Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

VPP_AHA: Visual Privacy Protection via Adaptive Histogram Adjustment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel visual privacy protection (VPP) algorithm is proposed for camouflage of the visual identifiers in digital images. The challenge is to suffice the de-identification with a different look. This issue has been previously addressed by two classes of algorithms, i.e. modifying target features with or without a reference. The former ran well by finding a surrogate from randomized hybrid features between the target and the reference, and the latter made it by blurring or hiding the details of the region. Inspired by camouflage in animals for self-concealment, this paper presents a simple and efficient algorithm that imitates such behavior via adaptive histogram shift adjustment without a reference. The image is first blurred and segmented into several flat surfaces, then adaptively re-joined or split by shifts randomly chosen to produce the de-identified output. It is found that the success of the surface-based feature redaction depends on the shift diversity, the saliency, and coverage of the surfaces segmented, which are used as adjusting parameters for the camouflage. Extensive examples of real and synthetic images have demonstrated that our results compare favorably to those obtained by existing VPP methods, with required security, robustness, and selective reversibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. AMP Lab, Cornell personal tag preferences dataset, http://chenlab.ece.cornell.edu/downloads.html. Accessed 29-30 Dec 2020

  2. AMP Lab, Cornell multiview dataset, http://chenlab.ece.cornell.edu/downloads.html. Accessed 29-30 Dec 2020

  3. Boult TE (2005) PICO: Privacy through Invertible Cryptographic Obscuration. Proc. Comp. Vision for Interactive and Intelli. Environment (CVIIE'05), Lexington, KY, USA, pp. 27-38 https://doi.org/10.1109/CVIIE.2005.16

  4. Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for WOA data-hiding. IEEE Trans Inf Forensics Secur 3(1):1–15. https://doi.org/10.1109/TIFS.2007.916006

    Article  Google Scholar 

  5. Chinomi K, Nitta N, Ito Y, Babaguchi N (2008) PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. In Proc. of the 14th Intl. Conference on Advances in Multimedia Modeling. MMM’08, Springer. 144–154

  6. Çiftçi S, Akyüz AO, Ebrahimi T (2018) A Reliable and Reversible Image Privacy Protection Based on False Colors. IEEE Trans Multimedia 20(1):68–81

    Article  Google Scholar 

  7. Cott HB (1940) Adaptive Coloration in Animals. Methuen, London

    Google Scholar 

  8. Criminisi A, Pérez P, Toyama K (2004) Region filling and object removal by exemplar-based image inpainting. IEEE Trans Image Process 13(9):1200–1212

    Article  Google Scholar 

  9. Dale K, Sunkavalli K, Johnson M, Vlasic D, Matusik W, Pfister H (2011) Video Face Replacement. ACM Trans Graph 30(6):1–10

    Article  Google Scholar 

  10. Driessen B, Dürmuth M Achieving Anonymity against Major Face Recognition Algorithms. In: Proc. B. Decker, J. Dittmann, C. Kraetzer, C. Vielhauer (eds) Communications and Multimedia Security(CMS 2013). Lecture Notes in Comp. Sci., vol 8099. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-40779-6_2

  11. Dufaux F, Ebrahimi T (2008) Scrambling for privacy protection in video surveillance systems. IEEE Trans Circ Syst Video Technol 18(8):1168–1174. https://doi.org/10.1109/TCSVT.2008.928225

    Article  Google Scholar 

  12. Fan L (2018) “Image Pixelization with Differential Privacy”. In: F. Kerschbaum, S. Paraboschi (eds.) Data and Applications Security and Privacy XXXII. DBSec 2018. Lecture Notes in Computer Science, vol. 10980. Springer, Cham. https://doi.org/10.1007/978-3-319-95729-6_10

  13. Farrugia R (2014) Reversible De-Identification for lossless image compression using Reversible Watermarking. 37th Int’l Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, pp. 1258–1263. https://doi.org/10.1109/MIPRO.2014.6859760

