CONCEALING TATTOOS. Darijan Marčetić. Faculty of EE and Computing.

Similar documents
An Experimental Tattoo De-identification System for Privacy Protection in Still Images

Large-Scale Tattoo Image Retrieval

To appear IEEE Multimedia. Image Retrieval in Forensics: Application to Tattoo Image Database

SURF and MU-SURF descriptor comparison with application in soft-biometric tattoo matching applications

Pre-print of article that will appear at BTAS 2012.!!!

Tattoo Detection Based on CNN and Remarks on the NIST Database

Unsupervised Ensemble Ranking: Application to Large-Scale Image Retrieval

Deep Learning Architectures for Tattoo Detection and De-identification

A Multimedia Application for Location-Based Semantic Retrieval of Tattoos

Tattoo Image Search at Scale: Joint Detection and Compact Representation Learning

Analysis for Iris and Periocular Recognition in Unconstraint Biometrics

Biometric Recognition Challenges in Forensics

Application for Tattoo / Body Piercing Establishment License Please print legibly in ink or type application.

Color Swatch Add-on User Guide

Springer Series in Fashion Business

Superwallet User Manual

Representative results (with slides extracted from presentations given at conferences and talks)

PLEASE NOTE: ADDITIONAL DOCUMENTATION ON PAGE 2 MUST BE SUBMITTED WITH THIS APPLICATION. Name Business is Conducted Under (DBA):

found identity rule out corroborate

CAD System for Japanese Kimono

Page 6. [MD] Microdynamics PAS Committee, Measurement Specification Document, Women s Edition and Mens Edition, Microdynamics Inc., Dallas, TX, 1992.

Tips for proposers. Cécile Huet, PhD Deputy Head of Unit A1 Robotics & AI European Commission. Robotics Brokerage event 5 Dec Cécile Huet 1

Management Information Systems

IC Chapter 19. Precious Metal Dealers

Clare Video Doorbell Version 2 User Manual

2013/2/12 HEADACHED QUESTIONS FOR FEMALE. Hi, Magic Closet, Tell me what to wear MAGIC CLOSET: CLOTHING SUGGESTION

COMMUNICATION ON ENGAGEMENT DANISH FASHION INSTITUTE

EXHIBITOR APPLICATION

FIJIT. Frankston International Junior Investigation Team. Agent s Handbook

A Survey on Identification and Analysis of Body Marks

OPEN CALL. WoSoF - WORLD SYMPOSIUM FOR FASHION. JEWELLERY. ACCESSORIES. Deadline : 10th November TONGJI University D&I, SHANGHAI 16th/DEC/2018.

Wallet Technology. Information Presentation

Hazard Communication Subpart Z 29 CFR Adopted from OSHA Office of Training and Education HAZARD COMMUNICATION/hazcom/1-95

VTCT Level 3 NVQ Award in Airbrush Make-Up

TRAINING LAB HAIR AS EVIDENCE: PART 1 HUMAN HAIR NAME

Requests Rezoning (B-1 Neighborhood Business to B-2 Community) Conditional Use Permit (Tattoo Parlor) Staff Planner Carolyn A.K.

Agenda is subject to change. ECV International reserves the right to alter this agenda.

EXHIBITOR APPLICATION

YOUNG TALENTS Curated by

WARNING THIS SET CONTAINS CHEMICALS THAT MAY BE HARMFUL

Research on the Milestones Takt Time of the General-Assembly Shipbuilding

TrichoScan Smart Version 1.0

Overview. Label Gallery SDK User Guide

INVESTIGATION OF CONNECTIONS BETWEEN SILHOUETTES AND COLORS IN FASHION DESIGN

Activity 27 WHOSE HAIR IS IT?

Identifying Useful Features for Recognition in Near-Infrared Periocular Images

EFI s 2017 European Investor Trip

OBIS Scientific Remote

Tattoo Recognition Technology - Evaluation (Tatt-E) Performance of Tattoo Identification Algorithms

Adafruit APDS9960 breakout

Sash Open Area Module (SOAM)

Industry perspective on transatlantic corporation. Weibel Success Story. Weibel Proprietary US success story

Record Value: O - Operational F - Fiscal L - Legal H - Historical V - Vital O F L H V

Response to the Police Offences Amendment Bill 2013 Tattooing, Body Piercing & Body Modification of Youth

As Engrossed: S2/1/01. By: Representatives Bledsoe, Borhauer, Bond, Rodgers, Green. For An Act To Be Entitled

YOOX Group is the global Internet retailing partner for leading fashion & design brands. It has established itself amongst the market leaders

2 December 9, 2015 Public Hearing

Cosmetic Products New EU Regulation Published

Braid Hairstyle Recognition based on CNNs

midterm124 January 24, 2014

Implementation of GHS Amendment to OSHA HCS American Bakers Association Safety Committee Meeting May 8, 2012

Disposable Cartridge NOSE Piercing System

A Bill Regular Session, 2007 SENATE BILL 276

4 July 8, 2015 Public Hearing

CAD Requirements and Solutions for 3D-printed Electronics

Remote Skincare Advice System Using Life Logs

1 of 5 11/3/14 2:03 PM

Osha Manual 2017 READ ONLINE

STATE OF MICHIGAN COURT OF APPEALS

Identification Tools and Technologies for Pigs

Global Beauty Institute 7536 N State Road 7 Parkland, FL

EDITORIAL CALENDAR Covering society, philanthropy and lifestyles in Arizona since 1982.

edited by Frank TPiller RWTH Aachen University, Germany Mitchell M Tseng The Hong Kong University of Science & Technology, Hong Kong World Scientific

Healthy Buildings 2017 Europe July 2-5, 2017, Lublin, Poland

Rewrite your success October 2018 Chennai Trade Centre. with our legacy in South India s jewellery business. CHENNAI

Unit 3 Hair as Evidence

Impact of mass media on fashion adoption of adolescent girls

SMART WALLET A Wallet which follows you

COMMONWEALTH OF MASSACHUSETTS

96 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011

Standardization of guidelines for patient photograph deidentification

Fraud and Embezzlement

CHAPTER Committee Substitute for House Bill No. 729

THE BUSINESS YOU WANT. THE SUCCESS YOU DESERVE.

Instruction Manual New Factory Styles 2011

E-BOOK SALON APPRENTICE ONLINE MANUAL EBOOK

LICENSE REQUIRED FOR TATTOO ESTABLISHMENT AND/OR BODY PIERCING ESTABLISHMENT.

For- Credit Courses and Certificate Programs in Apparel Merchandising & Management for Industry Professionals

Example-Based Hairstyle Advisor

Scientific Sessions: Biology. Location: Edison Room South Moderator: Bethany Stone, Johnson County Crime Laboratory. Thursday- September 20, 2018

The Development of an Augmented Virtuality for Interactive Face Makeup System

FASHION MERCHANDISING B (405)

The Design, Fashion & Luxury Group at McCarter

Global market review of denim and jeanswear forecasts to edition (revised and updated)

FITS Florence International Trend School

DEMONSTRATING THE APPLICABILITY OF DESI IMAGING COUPLED WITH ION MOBILITY FOR MAPPING COSMETIC INGREDIENTS ON TAPE STRIPPED SKIN SAMPLES

Intravenous Access and Injections Through Tattoos: Safety and Guidelines

Home Security Begins at the Front Door

4 May 12, 2010 Public Hearing APPLICANT: DML DESIGN, LLC T/A GODSPEED TATTOO

Transcription:

CONCEALING TATTOOS Darijan Marčetić darijan.marcetic@fer.hr Faculty of EE and Computing

PRESENTATION TOPICS 1. Introduction 2. Tattoo identification 3. Tattoo de-identification 4. Conclusion Literature

1. INTRODUCTION Laws in democratic countries protect privacy Technology development resulted with governmental and corporate invasion of privacy Massive installation of surveillance equipment at public places Sensible personal information stored at corporate servers Private information can be easily misused Many corporate services like Google maps or Facebook are illegal because private information is not protected according to the law Development of Next Generation Identification (NGI) The aim of COST Action IC1206 is to develop de-identification methods for privacy protection in multimedia content as is required by the law and EU directives

