Big Wave Shoulder Surfing

Total Page:16

File Type:pdf, Size:1020Kb

Big Wave Shoulder Surfing Big Wave Shoulder Surfing Neil Patil Brian Cui∗ Hovav Shacham [email protected] [email protected] [email protected] University of Texas at Austin University of Texas at Austin University of Texas at Austin ABSTRACT Camera technology continues to improve year over year with ad- vancements in both hardware sensor capabilities and computer vision algorithms. The ever increasing presence of cameras has opened the door to a new class of attacks: the use of computer vi- sion techniques to infer non-digital secrets obscured from view. We prototype one such attack by presenting a system which can recover handwritten digit sequences from recorded video of pen motion. We demonstrate how our prototype, which uses off-the-shelf computer vision algorithms and simple classification strategies, can predict a set of digits that dramatically outperforms guessing, challenging the belief that shielding information in analog form is sufficient to maintain privacy in the presence of camera surveillance. We conclude that addressing these new threats requires a new method of thinking that acknowledges vision-based side-channel attacks Figure 1: An example scenario. Even though the writing is against physical, analog mediums. not visible, the pen’s motion can be observed and the writ- ing reconstructed by a digital camera. Our prototype gener- CCS CONCEPTS alizes this attack to less optimal camera angles, distances, • Security and privacy → Human and societal aspects of se- and image quality. curity and privacy; Security in hardware; • Computing method- ologies → Computer vision. Meanwhile, analog mediums continue to be trusted platforms KEYWORDS for sensitive information. Writing on paper, physical ID cards, and face-to-face meetings are considered more trustworthy and less video camera, computer vision, pen and paper, side-channel attack, accessible to foreign adversaries when compared to digital com- image analysis, mobile devices, motion tracking, handwriting munication. The airgapped nature of analog, “real-life" activities ACM Reference Format: is assumed to avoid many of the risks stemming from the digital Neil Patil, Brian Cui, and Hovav Shacham. 2019. Big Wave Shoulder Surfing. realm. In . ACM, New York, NY, USA, 10 pages. Given ongoing trends regarding the proliferation of cameras, improvements to sensor hardware, and new computer vision tech- 1 INTRODUCTION niques, we argue that the safety of analog data - and in particular, Cameras are widely understood as capturing a limited 2D projec- the process of its creation - is overestimated in today’s environment. tion of a 3D world. However, improvements in camera hardware The increasing availability and effectiveness of cameras, present and image processing are enabling cameras to infer aspects of the in both pockets and on property, mean that common areas where surrounding 3D space. Advancements in motion tracking, object physical data is frequently produced cannot be trusted as confi- recognition, and scene reconstruction from the Computer Vision dential, and core societal processes dependent on analog platforms community, combined with higher megapixel counts and video have not yet adapted to the increasing capabilities of cameras. framerates, are enabling advanced image processing features on While cameras add permanency to what can be seen directly consumer devices such as "Night Sight" (for low light photography) in their field of view, they can also indirectly observe hidden in- and "Portrait Mode" (for simulated depth-of-field). formation in and outside the frame. As a result, the number of ∗The first two authors contributed equally to this work. opportunities for computer-vision based side channel attacks is increasing. Advanced image processing techniques can recover Permission to make digital or hard copies of all or part of this work for personal or visual artifacts from what was previously thought as noise [17]. classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation Even in designated secure environments, such as a bank vault or on the first page. Copyrights for components of this work owned by others than the government embassy, remote recording devices intended for main- author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or taining surveillance and security can be used to breach the analog republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. sphere. As an example, we believe the following attacks will become ,, feasible within the coming years: © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 • An attacker with access to a surveillance camera observes the hand and pen motion of someone writing on a paper ,, Patil, Cui, Shacham form at a bank, inferring what was written without a direct only available in specialized high speed cameras [18]. Minute visual view of the paper. In this paper, we prototype a working details useful for side-channel attacks - like the