Ethical Issues In Topical Computer Vision Applications

1y ago
24 Views
2 Downloads
840.34 KB
53 Pages
Last View : Today
Last Download : 3m ago
Upload by : Mia Martinelli
Transcription

Mikael LauronenETHICAL ISSUES IN TOPICAL COMPUTER VISIONAPPLICATIONSUNIVERSITY OF JYVÄSKYLÄDEPARTMENT OF COMPUTER SCIENCE AND INFORMATION SYSTEMS2017

ABSTRACTLauronen, MikaelEthical issues in topical computer vision applicationsJyväskylä: University of Jyväskylä, 2017, 53 p.Information Systems, Master’s ThesisSupervisor(s): Puuronen, Seppo. Nieminen, Paavo. Vartiainen, Tero.Computer vision is a research area that contains multiple methods to approachnumerous visual problems. In the past decade, it has been rapidly evolvingwith the introduction of many new technologies and applications that utilizedifferent computer vision techniques. The purpose of this study is to identifythe ethical issues that concern recent trending computer vision applications andtheir tasks. This was done by conducting an integrative literature review andsynthesizing various studies that have been conducted on the different applications of computer vision and their ethical issues. The result was a synthesizedframework of different ethics themes that relate to the different areas of computer vision. The results were presented in a written and visual representationof the current knowledge on the topic. It was made sure that the study is validand reliable. Six categories of different ethical issues were recognized, whichare espionage, identity theft, malicious attacks, copyright infringement, discrimination and misinformation. Based on the findings, a discussion was conducted to point out the several gaps that exists in the current research area ofcomputer vision and its ethical issues. Further research on the topic was encouraged.Keywords: computer vision, ethics, computer ethics

FIGURESFIGURE 1 Low- and High-level category (Bertasius, Shi & Torresani, 2015) . 11FIGURE 2 What computer sees in an image (Forsyth & Ponce, 2003) . 12FIGURE 4 Inpainitng by smart camera (Criminisi, Perez, & Toyama, 2004) . 14FIGURE 3 Face features detection (Hsu, Abdel-Mottaleb & Jain, 2002) . 15FIGURE 5 Image labels in ImageNet (Deng, Dong, Socher et al., 2009) . 16FIGURE 6 CaptionBot analysis (Tran et al., 2016) . 17FIGURE 7 An example of Google’s reverse image search . 18TABLESTABLE 1 An example of a synthesis of literature . 27TABLE 2 Synthesis of literature . 31TABLE 3 Computer Vision technologies related to Espionage . 32TABLE 4 Computer Vision technologies related to Identity Theft . 35TABLE 5 Computer Vision technologies related to Malicious Attacks . 36TABLE 6 Computer Vision technologies related to Copyright Infringement . 38TABLE 7 Computer Vision technologies related to Discrimination . 39TABLE 8 Computer Vision technologies related to Misinformation . 40

TABLE OF CONTENTSABSTRACT .2FIGURES . 3TABLES . 31INTRODUCTION .62COMPUTER VISION . 82.1 Introduction to computer vision. 82.2 Description of visual processing system .92.3 Applications of computer vision . 92.4 Issues in computer vision .113RECENT PROGRESS IN COMPUTER VISION APPLICATIONS .133.1 Overview of recent computer vision trends .133.2 Computational photography .143.3 Recognition .153.3.1 Face recognition .153.3.2 Other recent recognition techniques .153.4 Computer vision on the Internet . 163.4.1 Image search and databases . 173.4.2 Internet computer vision .174ETHICS .194.1 Definition of ethics .194.2 Different fields of studies in ethics . 204.2.1 Meta-ethics . 204.2.2 Normative ethics .204.2.3 Applied ethics .214.3 Computer ethics . 214.3.1 Common issues in computer ethics .224.3.2 Professional ethics .225RESEARCH METHOD . 235.1 Integrative literature review .235.2 Previous similar publications.245.3 Data collecting . 245.4 Data sources and keywords .245.5 Inclusion and exclusion of data . 265.6 Screening process . 26

5.75.85.9Data analysis and classification . 27Expected findings . 28Limitations .286RESULTS .306.1 Synthesis of literature .306.2 Assessment of ethical issues .326.2.1 Espionage . 326.2.2 Identity theft. 346.2.3 Malicious attacks .366.2.4 Copyright infringement .386.2.5 Discrimination .396.2.6 Misinformation .406.3 Discussion .416.3.1 Areas with the lack of research . 426.3.2 Evaluation of this paper .427CONCLUSION .44REFERENCES.46APPENDIX 1 INSTRUMENT OF LITERATURE REVIEW .50

