Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Video Data Hiding for Managing Privacy Information in Surveillance Systems

Published: 01 December 2009 Publication History

Abstract

From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred, or re-rendered. Such video modifications, however, destroy the authenticity of the surveillance video. We propose a new rate-distortion-based compression-domain video data hiding algorithm for the purpose of storing that privacy information. Using this algorithm, we can safeguard the original video as we can reverse the modification process if proper authorization can be established. The proposed data hiding algorithm embeds the privacy information in optimal locations that minimize the perceptual distortion and bandwidth expansion due to the embedding of privacy data in the compressed domain. Both reversible and irreversible embedding techniques are considered within the proposed framework and extensive experiments are performed to demonstrate the effectiveness of the techniques.

References

[1]
Wickramasuriya J, Datt M, Mehrotra S, Venkatasubramanian N: Privacy protecting data collection in media spaces. Proceedings of the 12th ACM International Conference on Multimedia, October 2004, New York, NY, USA 48-55.
[2]
Berger AM: Privacy mode for acquisition cameras and camcorders. US patent 6067399, Sony Corporation, May 2000
[3]
Wada J, Kaiyama K, Ikoma K, Kogane H: Monitor camera system and method of displaying picture from monitor camera thereof. European patent, EP 1081955 A2, Matsushita Electric Industrial, April 2001
[4]
Schiff J, Meingast M, Mulligan D, Sastry S, Goldberg K: Respectful cameras: detecting visual markers in real-time to address privacy concerns. Proceedings of the IEEE International Conference on Intelligent Robots and Systems (IROS '07), April 2007, Beijing, China 971-978.
[5]
Chen D, Chang Y, Yan R, Yang J: Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Advances in Signal Processing 2007, 2007:-9.
[6]
Newton EM, Sweeney L, Main B: Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering 2005, 17(2):232-243. 10.1109/TKDE.2005.32
[7]
Wactlar H, Stevens S, Ng T: Enabling personal privacy protection preferences in collaborative video observation. NSF Award Abstract 0534625, http://www.nsf.gov/awardsearch/showAward.do
[8]
Senior A, Pankanti S, Hampapur A, Brown L, Tian Y-L, Ekin A: Blinkering surveillance: enabling video privacy through computer vision. Security and Privacy 2005, 3: 50-57. 10.1109/MSP.2005.65
[9]
Cheung S-C, Paruchuri JK, Nguyen T: Managing privacy data in pervasive camera networks. Proceedings of the 15th IEEE International Conference on Image Processing (ICIP '08), October 2008, San Diego, Calif, USA
[10]
Boult TE: Pico: privacy through invertible cryptographic obscuration. In Proceedings of the Computer Vision for Interactive and Intelligent Environments, November 2005, The Dr. Bradley D. Carter Workshop Series Edited by: Bradley DC. 27-38.
[11]
Dufaux F, Ebrahimi T: Scrambling for video surveillance with privacy. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop (CVPRW '06), June 2006, New York, NY, USA 160.
[12]
Yu X, Babaguchi N: Privacy preserving: hiding a face in a face. Proceedings of the 8th Asian Conference on Computer Vision (ACCV '07), November 2007, Tokyo, Japan, Lecture Notes in Computer Science 4844: 651-661.
[13]
Cheung S-C, Zhao J, Venkatesh MV: Efficient object-based video inpainting. Proceedings of the IEEE International Conference on Image Processing (ICIP '06), October 2006, Atlanta, Ga, USA 705-708.
[14]
Venkatesh MV, Cheung S-C, Zhao J: Efficient object based video inpainting. Pattern Recognition Letters 2009, 30(2):168-179. 10.1016/j.patrec.2008.03.011
[15]
Martin K, Plataniotis KN: Privacy protected surveillance using secure visual object coding. IEEE Transactions on Circuits and Systems for Video Technology 2008, 18: 1152-1162. 10.1109/TCSVT.2008.927110
[16]
Zhang W, Cheung S-C, Chen M: Hiding privacy information in video surveillance system. Proceedings of the 12th IEEE International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy
[17]
Yu X, Babaguchi N: Hiding a Face in a Face, Lecture Notes in Computer Science. Volume 4844. Springer, Heidelberg, Berlin; 2007.
[18]
Li G, Ito Y, Yu X, Nitta N, Babaguchi N: A discrete wavelet transform based recoverable image processing for privacy protection. Proceedings of the International Conference on Image Processing (ICIP '08), 2008 1372-1375.
[19]
Paruchuri JK, Cheung S-C: Joint optimization of data hiding and video compression. Proceedings of the IEEE International Symposium on Circuists and Systems (ISCAS '08), May 2008, Washington, DC, USA
