Nội dung được dịch bởi AI, chỉ mang tính chất tham khảo
Xây dựng một khung mã hóa vùng quan tâm sau nén cho các hệ thống giám sát video hiện có
Tóm tắt
Chúng tôi đề xuất một thiết kế và triển khai khung mã hóa, bổ sung chức năng mã hóa vùng quan tâm cho các hệ thống giám sát video hiện có với nỗ lực tích hợp và triển khai tối thiểu. Ngoài việc phát hiện vùng quan tâm, tất cả các thao tác diễn ra ở cấp độ bit-stream và không yêu cầu nén lại. Điều này cho phép tốc độ mã hóa và giải mã rất nhanh với chi phí không gian không đáng kể. Hơn nữa, chúng tôi cung cấp cả đánh giá an ninh khách quan và chủ quan của khung mã hóa mà chúng tôi đề xuất. Thêm vào đó, chúng tôi giải quyết các thách thức liên quan đến thiết kế và triển khai cũng như các mối quan tâm thực tiễn. Những vấn đề này bao gồm tính mô-đun, khả năng xử lý song song và, quan trọng nhất, hiệu suất của các bộ phát hiện khuôn mặt tiên tiến. Chúng tôi phát hiện rằng hiệu suất của chúng, mặc dù được sử dụng thường xuyên trong các hệ thống giám sát, là không đủ cho các mục đích thực tiễn, cả về tốc độ và độ chính xác phát hiện.
Từ khóa
Tài liệu tham khảo
Auer, S., Bliem, A., Engel, D., Uhl, A., Unterweger, A.: Bitstream-based JPEG encryption in real-time. Int. J. Digit Crime Forensics 5(3), 1–14 (2013)
Bergeron, C., Lamy-Bergor, C.: Compliant selective encryption for H.264/AVC video streams. In: Proceedings of the IEEE workshop on multimedia signal processing, MMSP’05, pp. 1–4 (2005). doi:10.1109/MMSP.2005.248641
Boult, T.E.: PICO: privacy through invertible cryptographic obscuration. In: IEEE/NFS Workshop on computer vision for interactive and intelligent environments, pp. 27–38. Lexington, KY, USA (2005)
Carrillo, P., Kalva, H., Magliveras, S.: Compression independent reversible encryption for privacy in video surveillance. EURASIP J. Inf. Secur. 2009, 1–13 (2009)
Chattopadhyay, A., Boult, T.: PrivacyCam: a privacy preserving camera using uclinux on the blackfin DSP. In: IEEE conference on computer vision and pattern recognition 2007 (CVPR’07), pp. 1–8. Minneapolis, MN, USA (2007)
Cheung, S.S., Paruchuri, J.K., Nguyen, T.P.: Managing privacy data in pervasive camera networks. In: IEEE International conference on image processing 2008 (ICIP’08), pp. 1676–1679. San Diego, CA, USA (2008)
Choi, S., Han, J.W., Cho, H.: Privacy-preserving H.264 video encryption scheme. ETRI J. 33(6), 935–944 (2011)
Dufaux, F., Ebrahimi, T.: Scrambling for Anonymous visual communications. In: Proceedings of SPIE, applications of digital image processing XXVIII, vol. 5909. SPIE (2005)
Dufaux, F., Ebrahimi, T.: Scrambling for privacy protection in video surveillance systems. IEEE Trans. Circuits Syst. Video Technol. 18(8), 1168–1174 (2008). doi:10.1109/TCSVT.2008.928225
Dufaux, F., Ebrahimi, T.: A framework for the validation of privacy protection solutions in video surveillance. In: Proceedings of the IEEE international conference on multimedia and Expo. ICME ’10, pp. 66–71. IEEE, Singapore (2010)
Dufaux, F., Ouaret, M., Abdeljaoued, Y., Navarro, A., Vergnenegre, F., Ebrahimi, T.: Privacy enabling technology for video surveillance. In: SPIE mobile multimedia/image processing for military and security applications, Lecture Notes in Computer Science. IEEE (2006)
Engel, D., Uhl, A., Unterweger, A.: Region of Interest signalling for encrypted JPEG images. In: IH&MMSec’13: Proceedings of the 1st ACM Workshop on information hiding and multimedia security, pp. 165–174. ACM (2013)
Hofbauer, H., Uhl, A.: An effective and efficient visual quality index based on local edge gradients. In: IEEE 3rd European workshop on visual information processing, p. 6, Paris, France (2011)
