A Content Providing System with Privacy Protection

With the development of Internet technology, people can conveniently exchange and share image/video without the limit of time and space. In one image/video, some parts can be open to the public and some cannot or only can be open to specific people because of privacy issue. How to protect privacy information in the image/video has become more and more important. This paper proposes a content (image/video) providing system with privacy protection, which is supposed to make the most of the data and provide varying degrees of privacy/security. We apply fuzzy homomorphic encryption to protect privacy-sensitive area and realize hierarchical access to the data based on Chinese Remainder Theorem. Finally, we conduct the simulation experiments and evaluate the system feasibility.

[1]  Noboru Babaguchi,et al.  A discrete wavelet transform based recoverable image processing for privacy protection , 2008, 2008 15th IEEE International Conference on Image Processing.

[2]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[3]  HoonJae Lee,et al.  Mutual Autonomy LFSR Output-Based Cellular Automata (MALO-CA) , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[4]  Noboru Babaguchi,et al.  Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.

[5]  Young Shik Moon,et al.  Face Extraction Method Using Edge Orientation and Face Geometric Features , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[6]  A. M. Burton,et al.  100% Accuracy in Automatic Face Recognition , 2008, Science.

[7]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[8]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[9]  Norihiro Hagita,et al.  Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Zhang Jin,et al.  Hierarchical access control for secure group communication , 2006, 2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design.

[12]  Yu-Fang Chung,et al.  Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm , 2002, Comput. Secur..

[13]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[15]  Liu Gang Hierarchical Access Control for Secure Group Communication , 2004 .

[16]  Toshihisa Tanaka,et al.  A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects , 2005, PCM.