Compression Independent Reversible Encryption for Privacy in Video Surveillance

نویسندگان

  • Paula Carrillo
  • Hari Kalva
  • Spyros S. Magliveras
چکیده

One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting regions that reveal identity (e.g., faces or vehicle tags) are necessary to preserve individuals’ right to privacy while recognizing the legitimate needs for video surveillance. The video used in surveillance applications usually needs to be transcoded or recoded for distribution and archival. Transcoding a traditionally encrypted video is not possible without decrypting the video first. This paper presents a compression algorithm independent solution that provides privacy in video surveillance applications. The proposed approach uses permutation-based encryption in the pixel domain to hide identity revealing features. The permutation-based encryption tolerates lossy compression and transcoding and allows decryption of the transcoded video at a later time. The use of permutation-based encryption makes the proposed solution independent of the compression algorithms used and robust to transcoding. The cost of providing this privacy is an increase in bitrate that depends on the percentage of blocks encrypted.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Reversible De-Identification Approach For Lossless Image Compression Based On Reversible Watermarking Mechanism Based On Obfuscation Process

Although tremendous progress has been made in the past years on watermarking for protecting information from incidental or accidental hacking, there still exists a number of problems. De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process rever...

متن کامل

Transactions on Engineering and Sciences, Vol. I, August 2013

Content distribution applications such as digital broadcasting, video-on-demand services, video conferencing, surveillance, and telesurgery are confronted with difficulties besides the inevitable compression and quality challenges with respect to intellectual property management, authenticity, privacy regulations, and access control. Meeting such security requirements in an end-to-end video dis...

متن کامل

Video Data Hiding for Managing Privacy Information in Surveillance Systems

From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred or re-rend...

متن کامل

A Review on image Compression Techniques

With the rapid a advancement in multimedia technology, it has become possible to generate and transmit more and more multimedia data in military commercial and medical field. Some of these data includes some sensitive information which is required to be accessed by the intended person only. Therefore, security and privacy of these information is of prime concern today. In the last couple of yea...

متن کامل

Privacy Information Management for Video Surveillance

The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EURASIP J. Information Security

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009