vibrations of a bag version of this attack. of chips caused by noise [11] - will begin to become more easily • The camera present in an airplane infotainment tablet ob- captured by general purpose consumer-grade camera hardware. serves the laptop vibrations and arm motions of a passen- Furthermore, manufacturers are beginning to exceed single- ger, inferring what he or she is typing. Attacks making use camera configurations in favor of housing multiple cameras in of hardware vibrations from user input have already been their devices for the capture of "3D pictures" and depth perception demonstrated, inferring keypresses from the vibration of a effects. The recently released Nokia 9 PureView features five rear- laptop [16] and touchscreen input from the vibrations of a facing cameras [28], and the next iPhone is expected to house three tablet [38]. [20]. As sensor costs decrease over the coming years, these multi- • An overhead camera records a customer using an ATM and camera setups are predicted to make their its way to lower-end uses the victim’s muscle movements to decipher their PIN, phones and other consumer hardware [23]. even if they have shielded the keypad with their hand. Prior work has already shown that hand motions can be used to 2.2 Improvements in Software infer a user’s smartphone PIN upon entry [36]. Improvements in photo processing have made their way to the We explore the first attack in depth: recovering handwritten consumer market, as innovations in computer vision pave the way text through distant observation of pen motion alone. Such an for intelligent analysis and interpretation of noisy raw camera attack would be effective even if the victim deliberately attempts data [17]. "Night Sight", present in the Google Pixel line of phones, to obscure their writing from view by covering the tip of their pen can capture details in near-total darkness using relatively short or the writing itself. To test the attack, we prototype a system that shutter speeds. "Portrait Mode", available in smartphones from demonstrates promising accuracy, while only making use of a single several manufacturers including the iPhone, uses computer vision fixed camera, off-the-shelf 2D motion tracking, and a relatively techniques to estimate depth from one or more cameras. Google simple classification strategy. Clips, a pocket-sized camera released in 2018, uses machine learning In summary, the contributions of this paper are: to control the shutter and automatically take "interesting" photos • We outline a new class of attacks that allow digital cameras [14]. to steal information through indirect observation of analog Recent advancements in computer vision have also enabled com- input devices and storage mediums. puters to fill in hidden visual content. Scene reconstruction of3D • We demonstrate a prototype of an example attack that allows environments from a set of disjoint 2D images has been studied an attacker to steal hidden written text from camera footage extensively over past years [12]. Adobe’s "content aware fill" fea- of pen motion alone. ture, now present in Adobe After Effects, is capable of seamlessly • We discuss ongoing social trends as well as hardware and inferring and filling in missing sections of an image [7]. These software capabilities that will make this new class of attacks techniques could be applied towards ascertaining aspects about the a serious concern in the future. environment that are not immediately shown in the camera frame. Machine learning has also driven improvements in discerning 2 BACKGROUND patterns from noisy signal data [17]. This has already made possible Side channel attacks leveraging mobile sensors have grown in pop- several side channel attacks against the physical space: mobile ularity over recent years. Attacks using microphones to infer key- keyloggers have been built from smartphone microphones [2] and board input [2] and accelerometers to infer smartphone input [3] gyroscopes [8]. We believe similar techniques can be carried over have been demonstrated to be effective. However, the progress of to analyze camera images and enable new computer vision side these attacks has been slowed due to diminishing returns in hard- channel attacks. ware development and sensor fidelity - in part because of a lack of consumer interest (microphone quality is not usually a distinguish- 2.3 Societal Trends ing hardware feature) and physical constraints (such as the inverse We believe ongoing societal trends will multiply the quantity of square law). cameras and their frequency of use in the coming years, amplifying On the other hand, camera technology continues to improve the plausibility of visual side-channel attacks. year-over-year. Image and video quality improvements open the The norms around disclosure of surveillance are being relaxed. door to new vision based side channels that may have previously The release of Google Glass in 2013 was followed by significant criti- been considered infeasible.
