.

Identification is performed by matching SIFT features

FASTID – D. Manger, Fraunhofer Institute for Optotronics, System

Technologies and Image Explotation IOSB

FAST and efficient international disaster victim IDentification (FASTID) Project

http://www.interpol.int/Projects/FASTID (FP7/2007-2013)

Tattoos are described with bag of words model

Words are coded with SIFT features

2. TATTOO IDENTIFICATION

Too large number of SIFT features

Picture in the example has 1551

2. TATTOO IDENTIFICATION

2. TATTOO IDENTIFICATION

SIFT features are located only on parts of tattoos

12

2. TATTOO IDENTIFICATION

SIFT features are not very reliable in real world conditions

No correspondence in the example with just few pixels slightly changed in the query image

Manual identification has superior quality compared to an automatic identification

3. TATTOO DE-IDENTIFICATION

Proposed system for tattoo de-identification:

Real time performance is critical for acceptability of the system

ROI from the video stream is estimated based on movement, skin

colour and texture analysis

Resolution pyramid can be used to enhance performance

The gaol is to conceal both location and appearance of a tattoo

Automatic or manual identification should not be possible based

on de-identified tattoo images

Tattoo de-identification problems:

Automatic unsupervised localization

Finding tattoos and separation from skin

Methods for tattoo canceling

Feature selection

Real time performance, hardware implementation

Quality and naturalness estimation

Distinguishing tattoos from clothes, jewelry, …

3. TATTOO DE-IDENTIFICATION

Commercial application of tattoo de-identification:

Google streets blurs faces and license plates but identities of persons are

not protected because tattoos are not removed

Surveillance hardware should support de-identification in order to be in

compliance with the law

Information about tattoo location and appearance must be removed

Retrieving tattoo appetence from de-identified tattoos must be supported

in emergency situations related with criminal activity

3. TATTOO DE-IDENTIFICATION

4. CONCLUSION

Tattoo de-identification and privacy protection:

Tattoos can be used for person identification

Privacy protection must include concealing tattoos

No system for tattoo de-identification is recorded in

scientific literature

It is necessary to enhance existing methods and develop

new ones for de-identifying tattoos in complex scenes in

real time

LITERATURE

Tattoo identification:

A. K. Jain, J.-E. Lee and R. Jin,“Tattoo-ID: Automatic Tattoo Image Retrieval for Suspect & Victim

Identification”, Proc. of Pacific-Rim Conference on Multimedia (PCM), pp. 256-265, Hong Kong, December

2007.

J-E. Lee, A. K. Jain and R. Jin,“Scars, Marks and Tattoos (SMT): Soft Biometric for Suspect and Victim

Identification”, in Proc. Biometric Symposium, BCC, September, 2008.

A. K. Jain, J.-E. Lee, R. Jin, and N. Gregg,“Content Based Image Retrieval: An Application to Tattoo Images”,

IEEE ICIP, Nov., 2009.

A. K. Jain, R. Jin, and J.-E. Lee, ”Tattoo Image Matching and Retrieval”, IEEE Computer, Vol. 45, No. 5, pp.

93-96, May, 2012.

Heflin, B., Scheirer, W., & Boult, T. E. (2012). Detecting and classifying scars, marks, and tattoos found in the

wild. Paper presented at the 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and

Systems, BTAS 2012, 31-38.

Acton, S.T. & Rossi, A. 2008, "Matching and retrieval of tattoo images: Active contour CBIR and glocal image

features", Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 21.

D. Manger, 2012., Large-Scale Tattoo Image Retrieval, 2012 Ninth Conference on Computer and Robot Vision,

pp. 454-459.