Algebraic properties of cryptosystem PGM
Journal of Cryptology
Random Permutations from Logarithmic Signatures
Proceedings of the The First Great Lakes Computer Science Conference on Computing in the 90's
Enabling Video Privacy through Computer Vision
IEEE Security and Privacy
PICO: Privacy through Invertible Cryptographic Obscuration
CVIIE '05 Proceedings of the Computer Vision for Interactive and Intelligent Environment
Tools for protecting the privacy of specific individuals in video
EURASIP Journal on Applied Signal Processing
Privacy Protected Surveillance Using Secure Visual Object Coding
IEEE Transactions on Circuits and Systems for Video Technology
Scrambling for Privacy Protection in Video Surveillance Systems
IEEE Transactions on Circuits and Systems for Video Technology
Contribution of non-scrambled chroma information in privacy-protected face images to privacy leakage
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting regions that reveal identity (e.g., faces or vehicle tags) are necessary to preserve individuals' right to privacy while recognizing the legitimate needs for video surveillance. The video used in surveillance applications usually needs to be transcoded or recoded for distribution and archival. Transcoding a traditionally encrypted video is not possible without decrypting the video first. This paper presents a compression algorithm independent solution that provides privacy in video surveillance applications. The proposed approach uses permutation-based encryption in the pixel domain to hide identity revealing features. The permutation-based encryption tolerates lossy compression and transcoding and allows decryption of the transcoded video at a later time. The use of permutation-based encryption makes the proposed solution independent of the compression algorithms used and robust to transcoding. The cost of providing this privacy is an increase in bitrate that depends on the percentage of blocks encrypted.