Recommended publications
  • Zencam: Context-Driven Control of Continuous Vision Body Cameras
    UI*OUFSOBUJPOBM$POGFSFODFPO%JTUSJCVUFE$PNQVUJOHJO4FOTPS4ZTUFNT %$044 ZenCam: Context-Driven Control of Continuous Vision Body Cameras Shiwei Fang Ketan Mayer-Patel Shahriar Nirjon UNC Chapel Hill UNC Chapel Hill UNC Chapel Hill [email protected] [email protected] [email protected] Abstract—In this paper, we present — ZenCam, which is an this design suits the purpose in an ideal scenario, in many always-on body camera that exploits readily available information situations, the wearer (e.g., a law-enforcement officer) may in the encoded video stream from the on-chip firmware to not be able to predict the right moment to turn the camera on classify the dynamics of the scene. This scene-context is further combined with simple inertial measurement unit (IMU)-based or may completely forget to do so in the midst of an action. activity level-context of the wearer to optimally control the camera There are some cameras which automatically turns on at an configuration at run-time to keep the device under the desired event (e.g., when a gun is pulled), but they miss the “back- energy budget. We describe the design and implementation of story,” i.e., how the situation had developed. ZenCam and thoroughly evaluate its performance in real-world We advocate that body cameras should be always on so that scenarios. Our evaluation shows a 29.8-35% reduction in energy consumption and 48.1-49.5% reduction in storage usage when they are able to continuously capture the scene for an extended compared to a standard baseline setting of 1920x1080 at 30fps period.
    [Show full text]
  • Devices, the Weak Link in Achieving an Open Internet
    Smartphones, tablets, voice assistants... DEVICES, THE WEAK LINK IN ACHIEVING AN OPEN INTERNET Report on their limitations and proposals for corrective measures French République February 2018 Devices, the weak link in achieving an open internet Content 1 Introduction ..................................................................................................................................... 5 2 End-user devices’ possible or probable evolution .......................................................................... 7 2.1 Different development models for the main internet access devices .................................... 7 2.1.1 Increasingly mobile internet access in France, and in Europe, controlled by two main players 7 2.1.2 In China, mobile internet access from the onset, with a larger selection of smartphones .................................................................................................................................. 12 2.2 Features that could prove decisive in users’ choice of an internet access device ................ 14 2.2.1 Artificial intelligence, an additional level of intelligence in devices .............................. 14 2.2.2 Voice assistance, a feature designed to simplify commands ........................................ 15 2.2.3 Mobile payment: an indispensable feature for smartphones? ..................................... 15 2.2.4 Virtual reality and augmented reality, mere goodies or future must-haves for devices? 17 2.2.5 Advent of thin client devices: giving the cloud a bigger role?