1INTRODUCTIONComputer vision is the field of research that deals with how computers can bemade to understand different digital images and videos and the contents ofthese. The method for acquiring this information is conducted through analyzing, processing and understanding images or video presented to the software.In short, computer vision exists to automate the task of the human vision system. The technology itself consists of many different applications, like recognition, classification or detection. For the applications of computer vision, severalbranches of tasks exist, like content-based image retrieval, where software findsa specific set of images from the larger set based on search criteria or similarityor face recognition, where facial features are detected from the images or video.Since computer vision is a rapidly changing research area, the new innovationsutilizing it are emerging fast. With any new and topical information technology,arises questions about the ethical practices of it. According to Quinn (2004),there is a need to approach every new technology in a thoughtful manner bythoroughly examining the technology and considering various issues the technology poses on the ethics.The main motivation of this study is the lack of concrete and cohesive literature that sums ethical issues of the new topical computer vision technologiesin one framework. The research area is therefore very topical and offers a goodmotivation to fill the research gap. This research gap exists, despite the fact thatthe software applications utilizing computer vision tasks are becoming available for public use in different forms of devices and platforms, like mobilephones and on the Internet, inevitably posing questions about their ethical implications.The research problem and the research question of this study can be presented as follows: What are the ethical issues that concern recent topical computer vision technologies?The research method of this thesis is an integrative literature review. Theaim of the integrative literature review is an in-depth systematical review ofexisting literature, knowledge and theories, and the search for potential areaswhere new knowledge and observations are needed. This form of research

7method serves well for a study that aims to review and synthesize related literature of the topic in such way that new perspectives are generated.The main goal of this study is to define ethical issues of topical computervision applications and tasks. The ethical themes were searched in the literatureconcerning computer vision, dating from 2000s forward. The ethical themesthat emerged in the relevant literature were combined and synthesized to forma framework for understanding ethical issues of computer vision applications.The first chapter serves as an introduction and describes a frame for thisstudy, such as goals, research question and methodology. The second chapterprovides an overview on what computer vision is, its distinction between machine vision, how the visual process of a computer vision works and a description of different computer vision applications. The third chapter provides anoverview of how computer vision has recently progressed and what are thetopical areas of its research area. The fourth chapter serves as an introduction tothe ethics, describing what the different fields of ethics are and defining computer and professional ethics. The fifth chapter describes the method of integrative literature review and how it is conducted in this study. The sixth chapterprovides results based on the integrative literature review, and synthesis ismade from literature to form a visual framework and written explanation toethical themes found from the sampled literature. Discussion on the findings isalso provided in this chapter, along with analysis of the findings and evaluationof data of this study. The seventh chapter provides conclusion to summarize theresults and offers discussion on possible future research.

82COMPUTER VISIONThis chapter provides a general description to the field of a computer vision byexplaining the process of a visual system, its issues and applications. It serves asa chapter to introduce emerging computer vision applications: where they arecategorized in the field of computer vision and how they are described to relatewith the classification of a visual processing. The visual processing system isfirst described in three levels according to Marr’s (1982) philosophy and theproblem definition and constraints of computer vision are explained. After that,a description of applications of computer vision are provided and explainedwithin different levels and categorized into different level categories accordingto the literature. The categories are the explained with examples of differentcomputer vision applications. The issues of computer vision are then presentedand the comparison between the function of visual processing of computer andthat of a person is defined.2.1 Introduction to computer visionThe first signs of computer vision as a discipline started formulating in 1960s.Since then, many notable publications on the description and issues of visualsystems have emerged, including the wide amount of research on applicationsrelated to the field of study. However, despite a long history, computer visionremains to be a discipline that has a lot of challenging problems, and it’s still anongoing research area. Improvements and new applications are constantlyemerging with the rapid advancement of technology, which require a lot ofconsiderations and study of the discipline. (Szeliski, 2010, 22.)The term of computer vision is not to be confused with other similar terms,such as machine vision or robot vision. By the definition of Ballard and Brown(1982), computer vision is seen to be more related to image and video processing and analysis and automating vision tasks by algorithms. On the otherhand, according to Steger, Ulrich & Wiedemann (2016), machine and robotics

