Compression independent object encryption for ensuring privacy in video surveillance

One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting objects that reveal identity (e.g., faces or vehicle tags) is necessary to preserve individualspsila right to privacy. This paper presents a compression algorithm independent solution that provides privacy in video surveillance applications. The proposed approach is based on the use of permutation based encryption to hide identity revealing features. The permutation based encryption tolerates lossy compression and allows decryption at a later time. The use of permutation based encryption makes the proposed solution independent of the compression algorithms used. The paper presents the performance of the system when using H.264 video encoding.

[1]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[2]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[3]  Nasir D. Memon,et al.  Random Permutations from Logarithmic Signatures , 1989, Great Lakes Computer Science Conference.

[4]  Nasir D. Memon,et al.  Algebraic properties of cryptosystem PGM , 1992, Journal of Cryptology.

[5]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[6]  Borko Furht,et al.  New approaches to encryption and steganography for digital videos , 2007, Multimedia Systems.

[7]  Douglas R. Stinson,et al.  New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups , 2001, Journal of Cryptology.