Iqbal, R., Shahabuddin, S., Shirmohammadi, S.: Compressed-domain spatial adaptation resilient perceptual encryption of live H.264 video. In: 2010 10th international conference on information sciences signal processing and their applications (ISSPA), pp. 472–475 (2010)
Itu-T, H. 264: Advanced video coding for generic audiovisual services (2007). http://www.itu.int/rec/T-REC-H.264-200711-I/en
Jain, V., Learned-Miller, E.: Fddb: a benchmark for face detection in unconstrained settings. Tech. Rep. UM-CS-2010-009, University of Massachusetts, Amherst (2010). http://people.cs.umass.edu/elm/papers/fddb
Kerr, D.A.: Chrominance subsampling in digital images (2012). http://dougkerr.net/pumpkin/articles/Subsampling
Khan, M., Jeoti, V., Malik, A.: Perceptual encryption of JPEG compressed images using DCT coefficients and splitting of DC coefficients into bitplanes. In: 2010 International conference on intelligent and advanced systems (ICIAS), pp. 1–6 (2010)
Kim, Y., Yin, S., Bae, T., Ro, Y.: A selective video encryption for the region of interest in scalable video coding. In: Proceedings of the TENCON 2007-IEEE region 10 conference, pp. 1–4. Taipei, Taiwan (2007)
Kwon, S.G., Choi, W.I., Jeon, B.: Digital video scrambling using motion vector and slice relocation. In: Proceedings of second international conference of image analysis and recognition. ICIAR’05, Lecture Notes in Computer Science, vol. 3656, pp. 207–214. Springer, Toronto, Canada (2005)
Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on jpeg encoding. In: Proceedings of the eighth international conference on information visualisation 2004 (IV 2004), pp. 217–220 (2004)
Lian, S., Sun, J., Zhang, D., Wang, Z.: A selective image encryption scheme based on JPEG2000 codec. In: Aizawa, Y.N.K., Satoh, S. (eds.) Proceedings of the 5th Pacific Rim conference on multimedia. Lecture Notes in Computer Science, vol. 3332, pp. 65–72. Springer, Berlin (2004)
Lienhart, R., Maydt, J.: An extended set of Haar-like features for rapid object detection. In: 2002 international conference on image processing vol. 1, pp. I-900–I-903 (2002)
Martinez-Ponte, I., Desurmont, X., Meessen, J., Delaigle, J.F.: Robust human face hiding ensuring privacy. In: Proceedings of the 6th international workshop on image analysis for multimedia interactive services (WIAMIS’05) (2005)
Melle, A., Dugelay, J.L.: Scrambling faces for privacy protection using background self-similarities. In: 21st IEEE international conference on image processing (ICIP 2014). IEEE, Paris, France (2014)
Newton, E., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232–243 (2005)
Niu, X., Zhou, C., Ding, J., Yang, B.: JPEG encryption with file size preservation. In: International conference on intelligent information hiding and multimedia signal processing 2008 (IIHMSP ’08), pp. 308–311 (2008)
Phillips, P., Moon, H., Rizvi, S., Rauss, P.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090–1104 (2000)
Phillips, P., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. ImageVis. Comput. 16(5), 295–306 (1998)
Puech, W., Rodrigues, J.M.: Crypto-compression of medical images by selective encryption of DCT. In: European signal processing conference 2005 (EUSIPCO’05) (2005)
Puech, W., Rodrigues, J.M.: Analysis and cryptanalysis of a selective encryption method for JPEG images. In: WIAMIS ’07: Proceedings of the eight international workshop on image analysis for multimedia interactive services. IEEE Computer Society, Washington, DC, USA (2007). doi:10.1109/WIAMIS.2007.21
Puech, W., Bors, A., Rodrigues, J.: Protection of colour images by selective encryption. In: Fernandez-Maloigne, C. (ed.) Advanced Color Image Processing and Analysis, pp. 397–421. Springer, New York (2013)
Rahman, S.M.M., Hossain, M.A., Mouftah, H., Saddik, A.E., Okamoto, E.: A real-time privacy-sensitive data hiding approach based on chaos cryptography. In: Proceedings of IEEE international conference on multimedia and Expo, pp. 72–77. Suntec City, Singapore (2010)
Rajpoot, Q.M., Jensen, C.D.: Security and privacy in video surveillance: requirements and challenges. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (ed.) ICT Systems security and privacy protection, IFIP Advances in information and communication technology, vol. 428, pp. 169–184. Springer, Berlin Heidelberg (2014)
Santana, M.C., Déniz-Suárez, O., Hernández-Sosa, D., Lorenzo, J.: A comparison of face and facial feature detectors based on the viola-jones general object detection framework. Mach. Vis. Appl. 22(3), 481–494 (2011)
Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A., Connell, J., Shu, C.F., Lu, M.: Enabling video privacy through computer vision. IEEE Secur. Priv. 3(3), 50–57 (2005)
Seshadrinathan, K., Soundararajan, R., Bovik, A., Cormack, L.: Study of subjective and objective quality assessment of video. IEEE Trans. Image Proces. 19(6), 1427–1441 (2010)
Sohn, H., Anzaku, E., Neve, W.D., Ro, Y.M., Plataniotis, K.: Privacy protection in video surveillance systems using scalable video coding. In: Proceedings of the sixth IEEE international conference on advanced video and signal based surveillance, pp. 424–429. Genova, Italy (2009)
Sohn, H., Lee, D., De Neve, W., Plataniotis, K.N., Ro, Y.M.: Objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR. In: Flammini, F., Setola, R., Franceschetti, G. (eds.) Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, pp. 111–140. CRC Press, Boca Raton (2013)
Sun, Y., Wang, X., Tang, X.: Deep convolutional network cascade for facial point detection. In: Proceedings of the 2013 IEEE conference on computer vision and pattern recognition. CVPR ’13, pp. 3476–3483. IEEE Computer Society, Washington, DC, USA (2013)
Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the ACM multimedia 1996, pp. 219–229. Boston, USA (1996)
Tong, L., Dai, F., Zhang, Y., Li, J.: Restricted H.264/AVC video coding for privacy region scrambling. In: 2010 17th IEEE international conference on image processing (ICIP), pp. 2089–2092 (2010)
Unterweger, A., Uhl, A.: Length-preserving bit-stream-based JPEG Encryption. In: MM&Sec’12: Proceedings of the 14th ACM multimedia and security workshop, pp. 85–89. ACM (2012)
Unterweger, A., Uhl, A.: Slice groups for post-compression region of interest encryption in H.264/AVC and its scalable extension. Signal processing: image communication (2014). Accepted
Viola, P., Jones, M.: Robust real-time object detection. Int. J. Comput. Vis. 57, 137–154 (2001)
Wen, J., Severa, M., Zeng, W., Luttrell, M., Jin, W.: A format-compliant configurable encryption framework for access control of video. IEEE Trans. Circuits Syst. Video Technol. 12(6), 545–557 (2002)
Wu, C.P., Kuo, C.C.J.: Fast encryption methods for audiovisual data confidentiality. SPIE Photonics East—symposium on voice. Video, and data communications, vol. 4209, pp. 284–295. MA, USA, Boston (2000)
Yang, B., Zhou, C.Q., Busch, C., Niu, X.M.: Transparent and perceptually enhanced JPEG image encryption. In: 16th international conference on digital signal processing, pp. 1–6 (2009)
Ye, Y., Zhengquan, X., Wei, L.: A Compressed video encryption approach based on spatial shuffling. In: 8th International conference on signal processing, vol. 4, pp. 16–20 (2006)
Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimed. 5(1), 118–129 (2003)