9vision is a term that describes automatized inspection and analysis made byrobots and various others hardware implementations used in different industries. Thus by the definition, machine vision utilizes the application of computervision into manufacturing and industry and is of no interest to the scope of thisstudy.2.2 Description of visual processing systemTo design successful vision algorithms for computer vision, analysis and specification of a problem and constraints from image formation and priorknowledge need to be fused with robust and efficient algorithms. In otherwords, vision algorithms consist of a fusion of statistical and scientific approachwhich is combined with the engineering approach. (Szeliski, 2010, 13.)Marr (1982) has introduced three levels of description of a visual systemthat capsules the information processing. These levels are: Computational theory level, which describes the goal of the visiontask and constraints that are recognized or that arise with the identification of a problem.Algorithms and representation level, which describes what kind of algorithms are used to calculate desired results and how input andoutput information is represented.Hardware implementation level, which describes how algorithms andrepresentations are mapped into the hardware, such as graphicchips (GPU) or central processing units (CPU).While forming a task for a visual system, it’s important to decide on thespecification and constraints of a problem to come up with well-defined problem definition. The purpose of this is to constrain the problems that are potentially open-ended, to come up with a suitable technique for a desired task.(Szeliski, 2010, 9.) Much of the computer vision requires estimating unknownqualities and solutions to inverse problems. That is why the technology reliesheavily on algorithms that are known to work in practice. The algorithms mustboth match realistic world conditions and lend themselves a consistent and stable estimation of the unknown factors. Capable computer vision requires bothto be robust and reasonably efficient in terms of space and resources of runtime. (Szeliski, 2010, 10.)2.3 Applications of computer visionAs the intended objective of computer vision is to be as close as possible to human visual perception, the robustness of a computer vision algorithm is com-

10pared to observing human performing a similar visual task. Robustness, in thiscontext, is the ability to extract the relevant visual information for a certain task,even when the available information is contained within a small portion of dataand is different from the already stored data and visual representation. (Medioni & Kang, 2004, 109.)The usability of computer vision techniques is important, since computervision is applied science (Olague, 2016). Various ranges of mathematical andcomputational methods are utilized to solve vision perception related problems.The main subjects where computer vision is applied are divided into differentcategories. The categories can be divided into low, mid-, and high level categories and according to Olague (2016), the categories are as follows: Low level category, which includes Feature extraction and Matchingand registration.Mid-level category, which includes Image segmentation/clustering,Image classification and Motion analysis (video).High level category, which includes Sensor planning/calibration, Object Recognition, Visual learning and Face recognition and modeling.The low level category can be seen as the early stages of visual processing.The category is often described to deal with extraction of certain real-worldproperties from the images, such as object boundaries, surface or texures. Thequality of an output from the low level category is important, since it serves as acrucial part of the whole process in the computer vision chain. The extraction offeatures is used to solve many of the various image-related problems. Matchingand registration is an important procedure to transform various data into coordinate system to determine positions of point of interests on a manifold.(Olague, 2016, 44.)The mid-level category provides a connection between low and high levelcategory stages. The aim of this category is to provide perceptual representations in a form of symbolic representation translated from the images. With theacquired representations, a high-level process can operate to achieve perceptionunderstanding. In this category, different segmentation, clustering and classification techniques are implemented to achieve that: segmentation is used to divide the whole into groups, clustering is used to organize object into groups,and classification is used to identify and classify pixels of the image into classesor themes. Motion analysis gets information about objects that are in motion,which is taken from video image. (Olague, 2016, 44.)The high level category deals with cognitive deductions made by thecomputer vision system. This category includes several tasks, which includeimage identification, recognition and analysis. Its main application is contentbased image retrieval (Yang, 2004). Sensor controlling is concerned with whatto predict to sense from the image, object recognition is used to identify an object within the image, visual learning concerns the task of putting relevant information and data to images, and face recognition and modeling is used to au-

11tomatically identify and verify persons from the image. All of the mentionedcategories serve the task of recognizing information from a picture (Figure 1),and complement each other in various computer vision tasks. (Olague, 2016, 45.)FIGURE 1 Low- and High-level category (Bertasius, Shi & Torresani, 2015)2.4 Issues in computer visionThe hierarchy mentioned in the chapter above is difficult to categorize for thevisual perception of a living person, because human vision appears to be a single integrated unit. The visual tasks performed by human are a vast flow of topdown information which carries the representation derived from higher levels,which control visual processing at lower levels (Medioni & Kang, 2004, 110).The interpretation with our visual system is carried out with ease. We see thescene before us as it is, for example trees in a landscape. No noticeable deductions are required to interpret and understand each scene, and the interpretation of the scene and objects comes almost immediately.For a computer, the image consists of numerous numbers stored by it,usually in the electronic medium. The process of retrieving relevant informationfrom an image is carried out by the computer in a highly different mannercompared to the human eye, even with recent advancement in computer visiontechnologies (Figure 2).