  14. Fleck S, Straßer W (2008) Smart Camera Based Monitoring System and its Application to Assisted Living. Proc IEEE 96(10):1698–1714

    Article  Google Scholar 

  15. Gafni O, Wolf L, Taigman Y (2019) Live Face De-Identification in Video. arXiv:1911.08348v1

  16. Georgia Tech face database, face images available in: http://www.anefian.com/research/face_reco.htm. Accessed 29-30 Dec 2020

  17. GI4E database, http://www.unavarra.es/gi4e/databases/gi4e/. Accessed 29-30 Dec 2020

  18. Gross R, Airoldi E, Malin B, Sweeney L “Integrating Utility into Face De-identification,” In: G. Danezis, D. Martin (eds) Privacy Enhancing Technologies (PET2005), Lecture Notes in Computer Science, vol 3856, Springer, Berlin, Heidelberg https://doi.org/10.1007/11767831_15

  19. Hari B Robust Face Recognition via Sparse Representation –Implementation https://www.mathworks.com/matlabcentral/fileexchange/30893-robust-face-recognition-via-sparse-representation-implementation . Accessed 29-30 Dec 2020

  20. Jourabloo A, Yin X, Liu X (2015) Attribute Preserved Face De-identification. International Conference on Biometrics (ICB) 2015:278–285. https://doi.org/10.1109/ICB.2015.7139096

    Article  Google Scholar 

  21. Kanizsa G (1979) Organization in Vision: Essays on Gestalt Perception. Praeger, New York. https://psychology.fandom.com/wiki/Kanizsa_triangle. Accessed 29-30 Dec 2020

  22. Korshunov P, Ebrahimi T (2013) Using warping for privacy protection in video surveillance. Proc. 18th Int’l Conference on Digital Signal Processing (DSP’13), Santorini, Greece

  23. Korshunov P, Ebrahimi T (2013) Using face morphing to protect privacy. 10th IEEE International Conference on Advanced Video and Signal-Based Surveillance 2013:208-213. https://doi.org/10.1109/AVSS.2013.6636641

  24. Laurentini A (1994) The visual hull concept for silhouette-based image understanding. IEEE Trans Pattern Anal Mach Intell 16(2):150–162. https://doi.org/10.1109/34.273735

    Article  Google Scholar 

  25. Letournel G, Bugeau A, Ta V-T, Domenger J-P (2015) Face de-identification with expression preservation. IEEE International Conference on Image Processing (ICIP) 2015:4366–4370. https://doi.org/10.1109/ICIP.2015.7351631

    Article  Google Scholar 

  26. LFW database, http://vis-www.cs.umass.edu/index.html. Accessed 29-30 Dec 2021

  27. Li X, Li D, Yang Z, Chen W (2017) A Patch-Based Saliency Detection Method for Assessing the Visual Privacy Levels of Objects in Photos. IEEE Access 5:24332–24343

    Article  Google Scholar 

  28. Li Y, Lyu S (2019) De-identification without losing faces. arXiv:1902.04202v1

  29. Matías Di Martino J, Facciolo G, Meinhardt-Llopis E (2016) Poisson Image Editing. Image Process On Line 6:300–325. https://doi.org/10.5201/ipol.2016.163

    Article  MathSciNet  Google Scholar 

  30. Merilaita S, Scott-Samuel NE, Cuthill IC (2017) How camouflage works. Phil Trans R Soc B 372:20160341. https://doi.org/10.1098/rstb.2016.0341

    Article  Google Scholar 

  31. Mittal A, Moorthy AK, Bovik AC (2012) No-Reference Image Quality Assessment in the Spatial Domain. IEEE Trans Image Process 21(12):4695–4708. https://doi.org/10.1109/TIP.2012.2214050

    Article  MathSciNet  MATH  Google Scholar 

  32. Mittal A, Soundararajan R, Bovik AC (2013) Making a Completely Blind Image Quality Analyzer. IEEE Signal Process Lett 22(3):209–212

