Privacy Protection in Video Surveillance Systems Using Scalable Video Coding
AVSS '09 Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Proceedings of the nineth ACM workshop on Digital rights management
Privacy protection in social media networks a dream that can come true?
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Compression independent reversible encryption for privacy in video surveillance
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Privacy preserving video surveillance using pedestrian tracking mechanism
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Video data hiding for managing privacy information in surveillance systems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Journal of Real-Time Image Processing
Chaos-based partial encryption of SPIHT coded color images
Signal Processing
Fast encryption of JPEG 2000 images in wireless multimedia sensor networks
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
This paper presents the Secure Shape and Texture SPIHT (SecST-SPIHT) scheme for secure coding of arbitrarily shaped visual objects. The scheme can be employed in a privacy protected surveillance system, whereby visual objects are encrypted so that the content is only available to authorized personnel with the correct decryption key. The secure visual object coder employs shape and texture set partitioning in hierarchical trees (ST-SPIHT) along with a novel selective encryption scheme for efficient, secure storage and transmission of visual object shape and textures. The encryption is performed in the compressed domain and does not affect the rate-distortion performance of the coder. A separate parameter for each encrypted object controls the strength of the encryption versus required processing overhead. Security analyses are provided, demonstrating the confidentiality of both the encrypted and unencrypted portions of the secured output bit-stream, effectively securing the entire object shape and texture content. Experimental results showed that no object details are revealed to attackers who do not possess the correct decryption key. Using typical parameter values and output bit-rates, the SecST-SPIHT coder is shown to require encryption on less than 5% of the output bit-stream, a significant reduction in computational overhead compared to “whole content” encryption schemes.