Abstract
Visual privacy protection (VPP) is to protect individual’s privacy information in digital images or videos against being seen, such as portrait etc. Once being protected, the privacy may be imperceptible. Forensics of visual privacy protection is becoming a new challenge. As a main visual privacy protection technology, blur operation is always used in VPP. When using the existing approaches such as blur segmentation to detect the images, natural blur or other solid color regions will be falsely alarmed, resulting in low precision. In this paper, we present a novel metric invisibility degree (IvD) to measure the privacy protected blur degree of each pixel. The proposed IvD is defined by calculating the similarity between the test image and the re-blurred image in joint transformation and spatial domain, which could significantly enhance the difference between the privacy protected blur region and the other regions. Then, an effective method based on IvD is developed to automatically forensic and localize the visual privacy protection regions. Firstly, the IvD in block DCT domain of each pixel is calculated, and a IvD map is obtained. Secondly, using the IvD map, the test image is segmented and followed by morphological operation to decrease the mis-alarm regions. Finally, a spatial texture feature descriptor, including gray statistics, smoothness and information capacity, is developed, based on which the detection result is further refined. Experimental results show that the proposed method can detect the privacy regions accurately.
Similar content being viewed by others
References
Avidan S, Butman M (2006) Blind vision. Lecture notes in computer science: 1–13
Bao L, Zhou Y (2015) Image encryption: Generating visually meaningful encrypted images. Inf Sci 324:197–207
Barni M, Bianchi T, Catalano D, Raimondo MD, Labati RD, Failla P, Fiore D, Lazzeretti R, Piuri V, Scotti F (2010) Privacy-preserving fingercode authentication. In: ACM workshop on multimedia and security, pp 231-240. New York, USA
Business insider. https://www.businessinsider.com/seattle-bar-bans-google-glass-2013-3. [Online]
Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Foren Sec 9(3):515–525
Chaaraoui AA, Climent-Pérez P, Flórez-Revuelta F (2012) A review on vision techniques applied to human behaviour analysis for ambient-assisted living. Expert Syst Appl 39(12):10873–10888
Chaaraoui AA, Climent-Pérez P, Flórez-Revuelta F (2012) An efficient approach for multi-view human action recognition based on Bag-Of-Key-Poses. Springer, Berlin. https://doi.org/10.1007/978-3-642-34014-7_3
Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Continua 55(2):201–211
Chen B, Wu X, Lu W, Ren H (2019) Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism. Signal Process 164:48–57. https://doi.org/10.1016/j.sigpro.2019.05.036
Cheung SCS, Paruchuri JK, Nguyen TP (2008) Managing privacy data in pervasive camera networks. In: IEEE International conference on image processing, pp 1676–1679
Cho S, Lee S (2009) Fast motion deblurring. ACM Transactions On Graphics 28(5):1–8
Crete F, Nicolas M (2007) The blur effect: perception and estimation with a new no-reference perceptual blur metric. Proceedings of SPIE - The International Society for Optical Engineering 12:64920I-64920I-11
Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: Privacy enhancing technologies, pp 235–253. Seattle, USA
Frome A, Cheung G, Abdulkader A, Zennaro M (2009) Large-scale privacy protection in google street view. In: IEEE International conference on computer vision, pp 2373–2380
Hu S, Wang Q, Wang J, Qin Z, Ren K (2016) Secsift: Privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans Image Process 25(7):3411–3425
Hu X, Zhang W, Hu H, Yu N (2014) Non-local denoising in encrypted images. In: International conference on internet of vehicles, pp 386–395. Beijing, China
Hua Z, Zhou Y, Pun C, Chen CLP (2015) 2d sine logistic modulation map for image encryption. Inf Sci 297:80–94
Huang X, Liu Z, Lu W, Liu H, Xiang S (2019) Fast and effective copy-move detection of digital audio based on auto segment. International Journal of Digital Crime and Forensics (IJDCF) 11(2):47–62
Javaran TA, Hassanpour H, Abolghasemi V (2015) Automatic estimation and segmentation of partial blur in natural images. Visual Comput 33:1–11
Kitahara I, Kogure K, Hagita N (2004) Stealth vision for protecting privacy. In: International conference on pattern recognition, vol 4, pp 404–407
Li J, Lu W (2016) Blind image motion deblurring with l0-regularized priors. J Vis Commun Image Represent 40:14–23
Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20 (12):3524–3533
Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2009) Recoverable privacy protection for video content distribution. Eurasip J Info Sec 2009(1):4
Li J, Fan Y, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimedia Tools and Applications: 1–15
Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22 (6):2181–2191
Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Foren Sec 8(7):1091–1100
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications 76(20):20739–20753
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimedia Tools and Applications: 1–18
Lin C, Lu W, Huang X, Liu K, Sun W, Lin H, Tan Z (2018) Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications: 1–16
Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimedia Tools and Applications: 1–18
Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools and Applications: 1–25
Lin WS, Tjoa SK, Zhao HV, Liu KJR (2009) Digital image source coder forensics via intrinsic fingerprints. IEEE Trans Inf Foren Sec 4(3):460–475
Liu Z, Lu W (2017) Fast copy-move detection of digital audio. In: 2017 IEEE Second international conference on data science in cyberspace (DSC). IEEE, pp 625–629
Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2018) Scaling factor estimation on jpeg compressed images by cyclostationarity analysis. Multimedia Tools and Applications: 1–18
Liu J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimedia Tools and Applications 77(2):1–16
Liu X, Lu W, Liu W, Luo S, Liang Y, Li M (2019) Image deblocking detection based on a convolutional neural network. IEEE Access 7:26432–26439
Liu J, Lu W, Zhan Y, Chen J, Xu Z, Li R (2019) Efficient binary image steganalysis based on ensemble neural network of multi-module. J Real-Time Image Process. https://doi.org/10.1007/s11554-019-00885-8
Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-jpeg compressed images. IEEE Trans Circuits Syst Video Technol PP(99):1–1
Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circuits Syst Video Technol: 1–1. https://doi.org/10.1109/TCSVT.2018.2852702
Lu W, Li R, Zeng L, Chen J, Huang J, Shi YQ (2019) Binary image steganalysis based on histogram of structuring elements. IEEE Trans Circuits Syst Video Technol: 1–1. https://doi.org/10.1109/TCSVT.2019.2936028
Lu W, Xue Y, Yeung Y, Liu H, Huang J, Shi YQ (2019) Secure halftone image steganography based on pixel density transition. IEEE Transactions on Dependable and Secure Computing: 1–1. https://doi.org/10.1109/TDSC.2019.2933621
Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools and Applications 75(21):13557–13583
Ma Y, Luo X, Li X, Bao Z, Zhang Y (2019) Selection of rich model steganalysis features based on decision rough set α -positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336–350
Mitskog TF, Ralston RA (2012) Camera blocker for a device with an integrated camera that uses a thin film organic polymer. US Patent App. 13/477,485
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938–1962
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimedia Tools and Applications 76(6):8597–8626
Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. Journal Med Syst 40(5):114
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75(22):14867–14893
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951–960
Neustaedter C, Greenberg S (2003) The design of a context-aware home media space for balancing privacy and awareness. Proc Ubicomp 2864:297–314
Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. ACM Transactions on Computer-Human Interaction (TOCHI) 13(1):1–36
Ng PL, Ang LM, Seng KP (2010) Privacy preserving stereoscopic vision with one-bit transform. In: IEEE International conference on computer science and information technology, pp 70–74
Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021
Padilla-López J. R., Chaaraoui AA, Flórez-Revuelta F. (2015) Visual privacy protection methods: a survey. Expert Syst Appl 42(9):4177–4195
Peter A, Hartmann T, Muller S, Katzenbeisser S (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International workshop on information forensics and security, pp 79–84. Tenerife, Spain
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia 16(5):1486–1491
Qin Z, Yan J, Ren K, Chen CW, Wang C (2014) Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM international conference on multimedia, pp 497–506. New York, USA
Ran X, Farvardin N (1995) A perceptually motivated three-component image model-part i: description of the model. IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society 4(4):401–15
Redacted. https://www.producthunt.com/posts/redacted-for-ios. [Online]