    Article  Google Scholar 

  33. Nakashima Y, Ikeno T, Babaguchi N (2016) Evaluating Protection Capability for Visual Privacy Information. IEEE Secur Privacy 14(1):55–61

    Article  Google Scholar 

  34. Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 12(2):232–243

    Article  Google Scholar 

  35. Paruchuri J, Cheung S, Hail M (2009) Video Data Hiding for Managing Privacy Information in Surveillance Systems. EURASIP J Inf Secur 236139 https://doi.org/10.1155/2009/236139

  36. Padilla-López JR, Chaaraoui AA, Flórez-Revuelta F (2015) Visual privacy protection methods: A survey. Expert Syst Applic 42(9):4177–4195

    Article  Google Scholar 

  37. Padilla-López JR, Chaaraoui AA, Gu F, Flóorez-Revuelta F (2015) Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15(6):12959–12982

    Article  Google Scholar 

  38. Ribaric S, Ariyaeeinia A, Pavesic N (2016) De-identification for privacy protection in multimedia content: A survey. Signal Process Image Commun 47:131–151

    Article  Google Scholar 

  39. Saini MK, Atrey PK, Mehrotra S, Kankanhalli MS (2013) Privacy-aware publication of surveillance video. Int J Trust Manag Comput Commun 1(1):23–51

    Article  Google Scholar 

  40. Saini M, Atrey PK, Mehrotra S, Emmanuel S, Kankanhalli M (2010) Privacy modeling for video data publication. IEEE International Conference on Multimedia and Expo, Suntec City, pp. 60–65. https://doi.org/10.1109/ICME.2010.5583334

  41. The ORL Database, https://cam-orl.co.uk/facedatabase.html. Accessed 29-30 Dec 2020

  42. Waltemate T, Gall D, Roth D, Botsch M, Latoschik ME (2018) The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response. IEEE Trans Vis Comput Graph 24(4):1643–1652. https://doi.org/10.1109/TVCG.2018.2794629

    Article  Google Scholar 

  43. Winkler G (1995) Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A mathematical introduction. Springer-Verlag

  44. Venkatanath N, Praneeth D, Chandrasekhar BhM, Channappayya SS, Medasani SS (2015) Blind image quality evaluation using perception based features. Twenty First National Conference on Communications (NCC) 2015:1–6. https://doi.org/10.1109/NCC.2015.7084843

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Yao.

Ethics declarations

Conclusion and future work

This paper has presented a novel visual privacy protection algorithm for de-identifying the visual objects in a digital image. The result of the object de-identification is an image in which the visual objects have been modified to bear a different look in a way that imitates the animal’s coloration adaptation process by randomly merging and separating the nearby surfaces using adaptive local histogram shift.

Our approach exploits the blurring techniques to segment the image into several visually ‘flat surfaces” after specifying the coverage, surface saliency, and shift diversity requirements of the visual objects. The same number of randomly generated shifts, big or small, is assigned to each of the “flat surfaces”, decides if the neighboring surfaces are merged or separated according to the conditions of similar or disruptive coloration in animals.

The technique is capable of not only merging nearby surfaces into one larger surface with details of lower or higher contrast but also separating nearby surfaces of visual resemblance into several visually different surfaces, which changes the visual objects into a different appearance. Comparative experiments show that a careful selection of the blurring parameters and the diversity constraints is necessary and sufficient to handle this task.

Our method performs almost as well as previous techniques for facial de-identification and in instances in which all visual identifiers are de-identified, as an ad hoc algorithm without references, it outperforms earlier work in terms of security, robustness, intelligibility, and reversibility.

Currently, we are investigating extensions for a smooth color shift in real color still images and for motion camouflage of visual objects from video, which promise to impose a new set of challenges.

Conflicts of interest /Competing interests

The authors have no relevant financial or non-financial interests to disclose, and no funding was received for conducting this study.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, X. VPP_AHA: Visual Privacy Protection via Adaptive Histogram Adjustment. Multimed Tools Appl 81, 6277–6303 (2022). https://doi.org/10.1007/s11042-021-11749-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11749-4

Keywords

Navigation