Carnegie Mellon University

Data Privacy Center

Data Privacy Course


Project Track 4: Automated Video Surveillance




Objective

The objective of projects in this track is to build on the CameraWatch and Bio-terrorism surveillance projects of Professor Sweeney and Ralph Gross. The idea of CameraWatch is not so much to realize that there are a large number of on-line webcams observing people in public spaces. (Though there are, as demonstrated by the full version of CameraWatch, not the on-line extract.) Instead, the vision of the CameraWatch project concerns reducing privacy concerns associated with these cameras by eventually replacing them with "smart cameras," where a smart camera does not display all it sees, but instead interprets images and sends alerts (and/or images) based on what was found. If smart cameras can be constructed and deployed, rather than their counterparts, potential privacy concerns would be reduced.

One example use is bio-terrorism surveillance. Many biological agents of grave concern are not immediately noticeable in people once infected. Instead, persons live with the agent and the site remains contaminated, infecting others. Many in public health have constructed "early detection systems" in which people are observed through the data they leave behind (prescriptions, physician visits, hospital admissions, school absenteeism, etc.) in order to determine if an unusual number of people are acting ill. Thereby alarming public health early. Read the Proposal to Use Publicly Available Cameras for Automated Bio-terrorism Surveillance.

Projects in this track will record images from publicly available webcams that display images of sidewalks or roadways, and report the volume of pedestrians or vehicles appearing each hour of day (or night, as appropriate). Doing so, you will build a conceptual version of a smart camera and report whether the results are sensitive enough for bio-terrorism surveillance.

Raw Materials

Car Counter Programs
In Lab 5, you captured images from 2 camera URLs and then reported the number of cars appearing in the images at night. Projects in this track may build on your prior work.


CameraWatch
The CameraWatch database provided by Professor Sweeney on-line provides a sample of URLs of publicly available webcams observing public spaces. You may have used this database in Lab 5.


Image Processing Software
An image processing program written in Java is available for manipulating images. This program is provided by the National Institutes of Health and is called Biomedical Imaging In Java. This program includes many basic routines for image manipulation in an interactive, menu-driven application. A version of this program (Zipp'ed for Mac and Unix) is available here (8MB) and an automated installation executable for Windows is available here (8 MB).


Face Detection Algorithm
Ralph Gross has provided on-line access to Henry Schneiderman's face detection program. Given a daylight image of pedestrians, for example, the face detection algorithm attempts to identify each human face appearing in the image and reports a total count. Below is a sample image from a publicly available webcam.

click for enlarged view

To use this program, you FTP your captured image into a private space. When you check back within a minute, a text file containing the results will appear in the directory. You can repeat this process as needed. Ralph Gross can provide you with username/password information for this service if you are interested in working on a project in this track; or, send a message to paddataprivacylab.org.

Project Ideas

The exact nature of your project is up to you with some guidance from the course TAs and Professor Sweeney. If you are interested in working in this track, then you will need to complete at least one of the activities below as your "first assignment." Then, you can complete a second activity below (or propose and complete another related activity of your own design), so that together they comprise your final project in the course.

Final report

Write a summary report of your findings. Include all graphs, tables, spreadsheets and findings reported as part of your project presentation. Submit your final report by email to paddataprivacylab.org. Additionally, FTP any supporing documents you have as spreadsheets or tab-delimited files, into your personal space on dataprivacylab.org.

Graduate credit

If you are taking this course for graduate credit, you must complete at least three of the activities above (not 2). Rather than writing a project report, you will write a conference-style paper on your work.


Fal 2004 Privacy and Anonymity in Data
Professor: Latanya Sweeney, Ph.D. [latanya@dataprivacylab.org]