    [Show full text]
  • Electronic 3D Models Catalogue (On July 26, 2019)
    Electronic 3D models Catalogue (on July 26, 2019) Acer 001 Acer Iconia Tab A510 002 Acer Liquid Z5 003 Acer Liquid S2 Red 004 Acer Liquid S2 Black 005 Acer Iconia Tab A3 White 006 Acer Iconia Tab A1-810 White 007 Acer Iconia W4 008 Acer Liquid E3 Black 009 Acer Liquid E3 Silver 010 Acer Iconia B1-720 Iron Gray 011 Acer Iconia B1-720 Red 012 Acer Iconia B1-720 White 013 Acer Liquid Z3 Rock Black 014 Acer Liquid Z3 Classic White 015 Acer Iconia One 7 B1-730 Black 016 Acer Iconia One 7 B1-730 Red 017 Acer Iconia One 7 B1-730 Yellow 018 Acer Iconia One 7 B1-730 Green 019 Acer Iconia One 7 B1-730 Pink 020 Acer Iconia One 7 B1-730 Orange 021 Acer Iconia One 7 B1-730 Purple 022 Acer Iconia One 7 B1-730 White 023 Acer Iconia One 7 B1-730 Blue 024 Acer Iconia One 7 B1-730 Cyan 025 Acer Aspire Switch 10 026 Acer Iconia Tab A1-810 Red 027 Acer Iconia Tab A1-810 Black 028 Acer Iconia A1-830 White 029 Acer Liquid Z4 White 030 Acer Liquid Z4 Black 031 Acer Liquid Z200 Essential White 032 Acer Liquid Z200 Titanium Black 033 Acer Liquid Z200 Fragrant Pink 034 Acer Liquid Z200 Sky Blue 035 Acer Liquid Z200 Sunshine Yellow 036 Acer Liquid Jade Black 037 Acer Liquid Jade Green 038 Acer Liquid Jade White 039 Acer Liquid Z500 Sandy Silver 040 Acer Liquid Z500 Aquamarine Green 041 Acer Liquid Z500 Titanium Black 042 Acer Iconia Tab 7 (A1-713) 043 Acer Iconia Tab 7 (A1-713HD) 044 Acer Liquid E700 Burgundy Red 045 Acer Liquid E700 Titan Black 046 Acer Iconia Tab 8 047 Acer Liquid X1 Graphite Black 048 Acer Liquid X1 Wine Red 049 Acer Iconia Tab 8 W 050 Acer
    [Show full text]
  • Prof. Feng Liu
    Prof. Feng Liu Spring 2021 http://www.cs.pdx.edu/~fliu/courses/cs510/ 03/30/2021 Today Course overview ◼ Admin. Info ◼ Computational Photography 2 People Lecturer: Prof. Feng Liu ◼ Room: email for a Zoom appointment ◼ Office Hours: TR 3:30-4:30pm ◼ [email protected] Grader: Zhan Li ◼ [email protected] 3 Web and Computer Account Course website ◼ http://www.cs.pdx.edu/~fliu/courses/cs510/ ◼ Class mailing list [email protected] [email protected] Everyone needs a Computer Science department computer account ◼ Get account at CAT ◼ http://cat.pdx.edu 4 Recommended Textbooks & Readings Computer Vision: Algorithms and Applications ◼ By R. Szeliski ◼ Available online, free Learning OpenCV 3: Computer Vision in C++ with the OpenCV Library ◼ By Adrian Kaehler and Gary Bradski Or its early version Learning OpenCV: Computer Vision with the OpenCV Library ◼ By Gary Bradski and Adrian Kaehler Papers recommended by the lecturers 5 Grading 30%: Readings 20%: In-class paper presentation 50%: Project ◼ 10%: final project presentation ◼ 40%: project quality 6 Readings About 2 papers every week ◼ Write a brief summary for one of the papers Totally less than 500 words 1. What problem is addressed? 2. How is it solved? 3. The advantages of the presented method? 4. The limitations of the presented method? 5. How to improve this method? Submit to [email protected] by 4:00 pm every Thursday ◼ Write in the plain text format in your email directly ◼ No attached document 7 Paper Presentation One paper one student ◼
    [Show full text]
  • Manovich.Ai Aestheti
    AI Aesthetics Lev Manovich Publication data: Strelka Press, December 21, 2018. ASIN: B07M8ZJMYG Abstract: AI plays a crucial role in the global cultural ecosystem. It recommends what we should see, listen to, read, and buy. It determines how many people will see our shared content. It helps us make aesthetic decisions when we create media. In professional cultural production, AI has already been adapted to produce movie trailers, music albums, fashion items, product and web designs, architecture, etc. In this short book, Lev Manovich offers a systematic framework to help us think about cultural uses of AI today and in the future. He challenges existing ideas and gives us new concepts for understanding media, design, and aesthetics in the AI era. “[The Analytical Engine] might act upon other things besides number...supposing, for instance, that the fundamental relations of pitched sounds in the science of harmony and of musical composition were susceptible of such expression and adaptations, the engine might compose elaborate and scientific pieces of music of any degree of complexity or extent.” - Ada Lovelace, 1842 Итак, кто же я такой? С известными оговорками, я и есть то, что люди прошлого называли «искусственным интеллектом». (Виктор Пелевин, iPhuck 10, 2017.) “So who am I exactly? With known caveats, I am what people of the past have called "artificial intelligence."” (Victor Pelevin, iPhuck 10, 2017.) Writing in 1842, Ada Lovelace imagines that in the future, Babbage’s Analytical Engine ( general purpose programmable computer) will be able to create complex music. In the 2017 novel by famous Russian writer Victor Pelevin, set in the late 21th century, the narrator is an algorithm solving crimes and writing novels about them.
