Secure Visual Object Based Coding for Privacy Protected Surveillance

نویسندگان

  • Karl Martin
  • Konstantinos N. Plataniotis
چکیده

This paper presents a scheme for secure coding of arbitrarily-shaped visual objects. The scheme can be employed in a privacy protected surveillance system, whereby visual objects are encrypted so that the content is only available to certain entities, such as persons of authority, possessing the correct decryption key. This system may be deployed in sensitive areas requiring surveillance, but where personnel require privacy for authorized activities within the surveillance area. The encryption can be tied with the identity of human objects under surveillance so that unauthorized personnel are immediately apparent to human or computer based monitoring systems. The secure visual object coder employs Shape and Texture Set Partitioning in Hierarchical Trees (ST-SPIHT) along with partial encryption for efficient, secure storage and transmission of visual object shape and textures. The encryption is performed in the compressed domain and does not affect the rate-distortion performance of the coder. A separate parameter for each encrypted object controls the strength of the encryption versus required processing overhead. Index Terms Shape adaptive coding, security, encryption, surveillance, privacy, privacy protection, visual object coding, shape and texture coding, wavelet based coding, set partitioning in hierarchical trees (SPIHT). Corresponding Author: Karl Martin, Multimedia Laboratory, Room BA 4157, The Edward S. Rogers Sr. Department of ECE, University of Toronto, 10 King’s College Road, Toronto, Ontario, M5S 3G4, Canada, phone: 1 (416) 978 6845, FAX: 1 (416) 978 4425, e-mail: [email protected] K. Martin, and K.N. Plataniotis are with The Edward S. Rogers Sr. Department of ECE, University of Toronto, Multimedia Laboratory, Room BA 4157, 10 Kings College Road, Toronto, Ontario, M5S 3G4, Canada *Partially supported by a grant from the Natural Sciences and Engineering Research Council of Canada (NSERC) under the Network for Effective Collaboration Technologies through Advanced Research (NECTAR) project. October 12, 2007 DRAFT SUBMITTED TO IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MediaEval 2014 Visual Privacy Task: Geometrical Privacy Protection Tool

This paper describes EPFL privacy protection tool for the MediaEval 2014 Visual Privacy task. The goal of the task is to obscure faces, body silhouettes, and personal items of people in the provided surveillance clips to preserve their personal privacy. The EPFL privacy protection tool mainly relies on two privacy protection filters: a warping-based reversible filter to obscure features with lo...

متن کامل

Preserving and Managing Privacy Information in Video Surveillance Systems

Recent widespread deployment and increased sophistication of video surveillance systems have raised apprehension of their threat to individuals’ right of privacy. Privacy protection technologies developed thus far have focused mostly on subject detection and visual obfuscation techniques. In this chapter, we discuss a prototype system for privacy-protected video surveillance that is capable of ...

متن کامل

Privacy Information Management for Video Surveillance

The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this...

متن کامل

PICS: Private Image Classification with SVM

The advent of Machine Learning as a Service (MLaaS) makes it possible to outsource a visual object recognition task to an external (e.g. cloud) provider. However, outsourcing such an image classification task raises privacy concerns, both from the image provider’s perspective, who wishes to keep their images confidential, and from the classification algorithm provider’s perspective, who wishes ...

متن کامل

Privacy Preserving Face Identification in the Cloud through Sparse Representation

0.2258 0.1618 ...... 0.1783 Nowadays, with tremendous visual media stored and even processed in the cloud, the privacy of visual media is also exposed to the cloud. In this paper we propose a private face identification method based on sparse representation. The identification is done in a secure way which protects both the privacy of the subjects and the confidentiality of the database. The fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007