Since the processing of mobile mapping images is
being done off-line, and time and resource manage-
ment was not the focus of this research, we do not
need to concern about running the detector on every
image location, which is computationally quite ex-
pensive. One could argue that running the out-of-the-
box object detector multi-scale on every image po-
sition is actually a waste of resources and computing
time. As future work we suggest to integrate our post-
processing steps inside the actual pedestrian detec-
tion algorithm, enormously reducing the processing
time needed for a single mobile mapping image. This
might open up the possibility to do the processing
on-line, while capturing the actual data. This would
be better for industrial partners, since privacy issues
would be solved completely, due to the privacy sensi-
tive data not being physically stored anymore.
Our application focuses on detecting pedestrians
walking on the modeled ground plane, which raises a
new problem. People standing on a balcony, sitting
on a bench, lying on the grass or driving a bike, will
not fit into this ground plane assumption and will thus
simply be filtered out by our approach. We could im-
prove our approach by using multiple detection mod-
els, for these different pedestrian classes and then ap-
ply separate post-filtering rules for each detector.
One could not disagree that even with the current
bottlenecks, that this work is valuable for people han-
dling privacy sensitive mobile mapping data. This re-
search allows users to automatically remove privacy
sensitive data from their captured datasets, without
the need of manually handling each image (which
would be very costly and time consuming). It allows
users to grab off-the-shelve available pedestrian de-
tectors, add them to the system, and use a limited
manual input in their application field to derive the
post-processing rules. This highly benefits the com-
panies because they do not need to put huge amounts
of time and resources into building an application-
specific pedestrian detector themselves, needing thou-
sands of pedestrians to be manually annotated.
ACKNOWLEDGEMENTS
This work is supported by the Institute for the Pro-
motion of Innovation through Science and Technol-
ogy in Flanders (IWT) via the IWT-TETRA project
TOBCAT and via the IWT-TETRA project RaPiDo.
We would also like to thank Vansteelandt BVBA
and Grontmij Belgium, the companies who provided
the cycloramic image datasets during these projects,
which were used to develop and test this approach.
REFERENCES
Cho, H., Rybski, P. E., Bar-Hillel, A., and Zhang, W.
(2012). Real-time pedestrian detection with de-
formable part models. In IVS, pages 1035–1042.
IEEE.
Dalal, N. and Triggs, B. (2005). Histograms of oriented
gradients for human detection. In CVPR, volume 1,
pages 886–893. IEEE.
De Smedt, F., Struyf, L., Beckers, S., Vennekens, J.,
De Samblanx, G., and Goedem
´
e, T. (2012). Is the
game worth the candle? Evaluation of OpenCL for ob-
ject detection algorithm optimization. PECCS, pages
284–291.
Dibra, E., Maye, J., Diamanti, O., Siegwart, R., and Beard-
sley, P. (2015). Extending the performance of hu-
man classifiers using a viewpoint specific approach.
In WACV, pages 765–772. IEEE.
Doll
´
ar, P., Belongie, S., and Perona, P. (2010). The fastest
pedestrian detector in the west. In BMVC, volume 2,
page 7. Citeseer.
Doll
´
ar, P., Tu, Z., Perona, P., and Belongie, S. (2009). Inte-
gral channel features. In BMVC, volume 2, page 5.
Felzenszwalb, P., McAllester, D., and Ramanan, D. (2008).
A discriminatively trained, multiscale, deformable
part model. In CVPR, pages 1–8. IEEE.
Nakashima, Y., Koyama, T., Yokoya, N., and Babaguchi, N.
(2015). Facial expression preserving privacy protec-
tion using image melding. In ICME, pages 1–6. IEEE.
Panagiotis, I. (2015). Preventing privacy leakage from pho-
tos in social networks. In CCS2015. ACM.
Peng, P., Tian, Y., Wang, Y., Li, J., and Huang, T. (2015).
Robust multiple cameras pedestrian detection with
multi-view bayesian network. Pattern Recognition,
48(5):1760–1772.
Puttemans, S. and Goedem
´
e, T. (2013). How to exploit
scene constraints to improve object categorization al-
gorithms for industrial applications. In VISAPP, vol-
ume 1, pages 827–830.
Tanaka, Y., Kodate, A., Ichifuji, Y., and Sonehara, N.
(2015). Relationship between willingness to share
photos and preferred level of photo blurring for pri-
vacy protection. In ASE BigData & SocialInformatics,
page 33. ACM.
Torralba, A., Efros, A., et al. (2011). Unbiased look at
dataset bias. In CVPR, pages 1521–1528. IEEE.
Van Beeck, K., Goedem
´
e, T., and Tuytelaars, T. (2012). A
warping window approach to real-time vision-based
pedestrian detection in a truck’s blind spot zone. In
ICINCO, volume 2, pages 561–568.
Viola, P. and Jones, M. (2001). Rapid object detection using
a boosted cascade of simple features. In CVPR, pages
I–511.
Safeguarding Privacy by Reliable Automatic Blurring of Faces in Mobile Mapping Images
417