Ren Z, Jae Lee Y, Ryoo MS (2018) Learning to anonymize faces for privacy preserving action detection. In: Proceedings of the european conference on computer vision (ECCV), pp 620–636
Ryoo MS, Rothrock B, Fleming C, Yang HJ (2017) Privacy-preserving human activity recognition from extreme low resolution. National conference on artificial intelligence, pp 4255–4262
Sadeghi AR, Schneider T, Wehrenberg I (2009) Efficient privacy-preserving face recognition. In: International conference on information security and cryptology, pp 229–244. Seoul, Korea
Saghaiannejadesfahani SM, Luo Y, Cheung SS (2013) Privacy protected image denoising with secret shares. In: IEEE International conference on image processing, pp 253-256. Orlando, USA
Shi J, Xu L, Jia J (2014) Discriminative blur detection features. In: IEEE Conference on computer vision and pattern recognition, pp 2965–2972. Columbus, USA
Su B, Lu S, Tan CL (2011) Blurred image region detection and classification. In: International conference on multimedea 2011, pp 1397–1400. Scottsdale, USA
Usage of image file formats for websites. https://w3techs.com/technologies/overview/image_format/all. [Online]
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600
Wang W, Dong J, Tan T (2014) Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans Inf Foren Sec 9(10):1653–1666
Wang R, Lu W, Liu J, Xiang S, Zhao X, Wang J (2018) Digital image splicing detection based on markov features in QDCT and QWT domain. International Journal of Digital Crime and Forensics (IJDCF) 10(4):90–107
Weng S, Zhao Y, Pan JS, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15:721–724
Wu Z, Wang Z, Wang Z, Jin H (2018) Towards privacy-preserving visual recognition via adversarial training: a pilot study. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 606–624
Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J, Xue F, Sun W (2019) Defocus blur detection based on multiscale svd fusion in gradient domain. J Vis Commun Image Represent 59:52–61
Xie Z, Lu W, Liu X, Xue Y, Yeung Y (2018) Copy-move detection of digital audio based on multi-feature decision. J Info Secu Appl 43:37–46
Xue F, Ye Z, Lu W, Liu H, Li B (2017) MSE Period based estimation of first quantization step in double compressed jpeg images. Signal Process Image Commu 57:76–83
Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2018) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc: 1–9
Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83
Yeung Y, Lu W, Xue Y, Huang J, Shi YQ (2019) Secure binary image steganography with distortion measurement based on prediction. IEEE Trans Circuits Syst Video Technol: 1–1. https://doi.org/10.1109/TCSVT.2019.2903432
Yi S, Zhou Y (2019) Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Transactions on Multimedia 21(1):51–64
Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Processing-Image Commun 64:78–88
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Zhang L, Liu K, Li XY, Feng P, Liu C, Liu Y (2014) Enable portrait privacy protection in photo capturing and sharing. arXiv:1410.6582
Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on L0-regularization and kernel shape optimization. Multimedia Tools and Applications 2 (2):1–19
Zhang J, Lu W, Yin X, Liu W, Yeung Y (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605
Zhang Q, Lu W, Jian W (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458
Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on Markov features in block dwt domain. Multimedia Tools and Applications 77 (3):1–22
Zhang C, Rui Y, He LW (2006) Light weight background blurring for video conferencing applications. In: IEEE International conference on image processing, pp 481–484
Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111
Zheng P, Huang J (2013) Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans Image Process 22(6):2455–68
Zhou Y, Cao W, Chen CLP (2014) Image encryption using binary bitplane. Signal Process 100:197–207
Acknowledgment
This work is supported by the National Natural Science Foundation of China (No. U1736118), the Key Areas R&D Program of Guangdong (No. 2019B010136002), the Key Scientific Research Program of Guangzhou (No. 201804020068), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), Shanghai Minsheng Science and Technology Support Program (17DZ1205500), Shanghai Sailing Program (17YF1420000), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xue, F., Lu, W., Ren, H. et al. Forensics of visual privacy protection in digital images. Multimed Tools Appl 79, 12427–12445 (2020). https://doi.org/10.1007/s11042-019-08304-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08304-7