Chaos-cryptography based privacy preservation technique for video surveillance

A multimedia surveillance system aims to provide security and safety of people in a monitored space. However, due to the nature of surveillance, privacy-sensitive information such as face, gait, and other physical parameters based on the captured media from multiple sensors, can be revealed without the permission of the people who appear in the surveillance video. This is a major concern in recent days. Therefore, it is desirable to have such mechanism that can hide privacy-sensitive information as much as possible, yet supporting effective surveillance tasks. In this article, we propose a chaos cryptography based data scrambling approach that can be applied on selected regions of interest (ROIs) in video camera footage, which contains privacy-sensitive data. Our approach also supports multiple levels of abstraction of data hiding depending on the role of the authorized user. In order to evaluate the suitability of this approach, we applied our algorithm on some video camera footage and observed that our approach is computationally efficient and, hence, it can be applied for real-time video surveillance tasks in preserving privacy sensitive information.

[1]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[2]  Isabel Martinez-Ponte,et al.  ROBUST HUMAN FACE HIDING ENSURING PRIVACY , 2004 .

[3]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[4]  Eun-Soo Kim,et al.  Practical image encryption scheme by real‐valued data , 1996 .

[5]  J.-C. Yeo,et al.  Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .

[6]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[7]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[8]  L. Sweeney,et al.  Preserving Privacy by De-identifying Facial Images , 2003 .

[9]  Abir Awad,et al.  A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods , 2010, IACR Cryptol. ePrint Arch..

[10]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[11]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[12]  Bahram Javidi,et al.  Experimental demonstration of the random phase encoding technique for image encryption and security verification , 1996 .

[13]  Osama S. Farag Allah,et al.  Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .

[14]  Mohan Trivedi,et al.  The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  Renato da Veiga Guadagnin,et al.  Practical Procedures to Improve Face Recognition Based on Eigenfaces and Principal Component Analysis 1 , 2001 .

[17]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[18]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[19]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[20]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[21]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Russell Impagliazzo,et al.  One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.

[23]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[24]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[25]  Alireza Jolfaei,et al.  Survey: Image Encryption Using A5/1 and W7 , 2010 .

[26]  Jiun-In Guo,et al.  A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[27]  H. T. Mouftah,et al.  A real-time privacy-sensitive data hiding approach based on chaos cryptography , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[28]  Andrew Chi-Chih Yao,et al.  Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.

[29]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[30]  ALIREZA JOLFAEI,et al.  An image encryption approach using chaos and stream cipher , 2010 .

[31]  M. Hénon A two-dimensional mapping with a strange attractor , 1976 .

[32]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Rainer Lienhart,et al.  An extended set of Haar-like features for rapid object detection , 2002, Proceedings. International Conference on Image Processing.

[35]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[36]  Alireza Jolfaei,et al.  A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.

[37]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[38]  Nidal Nasser,et al.  Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks , 2008, Secur. Commun. Networks.

[39]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[40]  Svetha Venkatesh,et al.  Dynamic privacy assessment in a smart house environment using multimodal sensing , 2008, TOMCCAP.

[41]  Nicu Sebe,et al.  Special section from the ACM multimedia conference 2007 , 2008, TOMCCAP.

[42]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.