A Privacy Preserving Data Mining Methodology for Dynamically Predicting Emerging Human Threats

被引:0
|
作者
Manohar, Gautam [1 ]
Tucker, Conrad S. [2 ]
机构
[1] Penn State Univ, Ind Engn, University Pk, PA 16802 USA
[2] Penn State Univ, Engn Design & Ind Engn, University Pk, PA 16802 USA
来源
PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2013, VOL 2A | 2014年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a privacy preserving data mining driven methodology for predicting emerging human threats in a public space by capturing large scale, real time body movement data (spatial data represented in X, Y, Z coordinate space) using Red-Green-Blue (RGB) image, infrared depth and skeletal image sensing technology. Unlike traditional passive surveillance systems (e.g., CCTV video surveillance systems), multimodal surveillance technologies have the ability to capture multiple data streams in a real time dynamic manner. However, mathematical models based on machine learning principles are needed to convert the large-scale data into knowledge to serve as a decision support system for autonomously predicting emerging threats, rather than just recording and observing them as they occur. To this end, the authors of this work present a privacy preserving data mining driven methodology that captures emergent behavior of individuals in a public space and classifies them as a threat or not a threat, based on the underlying body movements through space and time. An audience in a public environment is presented as the case study for this paper with the aim of classifying individuals in the audience as threats (or not), based on their temporal body behavior profiles.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 177 - 206
  • [2] Privacy Preserving Data Mining
    Journal of Cryptology, 2002, 15 : 177 - 206
  • [3] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [4] Quantifying privacy for privacy preserving data mining
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
  • [5] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [6] Privacy Preserving Data Mining by Cyptography
    Sharma, Anand
    Ojha, Vibha
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
  • [7] Research on Privacy Preserving Data Mining
    Wang, Pingshui
    Wang, Jiandong
    Zhu, Xinfeng
    Jiang, Jian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
  • [8] A Survey on Privacy Preserving Data Mining
    Wang, Jian
    Luo, Yongcheng
    Zhao, Yan
    Le, Jianjin
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 111 - 114
  • [9] On data distortion for privacy preserving data mining
    Kabir, Saif M. A.
    Youssef, Amr M.
    Elhakeem, Ahmed K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
  • [10] An Overview of Privacy Preserving Data Mining
    Qi, Xinjun
    Zong, Mingkui
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347