Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video privacy data fuzzification method running on edge device

A technology for private data and edge devices, applied in the field of computer vision, which can solve the problems of privacy leakage, low efficiency, and low segmentation accuracy.

Pending Publication Date: 2021-06-08
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The scope of application of monitoring and other camera equipment is more and more extensive, such as the monitoring equipment of the community, or the kitchen environment is disclosed through the camera, or the video needs to be collected through the camera and uploaded to the Internet; at the same time, people are paying more and more attention to privacy protection. Although the disclosure of surveillance can help people supervise the kitchen sanitation environment, it also leads to the disclosure of chefs' privacy; posting videos on the Internet is an efficient way of dissemination, and at the same time, the efficient dissemination and searchability of network data are also important. It is easier to cause privacy leakage of others in the video
[0003] The existing processing methods are mainly late-stage desensitization processing, and post-stage desensitization requires manpower processing, and post-processing is not suitable for online monitoring equipment, and most of the processing methods are frame-by-frame processing, with low efficiency
[0004] In computer vision technology, segmentation technology can quickly obtain the mask of all people in the video. Segmentation technology can be divided into semantic segmentation technology and instance segmentation technology; but the difference between semantic segmentation and instance segmentation is that semantic segmentation refers to pixel-level Classification, classifying each pixel in the image, taking people as an example, that is, judging whether each pixel is a part of a person; instance segmentation is a further distinction based on semantic segmentation, not only distinguishing between people and backgrounds, but also distinguishing People and people; therefore, semantic segmentation can achieve fast segmentation, but it is not flexible enough, and when the target object accounts for a small proportion of the image, its segmentation accuracy is low, and the instance segmentation technology is more flexible, but its calculation load is also larger. More processing is required to run on low-computing devices; at the same time, instance-level processing can be easily added to target tracking technology
[0005] Convolutional neural networks can achieve high-precision instance segmentation, but instance segmentation has a huge amount of computation, and most of them can only be run on the server side, and it is difficult to directly deploy to mobile devices; and with the rapid development of society, the The number is also growing explosively; it is difficult to rely on the server alone to handle large-scale instance segmentation algorithms. At the same time, there is a risk of privacy leakage in the process of uploading video data by using the server. Therefore, an edge device is required. The method of edge computing is used to process these data in real time. Edge computing refers to the side close to the source of objects or data, and its applications run on edge devices to generate faster service responses and meet real-time business requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video privacy data fuzzification method running on edge device
  • Video privacy data fuzzification method running on edge device
  • Video privacy data fuzzification method running on edge device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] see figure 1 , figure 2 , image 3 and Figure 4 , the present invention provides a technical solution: a method for blurring video privacy data running on an edge device, including algorithm model building and model operation, the method is as follows:

[0034] Step 1: Model initialization, including building the model according to the configuration file, optimizing and accelerating the trained model, and initializing the tracker; model initializat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for fuzzifying video privacy data running on edge equipment. The method comprises the steps of algorithm model design, algorithm model building, model optimization, model quantification and acceleration, and model migration to mobile terminal equipment for running. The privacy automatic fuzzy system has the beneficial effects that the privacy automatic fuzzy system which is low in computing resource requirement, high in computing speed, capable of running on the mobile terminal and independent of other server resources is provided, and the privacy of other people in the public video is protected; a multi-target tracking algorithm is adopted to track an object, so that a fuzzy object can be specified or a motion track of a specified target can be recorded; the algorithm model is quantized, optimized and accelerated by using TensorRT, the deployment difficulty is reduced, and meanwhile, when the algorithm runs, three threads are adopted for processing the three parts of preprocessing, model reasoning and post-processing respectively, so that the running efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of computer vision, and in particular relates to a method for blurring video privacy data running on an edge device. Background technique [0002] The scope of application of monitoring and other camera equipment is more and more extensive, such as the monitoring equipment of the community, or the kitchen environment is disclosed through the camera, or the video needs to be collected through the camera and uploaded to the Internet; at the same time, people are paying more and more attention to privacy protection. Although the disclosure of surveillance can help people supervise the kitchen sanitation environment, it also leads to the disclosure of chefs' privacy; posting videos on the Internet is an efficient way of dissemination, and at the same time, the efficient dissemination and searchability of network data are also important. It is easier to cause privacy leakage of others in the video. [0003] The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T3/00G06T7/277G06T7/246G06T7/215G06K9/34
CPCG06T7/277G06T7/246G06T7/215G06T2207/10016G06T2207/20081G06T2207/20084G06T2207/20076G06T2207/30232G06T2207/30241G06V10/267G06V2201/07G06T3/04
Inventor 张泽华李向阳高焕丽罗家祥
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products