Visual roughened sensing for private human pose recognition

The rapid development of the Internet has made people increasingly dependent on networks for information transmission. Visual media such as digital images and videos have gradually become two of the most important forms of information exchange because they can be disseminated very quickly. However, images and videos often contain private data, such as corporate secrets and personal identity information and the harm caused by leakage of such data cannot be underestimated. Therefore, the security of images and videos has attracted widespread attention from the public and related researchers. At present, the processing of images and videos tends to include the following steps: sampling, compression, encryption, transmission, decryption, decompression, reconstruction, and intelligent processing. During these steps, images and videos are encrypted and decrypted by the sender and the receiver respectively to avoid potential leakage of private data by interception during online transmission. This processing mode is mainly aimed at preventing information-leakage problems during transmission, but it ignores the risks caused by the intelligent application of images and videos after their reconstruction. For the contradiction between existing data processing methods and actual social needs, a novel visual roughened sensing is proposed for typical intelligent applications such as private human pose recognition.

[1]  Mustafa M. Matalgah,et al.  Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels , 2015, Secur. Commun. Networks.

[2]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[3]  Ruisong Ye A Novel Image Scrambling and Watermarking Scheme Based on Orbits of Arnold Transform , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.

[4]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[5]  Emmanuel J. Candès,et al.  Quantitative Robust Uncertainty Principles and Optimally Sparse Decompositions , 2004, Found. Comput. Math..

[6]  Touradj Ebrahimi,et al.  Image privacy protection with secure JPEG transmorphing , 2017, IET Signal Process..

[7]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[8]  Zhihong Zhou,et al.  Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform , 2015 .

[9]  Mohan S. Kankanhalli,et al.  W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video , 2012, Multimedia Tools and Applications.

[10]  Nasharuddin Zainal,et al.  High Definition Image Encryption Algorithm Based on AES Modification , 2014, Wirel. Pers. Commun..

[11]  Xuan Li,et al.  A Patch-Based Saliency Detection Method for Assessing the Visual Privacy Levels of Objects in Photos , 2017, IEEE Access.

[12]  Lu Gan Block Compressed Sensing of Natural Images , 2007, 2007 15th International Conference on Digital Signal Processing.

[13]  Ran Tao,et al.  Image Encryption With Multiorders of Fractional Fourier Transforms , 2010, IEEE Transactions on Information Forensics and Security.

[14]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[15]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[16]  Samar Sen Sarma,et al.  GMDES: A GRAPH BASED MODIFIED DATA ENCRYPTION STANDARD ALGORITHM WITH ENHANCED SECURITY , 2014 .