12FIGURE 2 What computer sees in an image (Forsyth & Ponce, 2003)It remains a fact that we are still unaware for the most part of the complexities of a human vision. To interpret things with the visual system is not a simple process, and the human visual system has evolved over millions of years.(Davies, 2012, 1.) The performance of computer vision algorithms is still far behind when compared to the human visual perception.

133RECENT PROGRESS IN COMPUTER VISION APPLICATIONSThis chapter provides a detailed description of the current topical computervision applications with examples. In this context, the term topical computervision application is used to describe the trends of 2000s in the field of computervision. Since recent applications utilizing computer vision are more advancedand complex in nature, they can be seen as most controversial regarding ethicsand a central interest for the point of this study.In the first subchapter, a short overview of recent computer vision trendsis provided as introductory. The second subchapter examines computationalphotography and different applications utilizing it. The third subchapter examines the recognition techniques, with emphasis on face recognition, imagesearch and databases. The fourth subchapter examines topics of cognitive Internet services and Internet computer vision.3.1 Overview of recent computer vision trendsSzeliski (2010) lists various computer vision techniques that have recently become topical in the past decade in the field of computer vision research. Therecent trends of the past decade in computer vision have been continuing tomerge the fields of vision and graphics. Many new trends include techniqueslike image stitching, rendering and high dynamic range (HDR) capture. Sincesuch computer vision techniques are used in everyday photography and filming, they are labeled under a single term computational photography. (Jahne,2000, 610; Szeliski, 2010, 18.)The second emerging trend of computer vision is feature-based techniques,which are combined with learning for recognition applications. Recognitionbased techniques dominate tasks such as face recognition, scene recognition,location recognition, or action and motion recognition. (Szeliski, 2010, 19.)

14The third prominent trend, which is currently topical in visual research, isthe use of computer vision techniques in the setting of the Internet. This trendhas become more profound with the availability of immense quantities of dataon the Internet. The large amount of available data makes it more feasible tolearn categories of object from images without the assistance of a human. Searchengines have also been made to utilize various computer vision techniques.(Szeliski, 2010, 19.)3.2 Computational photographyComputational (smart) camera techniques are utilized in modern digital cameras. Additional computational techniques include texture synthesis, quilting andinpainting, and these techniques are used to produce new photographs by recombining input image samples. (Szeliski, 2010, 19).There is wide range of different techniques that fall into the category ofcomputational camera techniques. High Dynamic Range (HDR) imaging is atechnique that combines multiple exposures of the camera to achieve the fullrange of brightness to the scene of the taken image. Image stitching includestechniques like cutting pieces of a photograph to fill another image. This technique can be used to efficiently patch the holes or missing sections in a takenpicture. Rendering techniques are used to directly manipulate taken photographs. This can include making pictures look like drawings or paintings. Othertechniques like texture synthesis, quilting and inpainting (figure 4) are used tomodify or improve pictures. (Szeliski, 2010, 467.)FIGURE 3 Inpainitng by smart camera (Criminisi, Perez, & Toyama, 2004)

153.3 RecognitionAccording to Davies (2012), recognition is essentially about discriminating between different patterns of different classes, but also generalizing the patternsof the same class. Analyzing the scene and recognizing objects from the imageremains to be one of the most challenging problems in the field of computervision. The challenge of recognition lies in the complexity of the real-life objectsand high variability of different poses, angles and how objects occlude witheach other. Since consistent recognition is so hard to achieve, it requires robustalgorithms and a large database of exemplars. The most challenging version ofrecognition is general category or class recognition, which involves recognizingvaried classes or object instances, like different breeds of dogs. (Szeliski, 2010,657).3.3.1 Face recognitionThe most notable use of recognition is face recognition, which can recognizeand classify facial features from the images. Face recognition techniques haveproven to be the most successful application in the research area of computervision, due to the fact that a lot of researchers seem to be especially interested inthis application (Zhao et al., 2003). Face recognition is usually done by recognizing distinctive features such as eyes, nose and mouth, and verifying if they arein the realistic geometrical arrangement, as seen in (Figure 3). (Szeliski, 2010,657).FIGURE 4 Face features detection (Hsu, Abdel-Mottaleb & Jain, 2002)3.3.2 Other recent recognition techniquesIn addition to a lot of research on face recognition, several other recognitiontechniques has also received a lot of attention in the field of computer vision.Some of these include techniques that focuses on the detection of objects like

