An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos

With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, where human face regions are selected as an example of ROI. First, the human face regions in the video are detected and extracted. Then, they are mapped into slice groups by using FMO technology in H.264. After that, these regions are encrypted using selective video encryption based on chaos. Experimental results and analysis show that the proposed scheme can effectively protect the private information of H.264 video and, therefore, can strike a good balance among the security, encryption efficiency, and coding performance. It has great potential to be used in the privacy protection of the video of CCTV.

[1]  Mohammad Ghanbari,et al.  Sufficient Encryption with Codewords and Bin-strings of H.264/SVC , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[2]  K. Plataniotis,et al.  Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Jong-Wook Han,et al.  On the Challenges of Applying Selective Encryption on Region-of-Interest in H.264 Video Coding , 2009, 2009 2nd International Conference on Computer Science and its Applications.

[4]  Touradj Ebrahimi,et al.  H.264/AVC video scrambling for privacy protection , 2008, 2008 15th IEEE International Conference on Image Processing.

[5]  C.-C. Jay Kuo,et al.  Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.

[6]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[7]  Byeungwoo Jeon,et al.  Digital Video Scrambling Method Using Intra Prediction Mode , 2004, PCM.

[8]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[9]  Wesley De Neve,et al.  Privacy Protection in Video Surveillance Systems Using Scalable Video Coding , 2009, 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.

[10]  Yong Man Ro,et al.  A selective video encryption for the region of interest in scalable video coding , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[11]  Rong Yan,et al.  Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..

[12]  Guanrong Chen,et al.  A stream cipher based on a spatiotemporal chaotic system , 2007 .

[13]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of multimedia , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[14]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Li Zhuo,et al.  Fast compression domain video encryption scheme for H.264/AVC streaming , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[16]  Ranjan Bose,et al.  A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[17]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[18]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[19]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[20]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[22]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[23]  Li Zhuo,et al.  An object-based unequal encryption method for H.264 compressed surveillance videos , 2012, 2012 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2012).

[24]  Mohan S. Kankanhalli,et al.  Adaptive Transformation for Robust Privacy Protection in Video Surveillance , 2012, Adv. Multim..

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  Yongdong Zhang,et al.  Compressive sensing based video scrambling for privacy protection , 2011, 2011 Visual Communications and Image Processing (VCIP).

[27]  K. Nahrstedt,et al.  A New Algorithm for MPEG Video , 1997 .

[28]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[29]  H. T. Mouftah,et al.  A real-time privacy-sensitive data hiding approach based on chaos cryptography , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[30]  Isabel Martinez-Ponte,et al.  ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .

[31]  Jiang Jianguo,et al.  Face Protection of H.264 Video Based on Detecting and Tracking , 2007, 2007 8th International Conference on Electronic Measurement and Instruments.

[32]  H. Kezia,et al.  Encryption of Digital Video Based on Lorenz Chaotic System , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Li Zhuo,et al.  An efficient video encryption scheme for H.264 compressed bitstream , 2011, 2011 7th International Conference on Advanced Information Management and Service (ICIPM).

[35]  Anil K. Jain,et al.  Face Detection in Color Images , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[36]  Mohammad Ghanbari,et al.  An Efficient Security System for CABAC Bin-Strings of H.264/SVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[37]  Zafar Shahid,et al.  Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[38]  Frederic Dufaux,et al.  Video surveillance using JPEG 2000 , 2004, SPIE Optics + Photonics.

[39]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[40]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[41]  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .

[42]  Mohan S. Kankanhalli,et al.  Privacy modeling for video data publication , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[43]  Máire O'Neill,et al.  The improved sign bit encryption of motion vectors for H.264/AVC , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[44]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..