An efficient privacy protection scheme for data security in video surveillance

Abstract The advancement in video surveillance has raised significant concerns about privacy protection. The existing methods focus on identifying the sensitive region and preserving the behavior of the target, however, they ignore the recoverability of private content. In this paper, we propose a novel and efficient privacy protection scheme for data security in video surveillance, which jointly addresses several key challenges, including de-identification, behavior preservation, recoverability, and compressibility in one unified system. Our method constructs a public stream and a private residual error stream by blurring the private sensitive region. With our scheme, ordinary users could recognize the behaviors in the public identity-protected video stream for surveillance purpose, while authorized users are able to access the recovered private content (e.g., for law investigations). Moreover, the compressed privacy protected region and residual error could be able to save the costs associated with transmission and storage. The extensive experiments on two standard surveillance datasets and a user study demonstrate the effectiveness of our privacy protection system.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Bernhard Rinner,et al.  Privacy protection vs. utility in visual data , 2016, Multimedia Tools and Applications.

[3]  King Ngi Ngan,et al.  FaceSeg: Automatic Face Segmentation for Real-Time Video , 2009, IEEE Transactions on Multimedia.

[4]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Xiaowei Zhou,et al.  Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[7]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[8]  David Suter,et al.  A Novel Robust Statistical Method for Background Initialization and Visual Surveillance , 2006, ACCV.

[9]  Jean-Luc Dugelay,et al.  Privacy protecting, intelligibility preserving video surveillance , 2016, 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[10]  Jitendra Malik,et al.  Object Segmentation by Long Term Analysis of Point Trajectories , 2010, ECCV.

[11]  Jianping Fan,et al.  iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Nuno Vasconcelos,et al.  Layered Dynamic Textures , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  K. Plataniotis,et al.  Privacy Protected Surveillance Using Secure Visual Object Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Feng Li,et al.  A Coprime Blur Scheme for Data Security in Video Surveillance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Maurício Pamplona Segundo,et al.  Automatic Face Segmentation and Facial Landmark Detection in Range Images , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[16]  Bernhard Rinner,et al.  User-centric privacy awareness in video surveillance , 2011, Multimedia Systems.

[17]  Touradj Ebrahimi,et al.  Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[18]  Mourad Ouaret,et al.  Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.

[19]  Sebastian Nowozin,et al.  Discriminative Non-blind Deblurring , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[20]  David A. McAllester,et al.  Object Detection with Discriminatively Trained Part Based Models , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[22]  Changda Wang,et al.  A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.

[23]  D. Marpe,et al.  Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.

[24]  Yuhang Li,et al.  Privacy preserving for human object in video surveillance via visual cryptography , 2014, Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

[25]  Rob Fergus,et al.  Blind deconvolution using a normalized sparsity measure , 2011, CVPR 2011.

[26]  Peter Schartner,et al.  Video Surveillance: A Distributed Approach to Protect Privacy , 2005, Communications and Multimedia Security.

[27]  Tomi Räty,et al.  Survey on Contemporary Remote Surveillance Systems for Public Safety , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[28]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[29]  Rong Yan,et al.  Tools for Protecting the Privacy of Specific Individuals in Video , 2007, EURASIP J. Adv. Signal Process..

[30]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[31]  Qi Tian,et al.  Statistical modeling of complex backgrounds for foreground object detection , 2004, IEEE Transactions on Image Processing.

[32]  Hai Jin,et al.  Fully Reversible Privacy Region Protection for Cloud Video Surveillance , 2017, IEEE Transactions on Cloud Computing.

[33]  Jian-Feng Cai,et al.  Framelet-Based Blind Motion Deblurring From a Single Image , 2012, IEEE Transactions on Image Processing.

[34]  Bernhard Rinner,et al.  Multi-Level Cartooning for Context-Aware Privacy Protection in Visual Sensor Networks , 2014, MediaEval.

[35]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.

[36]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[37]  Hao Chen,et al.  Camera-Recognizable and Human-Invisible Labelling for Privacy Protection , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[38]  Junliang Chen,et al.  Personal Privacy Protection Framework Based on Hidden Technology for Smartphones , 2017, IEEE Access.

[39]  Bernhard Rinner,et al.  TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[40]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[41]  Mark S. Nixon,et al.  Soft biometrics for subject identification using clothing attributes , 2014, IEEE International Joint Conference on Biometrics.

[42]  Hai Jin,et al.  Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos , 2016, IEEE Transactions on Emerging Topics in Computing.

[43]  Raphael Sznitman,et al.  Active Testing for Face Detection and Localization , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[44]  Liang-Tien Chia,et al.  Stratification-Based Keyframe Cliques for Effective and Efficient Video Representation , 2011, IEEE Transactions on Multimedia.

[45]  B. Prabhakaran,et al.  Blind robust watermarking of 3d motion data , 2010, TOMCCAP.

[46]  Arif Ghafoor,et al.  A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data , 2015, IEEE Transactions on Multimedia.

[47]  Sylvain Paris,et al.  Handling Noise in Single Image Deblurring Using Directional Filters , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[48]  P. J. Narayanan,et al.  Person De-Identification in Videos , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[49]  Mubarak Shah,et al.  View-Invariant Representation and Recognition of Actions , 2002, International Journal of Computer Vision.

[50]  Robert T. Collins,et al.  Silhouette-based human identification from body shape and gait , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.