    [Show full text]
  • AUTHORS and MACHINES Jane C
    AUTHORS AND MACHINES Jane C. Ginsburg† & Luke Ali Budiardjo†† ABSTRACT Machines, by providing the means of mass production of works of authorship, engendered copyright law. Throughout history, the emergence of new technologies tested the concept of authorship, and courts in response endeavored to clarify copyright’s foundational principles. Today, developments in computer science have created a new form of machine, the “artificially intelligent” (AI) system apparently endowed with “computational creativity.” AI systems introduce challenging variations on the perennial question of what makes one an “author” in copyright law: Is the creator of a generative program automatically the author of the works her process begets, even if she cannot anticipate the contents of those works? Does the user of the program become the (or an) author of an output whose content the user has at least in part defined? This Article frames these and similar questions that generative machines provoke as an opportunity to revisit the concept of copyright authorship in general and to illuminate its murkier corners. This Article examines several fundamental relationships (between author and amanuensis, between author and tool, and between author and co-author) as well as several authorship anomalies (including the problem of “accidental” or “indeterminate” authorship) to unearth the basic principles and latent ambiguities which have nourished debates over the meaning of the “author” in copyright. This Article presents an overarching and internally consistent model of authorship based on two basic pillars: a mental step (the conception of a work) and a physical step (the execution of a work), and defines the contours of these basic pillars to arrive at a cohesive definition of authorship.
    [Show full text]
  • PDF (Thumbnails)
    Introducing iPhone 13 Pro | Apple () The Future of Communication in the Metaverse () A brain-computer interface that evokes tactile sensations improves robotic arm control () Nathan Copeland Feels Again with Blackrock Technology () Introducing Scribe — Transform meetings into instantly searchable and shareable video & text () It's a Big Year for ‘Clean Tech’ at CES () [CES 2021] Personalized Services | Samsung () Targus CES 2021 - Antimicrobial Solutions () LG Teases Rollable Phone! () LG Display's transparent OLED screens and bendable TV at CES 2021 () AR Cloud: What Is An Augmented Reality Cloud And Why Does It Matter? () ‘AR cloud’ will drive the next generation of immersive experiences () Everyone you know is a Disney princess, which means AR is queen () How Google Lens is priming the world for an augmented reality takeover () OrCam’s AI-based reading device wins prestigious CES 2021 innovation award () Niantic AR tech () From Foldable Phones to Stretchy Screens () The robot shop worker controlled by a faraway human () Introducing Amazon Halo: A new way to help you measure and improve your health () FM POC with Telexistence Model-T () Robot friends: Why people talk to chatbots in times of trouble () Star Wars inspires new smart skin () The ID-Cap™ System - Revolutionizing Remote Patient Monitoring () Institutional Literacies: Engaging Academic IT Contexts for Writing and Communication () Together mode in Microsoft Teams () Cortana in Microsoft Teams | Easily collaborate with voice assistance () The rise and fall of Adobe Flash () Student
    [Show full text]
  • Nestdnn: Resource-Aware Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision
    NestDNN: Resource-Aware Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision Biyi Fangy, Xiao Zengy, Mi Zhang Michigan State University yCo-primary authors ABSTRACT KEYWORDS Mobile vision systems such as smartphones, drones, and Mobile Deep Learning Systems; Deep Neural Network Model augmented-reality headsets are revolutionizing our lives. Compression; Scheduling; Continuous Mobile Vision These systems usually run multiple applications concur- rently and their available resources at runtime are dynamic ACM Reference Format: y y due to events such as starting new applications, closing ex- Biyi Fang , Xiao Zeng , Mi Zhang. 