1. INTRODUCTION Biggest companies with certificate for NGI ACABIO, Inc. ARH, Inc. Advanced Livescan Tecnologies, Inc. Antheus, Inc. Automation Designs & Solutions, Inc. Aware, Inc. BI2 Technologies, LLC BioEnable Technologies Pvt Ltd Biometrics4All, Inc. Biometrika srl BSI2000, Inc. Cogent Systems, Inc. Comnetix Computer systems, Inc. Computer Deductions, Inc. Corvus Integration, Inc. Cross Match Tehnologies, Inc. DataWorks Plus, LLC DBA Systems, Inc. Dermalog Identification Systems, Gmbh Digital Biometrics, Inc. DigitalPersonas, Inc. Exegenetics, Inc. FieldPrint, Inc. FingerMatrix, Inc. Fulcrum Biometrics, Inc. Futronic Technology Company, Ltd Green Bit S.p.A. Griaule Biometrics Heimann Biometrics Systems Hongda Opto-Electron Co, I Hunter Systems Group Hyndai Information Technology Company I/O Software, Inc. IAFIS Program Office IBIOS Private Ltd. IBIS Corporation ID Networks Identicator Identification International Identix, Inc. idsoftware, Inc. IISL, Ltd. ImageWare Systems, Inc. Imaging Technologies, Inc. Improvision Research Corporation Integrated Biometric Technology (IBT), Inc. Integrated Biometric Solutions (P) Ltd. (IBIOS) Integrated Biometric, LLC ITALDATA Ing. dell'idea ITouch Biometrics, LLC Jobin L-1 Identity Solutions Lockheed Martin Information Systems Lumidigm, Inc. M2SYS,LLC Mantra Softech (India) Pvt MaxID Corp MaxVision, LLC Mentalix, Inc Mobizent, LLC MORPHO, Inc. Motorola, Inc. National Background Check, Inc. NEC Solutions (America) NEC Technologies, Inc. Nitrogen Co. Ltd. North American Morpho North Grumman Corp. P.P.H.U. STANIMEX s.c. Papilon Biometrics Papilon Systems Ltd. PRC, Inc. PrideRock Holding Company, Inc. Printrak International, Inc. Sagem Defense Securite Sagem SA Sagem Securite SecuGen Corp. Secure Outcomes Inc. Shriraj Software Solutions (S3INDIA) Smartmatic Internationa Corporation Smiths Heimann Biometrics Gmbh Sonda, Inc. Spex Forensics, Inc. Starttek Engineering, Inc. Suprema, Inc. Titan Systems Corporation Tutis Technologies, Ltd. Ultra-Scan Corporation Union Community Co., Ltd. UPEK, Inc. Vertical Screen, Inc. Visionics Corporation Wiseassist Knowledge Solutions Pvt. Ltd. WYSE Biometrics Systems Pvt Ltd. Zerco Systems International, Inc. Zeum, Inc.

1. INTRODUCTION The main focus of this presentation is on tattoo de-identification Tattoos have been used for more than 5000 years as a way to express personal belief and as a confirmation of membership into some groups 14 % of all people in the USA, 32 % of people of age 25-29 and 38% of age 30-39 have at least one tattoo Systems for removing scars, marks and tattoos (SMT) do not exist at the present time in the scientific literature Google service Maps does blur faces but tattoos are not removed from other body regions (neck, chest, arms, legs), and therefore privacy is violated

1. INTRODUCTION Tattoos are indexed based on their position on the body by National Crime Information Centre (NCIC) into 31 main categories (hand, head, ) i 71 subcategories (forehead, right index finger, ) ANSI/NIST-ITL.1-2011 standard classifies tattoos into 8 classes and 70 subclasses

