Results 1 - 10
of
40
A FRAMEWORK FOR THE VALIDATION OF PRIVACY PROTECTION SOLUTIONS IN VIDEO SURVEILLANCE
"... The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we put forward a framework to assess the capacity of ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
(Show Context)
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we put forward a framework to assess the capacity of privacy protection solutions to hide distinguishing facial information and to conceal identity. We then conduct rigorous experiments to evaluate the performance of face recognition algorithms applied to images altered by privacy protection techniques. Results show the ineffectiveness of naïve privacy protection techniques such as pixelization and blur. Conversely, they demonstrate the effectiveness of more sophisticated scrambling techniques to foil face recognition.
A survey of H.264 AVC/SVC encryption
- IEEE Trans. on Circuits and Systems for Video Technology
, 2012
"... Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
Abstract—Video encryption has been heavily researched in the recent years. This survey summarizes the latest research results on video encryption with a special focus on applicability and on the most widely-deployed video format H.264 including its scalable extension SVC. The survey intends to give researchers and practitioners an analytic and critical overview of the state-of-the-art of video encryption narrowed down to its joint application with the H.264 standard suite and associated protocols (packag-ing / streaming) and processes (transcoding / watermarking). I.
Using Face Morphing to Protect Privacy
"... The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the sys ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
(Show Context)
The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important properties such as security of protected visual data, reversibility (ability to undo privacy protection), simplicity, and independence from the video encoding used. To overcome these shortcomings, in this paper, we propose a morphing-based privacy protection method and focus on its robustness, reversibility, and security properties. We morph faces from a standard FERET dataset and run face detection and recognition algorithms on the resulted images to demonstrate that morphed faces retain the likeness of a face, while making them unrecognizable, which ensures the protection of privacy. Our experiments also demonstrate the influence of morphing strength on robustness and security. We also show how to determine the right parameters of the method. 1.
Overview of the mediaeval 2013 visual privacy task
- In MediaEval 2013 Workshop
"... This paper describes the Visual Privacy Task (VPT) 2013, its scope and objectives, related dataset and evaluation approach. 1. ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
(Show Context)
This paper describes the Visual Privacy Task (VPT) 2013, its scope and objectives, related dataset and evaluation approach. 1.
Recovering missing coefficients in DCT-transformed images
- IN: PROCEEDINGS OF 18TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2011)
, 2011
"... A general method for recovering missing DCT coefficients in DCT-transformed images is presented in this work. We model the DCT coefficients recovery problem as an optimization problem and recover all missing DCT coefficients via linear programming. The visual quality of the recovered image gradually ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in this work. We model the DCT coefficients recovery problem as an optimization problem and recover all missing DCT coefficients via linear programming. The visual quality of the recovered image gradually decreases as the number of missing DCT coefficients increases. For some images, the quality is surprisingly good even when more than 10 most significant DCT coefficients are missing. When only the DC coefficient is missing, the proposed algorithm outperforms existing methods according to experimental results conducted on 200 test images. The proposed recovery method can be used for cryptanalysis of DCT based selective encryption schemes and other applications.
Leveling the Grid
"... Motivated by an application in image processing, we introduce the grid-leveling problem. It turns out to be the dual of a minimum cost flow problem for an apex graph with a grid graph as its basis. We present an O(n 3/2) algorithm for this problem. The optimum solution recovers missing DC coefficien ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Motivated by an application in image processing, we introduce the grid-leveling problem. It turns out to be the dual of a minimum cost flow problem for an apex graph with a grid graph as its basis. We present an O(n 3/2) algorithm for this problem. The optimum solution recovers missing DC coefficients from image and video coding by Discrete Cosine Transform used in popular standards like JPEG and MPEG. Generally, we prove that there is an O(n 3/2) min-cost flow algorithm for networks that, after removing one node, are planar, have bounded degrees, and have bounded capacities. The costs may be arbitrary. 1
Scrambling For Privacy Protection and Its Validation in Video Surveillance Systems
- International Journal of Engineering Science and Advanced Technology
, 2012
"... The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Late ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Later, we discuss pertinent evaluation criteria for effective privacy protection. We then put forward a framework to assess the capacity of PET solutions to hide distinguishing facial information and to conceal identity. Comprehensive and rigorous experiments were conducted to evaluate the performance of face recognition algorithms applied to images altered by PET. Results show the ineffectiveness of PET such as pixelization and blur. Conversely, they demonstrate the effectiveness of more sophisticated scrambling techniques to foil face recognition
A QVGA Vision Sensor with Multi-functional Pixels for Focal-Plane Programmable Obfuscation
"... Privacy awareness constitutes a critical aspect for smart camera networks. An ideal flawless protection of sensitive information would boost their application scenarios. How-ever, it is still far from being achieved. Numerous chal-lenges arise at different levels, from hardware security to subjectiv ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Privacy awareness constitutes a critical aspect for smart camera networks. An ideal flawless protection of sensitive information would boost their application scenarios. How-ever, it is still far from being achieved. Numerous chal-lenges arise at different levels, from hardware security to subjective perception. Generally speaking, it can be stated that the closer to the image sensing device the protection measures take place, the higher the privacy and security at-tainable. Likewise, the integration of heterogeneous camera components becomes simpler since most of them will not require to consider privacy issues. The ultimate objective would be to incorporate complete protection directly into a smart image sensor in such a way that no sensitive data would be delivered off-chip while still permitting the tar-geted video analytics. This paper presents a 320×240-px prototype vision sensor embedding processing capabilities useful for accomplishing this objective. It is based on re-configurable focal-plane sensing-processing that can provide programmable obfuscation. Pixelation of tunable granular-ity can be applied to multiple image regions in parallel. In addition to this functionality, the sensor exploits reconfig-urability to implement other processing primitives, namely block-wise high dynamic range, integral image computation and Gaussian filtering. Its power consumption ranges from 42.6mW for high dynamic range operation to 55.2mW for integral image computation at 30fps. It has been fabricated in a standard 0.18µm CMOS process. Categories and Subject Descriptors Hardware [Very large scale integration design]: Full-custom circuits
Article Focal-Plane Sensing-Processing: A Power-Efficient Approach for the Implementation of Privacy-Aware Networked Visual Sensors
, 2014
"... sensors ..."
(Show Context)
Slice Groups for Post-Compression Region of Interest Encryption in SVC
"... In this paper, we assess the adequacy of slice groups for the reduction of drift which occurs in bit-stream-based region of interest encryption in SVC. For practical surveillance cam-era applications, we introduce the concept of all-grey base layers which simplify the encryption of regions of intere ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
In this paper, we assess the adequacy of slice groups for the reduction of drift which occurs in bit-stream-based region of interest encryption in SVC. For practical surveillance cam-era applications, we introduce the concept of all-grey base layers which simplify the encryption of regions of interest while obeying all standard-imposed base layer restrictions. Furthermore, we show that the use of slice groups is possi-ble with relatively low overhead for most practical config-urations with two or three spatial layers. In addition, we analyze the effect of spatial resolution on overhead, showing that an increase in resolution decreases the relative over-head.