Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management

Video traffic monitoring is an inexpensive and convenient source of traffic data. Traffic images processing are widely used to check traffic conditions and they can determine traffic control strategies in intelligent transportation systems (ITS). However, these traffic images always contain privacy-related data, such as vehicles registration numbers, human faces. Misuse of such data is a threat to the privacy of vehicles divers, passengers, pedestrians, etc. This paper proposes a thresholds-based images extraction solution for ITS. At first, a Faster Region Convolutional Neural Networks (RCNN) model is used to segment a traffic image into multi-regions with different importance levels; then, multi-threshold image extraction schemes are designed based on progressive secret image sharing schemes to extract images contain key traffic information, such as reg number, human faces, in which the region with higher importance level requires higher threshold for extraction. For different roles in ITS, they can extract images with different details, which can protect privacy and anonymity. The proposed methods provide a safe and intelligent way to extract images that can be used for further analysis in ITS.

[1]  Jun Li,et al.  Enabling Multi-Carrier Relay Selection by Sensing Fusion and Cascaded ANN for Intelligent Vehicular Communications , 2020 .

[2]  Ali Kashif Bashir,et al.  Performance Limits of Visible Light-Based Positioning for Internet-of-Vehicles: Time-Domain Localization Cooperation Gain , 2020, IEEE Transactions on Intelligent Transportation Systems.

[3]  Sherali Zeadally,et al.  Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives , 2020, IEEE Internet of Things Journal.

[4]  Andreas Hegyi,et al.  An Extended Linear Quadratic Model Predictive Control Approach for Multi-Destination Urban Traffic Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.

[5]  Baigen Cai,et al.  A Fault-Tolerant Tightly Coupled GNSS/INS/OVS Integration Vehicle Navigation System Based on an FDP Algorithm , 2019, IEEE Transactions on Vehicular Technology.

[6]  Gang Qu,et al.  A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.

[7]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.

[8]  Xiaobo Lu,et al.  Optimal Type-2 Fuzzy System For Arterial Traffic Signal Control , 2018, IEEE Transactions on Intelligent Transportation Systems.

[9]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD , 2018, J. Vis. Commun. Image Represent..

[10]  Jiwon Seo,et al.  Novel Multichain-Based Loran Positioning Algorithm for Resilient Navigation , 2018, IEEE Transactions on Aerospace and Electronic Systems.

[11]  Hong Zhong,et al.  Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network , 2018, IEEE Internet of Things Journal.

[12]  Lingli Yu,et al.  A Path Planning and Navigation Control System Design for Driverless Electric Bus , 2018, IEEE Access.

[13]  Seung-Woo Seo,et al.  Autonomous Campus Mobility Services Using Driverless Taxi , 2017, IEEE Transactions on Intelligent Transportation Systems.

[14]  Mingchu Li,et al.  Secret Image Sharing Scheme with Threshold Changeable Capability , 2016 .

[15]  Chun-Yi Su,et al.  Robust Relative Navigation by Integration of ICP and Adaptive Kalman Filter Using Laser Scanner and IMU , 2016, IEEE/ASME Transactions on Mechatronics.

[16]  Ching-Nung Yang,et al.  Reducing shadow size in smooth scalable secret image sharing , 2014, Secur. Commun. Networks.

[17]  Shyong Jian Shyu,et al.  General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..

[19]  Shyong Jian Shyu,et al.  Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[21]  Ching-Nung Yang,et al.  A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..

[22]  Xuelong Li,et al.  Vehicle Detection and Motion Analysis in Low-Altitude Airborne Video Under Urban Environment , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Ching-Nung Yang,et al.  A general multi-secret visual cryptography scheme , 2010 .

[24]  Ching-Nung Yang,et al.  Constructions and properties of k out of n scalable secret image sharing , 2010 .

[25]  Ran-Zan Wang,et al.  Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.

[26]  Guoqing Zhou,et al.  Foreword to the Special Issue on Unmanned Airborne Vehicle (UAV) Sensing Systems for Earth Observations , 2009, IEEE Trans. Geosci. Remote. Sens..

[27]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[28]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[29]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[30]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.