2018. NestDNN: Resource-Aware isting applications, and application priority changes. In this Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision. In The 24th Annual International Conference on Mobile Com- paper, we present NestDNN, a framework that takes the dy- puting and Networking (MobiCom ’18), October 29-November 2, 2018, namics of runtime resources into account to enable resource- New Delhi, India. ACM, New York, NY, USA, 13 pages. https://doi. aware multi-tenant on-device deep learning for mobile vi- org/10.1145/3241539.3241559 sion systems. NestDNN enables each deep learning model to offer flexible resource-accuracy trade-offs. At runtime, it dynamically selects the optimal resource-accuracy trade-off 1 INTRODUCTION for each deep learning model to fit the model’s resource de- Mobile systems with onboard video cameras such as smart- mand to the system’s available runtime resources. In doing so, phones, drones, wearable cameras, and augmented-reality NestDNN efficiently utilizes the limited resources in mobile headsets are revolutionizing the way we live, work, and inter- vision systems to jointly maximize the performance of all the act with the world.
    [Show full text]
  • Chameleon: Scalable Adaptation of Video Analytics
    Chameleon: Scalable Adaptation of Video Analytics Junchen Jiang†◦, Ganesh Ananthanarayanan◦, Peter Bodik◦, Siddhartha Sen◦, Ion Stoica? yUniversity of Chicago ◦Microsoft Research ?UC Berkeley, Databricks Inc. ABSTRACT 1 INTRODUCTION Applying deep convolutional neural networks (NN) to video Many enterprises and cities (e.g., [2, 6]) are deploying thou- data at scale poses a substantial systems challenge, as im- sands of cameras and are starting to use video analytics for proving inference accuracy often requires a prohibitive cost a variety of 24×7 applications, including traffic control, se- in computational resources. While it is promising to balance curity monitoring, and factory floor monitoring. The video resource and accuracy by selecting a suitable NN configura- analytics are based on classical computer vision techniques tion (e.g., the resolution and frame rate of the input video), as well as deep neural networks (NN). This trend is fueled by one must also address the significant dynamics of the NN con- the recent advances in computer vision (e.g., [17, 18]) which figuration’s impact on video analytics accuracy. We present have led to a continuous stream of increasingly accurate Chameleon, a controller that dynamically picks the best con- models for object detection and classification. figurations for existing NN-based video analytics pipelines. A typical video analytics application consists of a pipeline The key challenge in Chameleon is that in theory, adapting of video processing modules. For example, the pipeline of a configurations frequently can reduce resource consumption traffic application that counts vehicles consists of a decoder, with little degradation in accuracy, but searching a large followed by a component to re-size and sample frames, and space of configurations periodically incurs an overwhelming an object detector.
    [Show full text]
  • Photoshop/Lightroom Tips
    Here’s What I Think! This article covers different Adobe Photoshop/Lightroomtips and techniques. The views expressed in this article are those of the author and do not necessarily reflect the views of Redlands Camera Club. By John Williams Need help? If you have any questions about processing an image using Adobe Lightroom or Photoshop, email me at [email protected] (for RCC members only) and I will try to assist you. AI (Artificial Intelligence) in Photography/Editing: There are two main areas where AI is used in photography: 1. Camera:AI technology is able to anticipate what your photographing and automatically adjust the exposure, sharpness, etc. Google has released an AI-powered camera called Google Clips, that can judge when the composition or lighting is aesthetically pleasing. Although the Goggle Clips reviews are less than positive, it is only time that this type of technology will be optimized in all cameras. Apple makes use of this technology to drive its dual-camera phones in portrait mode. 2. Post Processing: In Adobe Camera Raw and Basic Panel in Lightroom, AI technology is used to analyze your image and make optimum adjustments. Adobe calls their AI technology Adobe Sensei. Lightroomnow contains two AI features. The first is Enhance Detail that is reported to increase detail in images by as much as 30%. Secondly, the Auto button in the Develop Module Basic Panel usesAItechnology. The Auto feature does a very good job of adjusting your photo and is agood starting point when you adjust your images.Photoshop employs AI in the object selection function (Select Subject button).
    [Show full text]
  • Calling BS, Far and Wide
    Fall 2017 we make information work ischool.uw.edu Meet the Dean — Page 2 Donor Honor Roll — Pages 8 & 9 Alumni Updates — Page 10 Distinguished Alumna has earned many accolades Patricia Cutright, the iSchool 2017 Distinguished Alumna, has had a long and distinguished career in libraries. She is currently dean of libraries at Central Washington University and served as director of libraries at Pratt Institute in Brooklyn, New York, and Eastern Oregon University. Cutright has earned more than 25 honors, Assistant Professor Jevin West teaches “Calling Bullshit in the Age of Big Data.” (Photo courtesy of Columns magazine) including the 2002 Oregon Librarian Calling BS, far and wide of the Year; 2003 LITA/ Gaylord iSchool class makes an impact across the country Award for Achieve- hen Jevin West and Carl Bergstrom “They’re fed with so much BS in all aspects of ment in Patricia Cutright quietly rolled out CallingBullshit.org their lives,” West said. “Every time in history, Library and Win January, they hoped a few of their everyone says there’s more bullshit than in prior Information Technology presented by ideas would find their way into classrooms. times, but I think now you could make an argu- the American Library Association and At best, maybe the University of Washington ment there really is, and I think people are sick the Library Information and Technol- would let them teach a class. and tired of it.” ogy Association; 2002 Jean McKenzie / Woman of the Year Award; “We would have been happy if a couple of our West and Bergstrom, a professor in the UW Soroptimist International of La colleagues and friends would have said, ‘Cool Biology department, wanted to teach students Grande; and the 2002 Excellence in idea, we should pass that along,’ said West, an how to think critically about the data that’s Telecommunications – Applications, assistant professor at the Information School.
    [Show full text]
  • Edgeeye - an Edge Service Framework for Real-Time Intelligent Video Analytics
    EdgeEye - An Edge Service Framework for Real-time Intelligent Video Analytics Peng Liu Bozhao Qi Suman Banerjee University of Wisconsin-Madison University of Wisconsin-Madison University of Wisconsin-Madison [email protected] [email protected] [email protected] ABSTRACT such as speech recognition, language translation, image recogni- Deep learning with Deep Neural Networks (DNNs) can achieve tion, and recommendation. DNN-based approaches have achieved much higher accuracy on many computer vision tasks than classic big improvement in accuracy over traditional machine learning machine learning algorithms. Because of the high demand for both algorithms on computer vision tasks. They even beat humans at computation and storage resources, DNNs are often deployed in the image recognition task [12]. In this paper, we present our work the cloud. Unfortunately, executing deep learning inference in the on building a real-time intelligent video analytics framework based cloud, especially for real-time video analysis, often incurs high on deep learning for services deployed at the Internet edge. bandwidth consumption, high latency, reliability issues, and privacy Nowadays, camera sensors are cheap and can be included in concerns. Moving the DNNs close to the data source with an edge many devices. But the high computation and storage requirements computing paradigm is a good approach to address those problems. of DNNs hinder their usefulness for local video processing applica- The lack of an open source framework with a high-level API also tions in these low-cost devices. For example, the GoogLeNet model complicates the deployment of deep learning-enabled service at the for image classification is larger than 20MB and requires about Internet edge.
    [Show full text]