2. TATTOO IDENTIFICATION Systems for tattoo identification: Tattoo-ID, A.K. Jain at al. 2012. Michigan State University i MorphoTrak FASTID D. Manger 2012., Fraunhofer Institute for Optotronics, System Technologies and Image Explotation IOSB B. Heflin, W. Scheirer, T.E. Boult, 2012. Securics Inc i University of Colorado Springs S. T. Acton, A. Rossi 2008., Platinum Solutions, Univerity of Virginia

2. TATTOO IDENTIFICATION Tattoo-ID, A.K. Jain at al. Michigan State University i MorphoTrak Tatto localization is manuall Scale Invariant Feature Transform (SIFT) features are used, Lowe 2004. Identification is performed by matching SIFT features

2. TATTOO IDENTIFICATION FASTID D. Manger, Fraunhofer Institute for Optotronics, System Technologies and Image Explotation IOSB FAST and efficient international disaster victim IDentification (FASTID) Project http://www.interpol.int/projects/fastid (FP7/2007-2013) Tattoos are described with bag of words model Words are coded with SIFT features

2. TATTOO IDENTIFICATION Too large number of SIFT features Picture in the example has 1551

2. TATTOO IDENTIFICATION SIFT features are located only on parts of tattoos

2. TATTOO IDENTIFICATION SIFT features are not very reliable in real world conditions No correspondence in the example with just few pixels slightly changed in the query image Manual identification has superior quality compared to an automatic identification 12

3. TATTOO DE-IDENTIFICATION Proposed system for tattoo de-identification: Real time performance is critical for acceptability of the system ROI from the video stream is estimated based on movement, skin colour and texture analysis Resolution pyramid can be used to enhance performance The gaol is to conceal both location and appearance of a tattoo Automatic or manual identification should not be possible based on de-identified tattoo images

3. TATTOO DE-IDENTIFICATION Tattoo de-identification problems: Automatic unsupervised localization Finding tattoos and separation from skin Methods for tattoo canceling Feature selection Real time performance, hardware implementation Quality and naturalness estimation Distinguishing tattoos from clothes, jewelry,

3. TATTOO DE-IDENTIFICATION Commercial application of tattoo de-identification: Google streets blurs faces and license plates but identities of persons are not protected because tattoos are not removed Surveillance hardware should support de-identification in order to be in compliance with the law Information about tattoo location and appearance must be removed Retrieving tattoo appetence from de-identified tattoos must be supported in emergency situations related with criminal activity

4. CONCLUSION Tattoo de-identification and privacy protection: Tattoos can be used for person identification Privacy protection must include concealing tattoos No system for tattoo de-identification is recorded in scientific literature It is necessary to enhance existing methods and develop new ones for de-identifying tattoos in complex scenes in real time

LITERATURE Tattoo identification: A. K. Jain, J.-E. Lee and R. Jin, Tattoo-ID: Automatic Tattoo Image Retrieval for Suspect & Victim Identification, Proc. of Pacific-Rim Conference on Multimedia (PCM), pp. 256-265, Hong Kong, December 2007. J-E. Lee, A. K. Jain and R. Jin, Scars, Marks and Tattoos (SMT): Soft Biometric for Suspect and Victim Identification, in Proc. Biometric Symposium, BCC, September, 2008. A. K. Jain, J.-E. Lee, R. Jin, and N. Gregg, Content Based Image Retrieval: An Application to Tattoo Images, IEEE ICIP, Nov., 2009. A. K. Jain, R. Jin, and J.-E. Lee, Tattoo Image Matching and Retrieval, IEEE Computer, Vol. 45, No. 5, pp. 93-96, May, 2012. Heflin, B., Scheirer, W., & Boult, T. E. (2012). Detecting and classifying scars, marks, and tattoos found in the wild. Paper presented at the 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012, 31-38. Acton, S.T. & Rossi, A. 2008, "Matching and retrieval of tattoo images: Active contour CBIR and glocal image features", Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation, pp. 21. D. Manger, 2012., Large-Scale Tattoo Image Retrieval, 2012 Ninth Conference on Computer and Robot Vision, pp. 454-459.