Private Video Foreground Extraction Through Chaotic Mapping Based Encryption in the Cloud

Recently, storage and processing large-scale visual media data are being outsourced to Cloud Data Centres CDCs. However, the CDCs are always third party entities. Thus the privacy of the users' visual media data may be leaked to the public or unauthorized parties. In this paper we propose a method of privacy preserving foreground extraction of video surveillance through chaotic mapping based encryption in the cloud. The client captures surveillance videos, which are then encrypted by our proposed chaotic mapping based encryption method. The encrypted surveillance videos are transmitted to the cloud server, in which the foreground extraction algorithm is running on the encrypted videos. The results are transmitted back to the client, in which the extraction results are decrypted to get the extraction results in plain videos. The extraction correctness in the encryption videos is similar as that in the plain videos. The proposed method has several advantages: 1 The server only learns the obfuscated extraction results and can not recognize anything from the results. 2 Based on our encryption method, the original extraction method in the plain videos need not be changed. 3 The chaotic mapping ensure high level security and the ability to resistant several attacks.

[1]  Xin Jin,et al.  An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping , 2015, 2015 Chinese Automation Congress (CAC).

[2]  Xin Jin,et al.  An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map , 2015 .

[3]  Yan Liu,et al.  Color Image Encryption in CIE L*a*b* Space , 2015 .

[4]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Xin Jin,et al.  Privacy Preserving Face Identification in the Cloud through Sparse Representation , 2015, CCBR.

[7]  Fatih Murat Porikli,et al.  CDnet 2014: An Expanded Change Detection Benchmark Dataset , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[8]  Winston H. Hsu,et al.  Real-time privacy-preserving moving object detection in the cloud , 2013, ACM Multimedia.

[9]  W. Eric L. Grimson,et al.  Adaptive background mixture models for real-time tracking , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[10]  Lequan Min,et al.  Chaos-based image encryption scheme combining DNA coding and entropy , 2015, Multimedia Tools and Applications.

[11]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[12]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .