1 September 2017 Effective evaluation of privacy protection techniques in visible and thermal imagery
Author Affiliations +
J. of Electronic Imaging, 26(5), 051408 (2017). doi:10.1117/1.JEI.26.5.051408
Privacy protection may be defined as replacing the original content in an image region with a (less intrusive) content having modified target appearance information to make it less recognizable by applying a privacy protection technique. Indeed, the development of privacy protection techniques also needs to be complemented with an established objective evaluation method to facilitate their assessment and comparison. Generally, existing evaluation methods rely on the use of subjective judgments or assume a specific target type in image data and use target detection and recognition accuracies to assess privacy protection. An annotation-free evaluation method that is neither subjective nor assumes a specific target type is proposed. It assesses two key aspects of privacy protection: “protection” and “utility.” Protection is quantified as an appearance similarity, and utility is measured as a structural similarity between original and privacy-protected image regions. We performed an extensive experimentation using six challenging datasets (having 12 video sequences), including a new dataset (having six sequences) that contains visible and thermal imagery. The new dataset is made available online for the community. We demonstrate effectiveness of the proposed method by evaluating six image-based privacy protection techniques and also show comparisons of the proposed method over existing methods.
Tahir Nawaz, Amanda Berg, James Ferryman, Jörgen Ahlberg, Michael Felsberg, "Effective evaluation of privacy protection techniques in visible and thermal imagery," Journal of Electronic Imaging 26(5), 051408 (1 September 2017). http://dx.doi.org/10.1117/1.JEI.26.5.051408
Submission: Received 1 January 2017; Accepted 8 August 2017


Facial recognition systems

Target recognition

Positron emission tomography


Image filtering

Target detection

Back to Top