Selective object encryption for privacy protection

This paper introduces a new recursive sequence called the truncated P-Fibonacci sequence, its corresponding binary code called the truncated Fibonacci p-code and a new bit-plane decomposition method using the truncated Fibonacci pcode. In addition, a new lossless image encryption algorithm is presented that can encrypt a selected object using this new decomposition method for privacy protection. The user has the flexibility (1) to define the object to be protected as an object in an image or in a specific part of the image, a selected region of an image, or an entire image, (2) to utilize any new or existing method for edge detection or segmentation to extract the selected object from an image or a specific part/region of the image, (3) to select any new or existing method for the shuffling process. The algorithm can be used in many different areas such as wireless networking, mobile phone services and applications in homeland security and medical imaging. Simulation results and analysis verify that the algorithm shows good performance in object/image encryption and can withstand plaintext attacks.

[1]  I. Nakajima,et al.  Medical Image Encryption Based on Pixel Arrangement and Random Permutation for Transmission Security , 2007, 2007 9th International Conference on e-Health Networking, Application and Services.

[2]  Hari Kalva,et al.  Compression independent object encryption for ensuring privacy in video surveillance , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[3]  Mohan M. Trivedi,et al.  A track-based human movement analysis and privacy protection system adaptive to environmental contexts , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..

[4]  Andreas Uhl,et al.  Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.

[5]  Tian-Sheuan Chang,et al.  Architecture Design of Shape-Adaptive Discrete Cosine Transform and Its Inverse for MPEG-4 Video Coding , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Muhammad Khurram Khan,et al.  An Intelligent Fingerprint-Biometric Image Scrambling Scheme , 2007, ICIC.

[7]  Karen O. Egiazarian,et al.  Pointwise Shape-Adaptive DCT for High-Quality Denoising and Deblocking of Grayscale and Color Images , 2007, IEEE Transactions on Image Processing.

[8]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[10]  Sos S. Agaian,et al.  Parallel algorithms and VLSI architectures for stack filtering using Fibonacci p-codes , 1995, IEEE Trans. Signal Process..

[11]  Chul Sur,et al.  Region-Based Selective Encryption for Medical Imaging , 2007, FAW.