16pedestrians and cars. Various methods exist to identify such objects with focuson speed and efficiency of recognition, while other methods exist to focus onaccuracy of detection. (Szeliski, 2010, 666.) Another notable recognition technique connected to object recognition is location recognition, which is used indesktop and mobile applications, and can determine the location of the imagebased on its contents and can provide navigational directions or other locationrelevant information (Szeliski, 2010, 693). However, not all recognition techniques rely solely on just images. Action and motion recognition is used to analyse and derive different information from video feedback (Szeliski, 2010, 343).One of the integral parts of recognition techniques is the use of large image collections. A good example of a large database used for recognition isImageNet (Deng, Dong, Socher et al., 2009). (Figure 5) describes how labeling isdone for the set of images in ImageNet database. Large databases of labeledimages like this have enabled the rise of many Internet based sub-fields of computer vision in the past decade (Avidan, Baker & Shan, 2010).FIGURE 5 Image labels in ImageNet (Deng, Dong, Socher et al., 2009)3.4 Computer vision on the InternetThe cognitive development of computer vision related technologies has boughtincreasingly more possibilities to the computer vision researchers, and it can beseen in increasing public availability of different services over Internet and onmobile. Especially in recent years there’s been a substantial amount of differentavailable cognitive services, like Microsoft’s CaptionBot. (Tran et al., 2016).These cognitive services and APIs (application programming interfaces) areoffered to private personnel or corporations for different fees.

17The technologies utilized in such services are image recognition related todeep learning and different face, scene, character or text analysis. (He et al.,2016.) The main feature is to either provide information to the presented imageby the user to receive information about the image in the form of text (Figure 6),or find an image from database based on the keywords or tags that the userchooses or types into the program.FIGURE 6 CaptionBot analysis (Tran et al., 2016)3.4.1 Image search and databasesMost search engines related with image search rely on information like filename and captions (Craswell & Szummer, 2007). According to Szeliski (2010),use of computer vision techniques such as visual features and visual similarityis becoming more common to recognize images that have missing or brokenkeywords. The retrieval of images from the Internet thus utilizes both keywordsand visual similarity of images as combination.The retrieval techniques go by the variety of different names, such as content based image retrieval (CBIR) (Smeulders, Worring, Santini et al., 2000) andquery by image content (QBIC) (Flickner, Sawhney, Niblack et al., 1995). According to Szeliski (2010), the availability of image databases used by thes

provides an overview on what computer vision is, its distinction between ma-chine vision, how the visual process of a computer vision works and a descrip-tion of different computer vision applications. The third chapter provides an overview of how computer vision has recently progressed and what are the topical areas of its research area.

Related Documents:

Chapter Chapter 5 5 Ethical and Social Issues in the Digital FirmEthical and Social Issues in the Digital Firm UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS Key Technology Trends Raise Ethical Issues (Continued) Rapidly declining data storage costs: Lowers the tf ti h ti ldtb Key Technology Trends Raise Ethical Issues (Continued)

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

Note: all Web references in these Powerpoint slides verified as at 4-Aug-16. CITS3200: Ethical Issues - Alex Reid 2/96. CONTENTS. A. Why Computer Ethics? B. Some Ethical/Moral/Social Issues . Introduce the Computer Society Code of Ethics/Conduct as a basis. 5. Introduce a Framework for addressing ethical issues. 6. Provide background for your .

A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues 4.2 ETHICS IN AN INFORMATION SOCIETY Basic Concepts; Responsibility, Accountability, Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct

Malaysian setting and ethical principles in counseling practices. The main objective of this paper is to apply the code of ethics and ethical principles in solving ethical issues. The impending conclusion and implication will also be discussed. Keyword: Code of ethics, Ethical Principles, Counselor, Board of Counselor, Counseling 1. Introduction

Key Technology Trends That Raise Ethical Issues Advances in data analysis techniques Companies can analyze vast quantities of data gathered on individuals for: Understanding Ethical and Social Issues Related to Systems Essentials of Business Information Systems Ethical and Social Issues in Information Systems 7.15 2007 by Prentice .

UK Data Service – Big data and data sharing: Ethical issues This a brief introduction to ethical issues arising in social research with big data. It is not comprehensive, instead, it emphasises ethical issues that are most germane to data curation and data sharing.

development—year 1 (2012–13) FINAL PROJECT REPORT by Qing Shen, P.I.*; Peng Chen*; Peter Schmiedeskamp*; Alon Bassok*; Suzanne Childressy *University of Washington yPuget Sound Regional Council for Pacific Northwest Transportation Consortium (PacTrans) USDOT University Transportation Center for Federal Region 10 University of Washington More Hall 112, Box 352700 Seattle, WA 98195-2700 .