[20]
Meuel P, Chaumont M, Puech W: Data hiding in h.264 video for lossless reconstruction of region of interest. In Proceedings of the 15th European Signal Processing Conference (EUSIPCO '07), September 2007, Poznan, Poland. HAL--CCSD; 120-124.
[21]
Cox I, Miller M, Bloom J: Digital Watermarking. Morgan Kaufmann, San Fransisco, Calif, USA; 2002.
[22]
Cox I, Kilian J, Leighton T, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673-1687. 10.1109/83.650120
[23]
Chen B, Wornell GW: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. Proceedings of the IEEE International Symposium on Information Theory (ISIT '00), June 2000, Sorrento, Italy
[24]
Solanki K, Jacobsen N, Chandrasekaran S, Madhow U, Manjunath B: High-volume data hiding in images: introducing perceptual criteria into quantization based embedding. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '02), May 2002, Orlando, Fla, USA 4: 3485-3488.
[25]
Sur A, Mukherjee J: Adaptive data hiding in compressed video domain. Proceedings of the Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP '06), 2006 738-748.
[26]
Celik MU, Sharma G, Tekalp AM, Saber E: Lossless generalized-lsb data embedding. IEEE Transactions on Image Processing 2005, 14(2):253-266. 10.1109/TIP.2004.840686
[27]
Goljan M, Fridrich J, Du R: Distortion-free data embedding for images. Proceedings of the 4th International Workshop on Information Hiding, 2001, Pittsburgh, Pa, USA 27-41.
[28]
Alattar AM: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 2004, 13(8):1147-1156. 10.1109/TIP.2004.828418
[29]
Thodi D, Rodriguez J: Reversible watermarking by prediction-error expansion. Proceedings of the 6th IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI '04), September 2004, Porto, Portugal 6: 21-25.
[30]
Chang CC, Tai WL, Lin MH: A reversible data hiding scheme with modified side match vector quantization. Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA '05), March 2005, Taipei, Taiwan 1: 947-952.
[31]
Cheung S-C, Venkatesh MV, Paruchuri JK, Zhao J, Nguyen T: Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance. Springer, New York, NY, USA; 2009.
[32]
Video Coding for Low Bitrate Communication Version 2, ITU-T Recommendation H.263 Version 2, 1998
[33]
Watson A: Dct quantization matrices optimized for individual images. Human Vision, Visual Processing, and Digital Display IV, October 1993, Proceedings of SPIE 1913: 202-216.
[34]
Seshadrinathan K, Bovik AC: A structural similarity metric for video based on motion models. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), May 2007, Honolulu, Hawaii, USA 1: 869-872.
[35]
Shoham Y, Gersho A: Efficient bit allocation for an arbitrary set of quantizers. IEEE Transactions on Acoustics, Speech, and Signal Processing 1988, 36(9):1445-1453. 10.1109/29.90373
[36]
Bellman R: On the theory of dynamic programming. Proceedings of the National Academy of Sciences 1952, 38(8):716-719. 10.1073/pnas.38.8.716
[37]
Patwardhan KA, Sapiro G, Bertalmio M: Video inpainting under constrained camera motion. IEEE Transactions on Image Processing 2007, 16(2):545-553. 10.1109/TIP.2006.888343

Cited By

View all
  • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
  • (2015)Visual privacy protection methodsExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.01.04142:9(4177-4195)Online publication date: 1-Jun-2015
  • (2014)World-Driven Access Control for Continuous SensingProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660319(1169-1181)Online publication date: 3-Nov-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image EURASIP Journal on Information Security
EURASIP Journal on Information Security  Volume 2009, Issue 1
December 2009
173 pages
ISSN:1687-4161
EISSN:1687-417X
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 01 December 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Visual Content Privacy Protection: A SurveyACM Computing Surveys10.1145/3708501Online publication date: 16-Dec-2024
  • (2015)Visual privacy protection methodsExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.01.04142:9(4177-4195)Online publication date: 1-Jun-2015
  • (2014)World-Driven Access Control for Continuous SensingProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660319(1169-1181)Online publication date: 3-Nov-2014
  • (2012)Adaptive transformation for robust privacy protection in video surveillanceAdvances in Multimedia10.1155/2012/6396492012(4-4)Online publication date: 1-Jan-2012

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media