Secure and private tracking across multiple cameras
First Claim
Patent Images
1. A system comprising:
- one or more processing elements;
an object detection module communicatively coupled to or integrated with the one or more processing elements and configured to detect a first object when the first object is in view of a first video camera associated with a first site having a first privacy boundary that encompasses the first video camera;
a preprocessing module communicatively coupled to or integrated with the one or more processing elements and configured to perform local processing of at least a portion of the first video to form a first secure input;
a circuit generator communicatively coupled to or integrated with the one or more processing elements and configured to generate a function, wherein inputs to the function comprise the first secure input from the first site and a second secure input from a second site having a second privacy boundary that encompasses a second video camera and that does not overlap with the first privacy boundary, wherein the first privacy boundary prevents a user at the first site from obtaining video captured by the second video camera at the second site and the second privacy boundary prevents a user at the second site from obtaining video captured by the first video camera at the first site, the second secure input generated by processing a second object that was in view of the second video camera associated with the second site;
a match query module communicatively coupled to or integrated with the one or more processing elements and configured to send a query to the second site to request participation in solving function; and
a joint computation module communicatively coupled to or integrated with the one or more processing elements and configured to solve the function with the second site to determine if the first object is the same as the second object.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure multi-party computation to compute a distance metric across data from multiple cameras without revealing any information to operators of the cameras except whether or not an object was observed by both cameras. This is achieved by a distance metric learning technique that reduces the computing complexity of secure computation while maintaining object identification accuracy.
-
Citations
19 Claims
-
1. A system comprising:
-
one or more processing elements; an object detection module communicatively coupled to or integrated with the one or more processing elements and configured to detect a first object when the first object is in view of a first video camera associated with a first site having a first privacy boundary that encompasses the first video camera; a preprocessing module communicatively coupled to or integrated with the one or more processing elements and configured to perform local processing of at least a portion of the first video to form a first secure input; a circuit generator communicatively coupled to or integrated with the one or more processing elements and configured to generate a function, wherein inputs to the function comprise the first secure input from the first site and a second secure input from a second site having a second privacy boundary that encompasses a second video camera and that does not overlap with the first privacy boundary, wherein the first privacy boundary prevents a user at the first site from obtaining video captured by the second video camera at the second site and the second privacy boundary prevents a user at the second site from obtaining video captured by the first video camera at the first site, the second secure input generated by processing a second object that was in view of the second video camera associated with the second site; a match query module communicatively coupled to or integrated with the one or more processing elements and configured to send a query to the second site to request participation in solving function; and a joint computation module communicatively coupled to or integrated with the one or more processing elements and configured to solve the function with the second site to determine if the first object is the same as the second object. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
one or more processors; and computer-readable storage including a plurality of programming instructions that are executable by the one or more processors to; obtain an indication of a first object viewed by a first video camera within a first privacy boundary; process at least a portion of the indication of the first object to form a first input; issue a match evaluation request to a peer computing system having a second privacy boundary that encompasses a second video camera and does not overlap with the first privacy boundary, wherein the first privacy boundary prevents a user within the first privacy boundary from obtaining video captured by the second video camera at the within the second privacy boundary, and the second privacy boundary prevents a user within the second privacy boundary from obtaining video captured by the first video camera within the first privacy boundary; jointly compute, by the computing system and the peer computing system, at least a portion of a distance function over the first input and a second input derived by the peer computing system from a second object viewed by the second video camera; and characterize, based at least in part on an output of the distance function, the first object and the second object as the same or different. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for jointly computing a distance metric using secure two-party computing to improve tracking of an object between independent computing systems, each computing comprising a computer-readable memory storing a plurality of machine-readable instructions, and one or more hardware processors coupled to the computer-readable memory and configured to read instructions from the computer-readable memory to perform operations comprising:
-
obtaining, by a first computing system, a first private input; solving, by the first computing system, a local computation portion of a distance function, the local computation portion computed within a first privacy boundary of a first entity that provided the first private input, the distance function comprising a Metric learning by Collapsing Classes (MCC) distance function transformed to a different vector space by a linear projection matrix and having a Euclidean distance function replaced with a histogram intersection function; solving, jointly with a second entity having a second computing system that has also independently solved a same local computation portion of the distance function for a second private input, a joint computation portion of the distance function that takes the first private input and the second private input as inputs, the second entity being within a second privacy boundary that does not overlap with the first privacy boundary, wherein the first privacy boundary prevents a user of the first computing system from obtaining the second private input of the second computing system and the second computing system prevents a user of the second computing system from obtaining the first private input; comparing a computed distance determined by the distance function to a threshold distance; and when the computed distance is smaller than the threshold distance, categorizing the first private input as matching the second private input. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification