Abstract
A novel visual privacy protection (VPP) algorithm is proposed for camouflage of the visual identifiers in digital images. The challenge is to suffice the de-identification with a different look. This issue has been previously addressed by two classes of algorithms, i.e. modifying target features with or without a reference. The former ran well by finding a surrogate from randomized hybrid features between the target and the reference, and the latter made it by blurring or hiding the details of the region. Inspired by camouflage in animals for self-concealment, this paper presents a simple and efficient algorithm that imitates such behavior via adaptive histogram shift adjustment without a reference. The image is first blurred and segmented into several flat surfaces, then adaptively re-joined or split by shifts randomly chosen to produce the de-identified output. It is found that the success of the surface-based feature redaction depends on the shift diversity, the saliency, and coverage of the surfaces segmented, which are used as adjusting parameters for the camouflage. Extensive examples of real and synthetic images have demonstrated that our results compare favorably to those obtained by existing VPP methods, with required security, robustness, and selective reversibility.
Similar content being viewed by others
References
AMP Lab, Cornell personal tag preferences dataset, http://chenlab.ece.cornell.edu/downloads.html. Accessed 29-30 Dec 2020
AMP Lab, Cornell multiview dataset, http://chenlab.ece.cornell.edu/downloads.html. Accessed 29-30 Dec 2020
Boult TE (2005) PICO: Privacy through Invertible Cryptographic Obscuration. Proc. Comp. Vision for Interactive and Intelli. Environment (CVIIE'05), Lexington, KY, USA, pp. 27-38 https://doi.org/10.1109/CVIIE.2005.16
Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for WOA data-hiding. IEEE Trans Inf Forensics Secur 3(1):1–15. https://doi.org/10.1109/TIFS.2007.916006
Chinomi K, Nitta N, Ito Y, Babaguchi N (2008) PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. In Proc. of the 14th Intl. Conference on Advances in Multimedia Modeling. MMM’08, Springer. 144–154
Çiftçi S, Akyüz AO, Ebrahimi T (2018) A Reliable and Reversible Image Privacy Protection Based on False Colors. IEEE Trans Multimedia 20(1):68–81
Cott HB (1940) Adaptive Coloration in Animals. Methuen, London
Criminisi A, Pérez P, Toyama K (2004) Region filling and object removal by exemplar-based image inpainting. IEEE Trans Image Process 13(9):1200–1212
Dale K, Sunkavalli K, Johnson M, Vlasic D, Matusik W, Pfister H (2011) Video Face Replacement. ACM Trans Graph 30(6):1–10
Driessen B, Dürmuth M Achieving Anonymity against Major Face Recognition Algorithms. In: Proc. B. Decker, J. Dittmann, C. Kraetzer, C. Vielhauer (eds) Communications and Multimedia Security(CMS 2013). Lecture Notes in Comp. Sci., vol 8099. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-40779-6_2
Dufaux F, Ebrahimi T (2008) Scrambling for privacy protection in video surveillance systems. IEEE Trans Circ Syst Video Technol 18(8):1168–1174. https://doi.org/10.1109/TCSVT.2008.928225
Fan L (2018) “Image Pixelization with Differential Privacy”. In: F. Kerschbaum, S. Paraboschi (eds.) Data and Applications Security and Privacy XXXII. DBSec 2018. Lecture Notes in Computer Science, vol. 10980. Springer, Cham. https://doi.org/10.1007/978-3-319-95729-6_10
Farrugia R (2014) Reversible De-Identification for lossless image compression using Reversible Watermarking. 37th Int’l Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, pp. 1258–1263. https://doi.org/10.1109/MIPRO.2014.6859760
Fleck S, Straßer W (2008) Smart Camera Based Monitoring System and its Application to Assisted Living. Proc IEEE 96(10):1698–1714
Gafni O, Wolf L, Taigman Y (2019) Live Face De-Identification in Video. arXiv:1911.08348v1
Georgia Tech face database, face images available in: http://www.anefian.com/research/face_reco.htm. Accessed 29-30 Dec 2020
GI4E database, http://www.unavarra.es/gi4e/databases/gi4e/. Accessed 29-30 Dec 2020
Gross R, Airoldi E, Malin B, Sweeney L “Integrating Utility into Face De-identification,” In: G. Danezis, D. Martin (eds) Privacy Enhancing Technologies (PET2005), Lecture Notes in Computer Science, vol 3856, Springer, Berlin, Heidelberg https://doi.org/10.1007/11767831_15
Hari B Robust Face Recognition via Sparse Representation –Implementation https://www.mathworks.com/matlabcentral/fileexchange/30893-robust-face-recognition-via-sparse-representation-implementation . Accessed 29-30 Dec 2020
Jourabloo A, Yin X, Liu X (2015) Attribute Preserved Face De-identification. International Conference on Biometrics (ICB) 2015:278–285. https://doi.org/10.1109/ICB.2015.7139096
Kanizsa G (1979) Organization in Vision: Essays on Gestalt Perception. Praeger, New York. https://psychology.fandom.com/wiki/Kanizsa_triangle. Accessed 29-30 Dec 2020
Korshunov P, Ebrahimi T (2013) Using warping for privacy protection in video surveillance. Proc. 18th Int’l Conference on Digital Signal Processing (DSP’13), Santorini, Greece
Korshunov P, Ebrahimi T (2013) Using face morphing to protect privacy. 10th IEEE International Conference on Advanced Video and Signal-Based Surveillance 2013:208-213. https://doi.org/10.1109/AVSS.2013.6636641
Laurentini A (1994) The visual hull concept for silhouette-based image understanding. IEEE Trans Pattern Anal Mach Intell 16(2):150–162. https://doi.org/10.1109/34.273735
Letournel G, Bugeau A, Ta V-T, Domenger J-P (2015) Face de-identification with expression preservation. IEEE International Conference on Image Processing (ICIP) 2015:4366–4370. https://doi.org/10.1109/ICIP.2015.7351631
LFW database, http://vis-www.cs.umass.edu/index.html. Accessed 29-30 Dec 2021
Li X, Li D, Yang Z, Chen W (2017) A Patch-Based Saliency Detection Method for Assessing the Visual Privacy Levels of Objects in Photos. IEEE Access 5:24332–24343
Li Y, Lyu S (2019) De-identification without losing faces. arXiv:1902.04202v1
Matías Di Martino J, Facciolo G, Meinhardt-Llopis E (2016) Poisson Image Editing. Image Process On Line 6:300–325. https://doi.org/10.5201/ipol.2016.163
Merilaita S, Scott-Samuel NE, Cuthill IC (2017) How camouflage works. Phil Trans R Soc B 372:20160341. https://doi.org/10.1098/rstb.2016.0341
Mittal A, Moorthy AK, Bovik AC (2012) No-Reference Image Quality Assessment in the Spatial Domain. IEEE Trans Image Process 21(12):4695–4708. https://doi.org/10.1109/TIP.2012.2214050
Mittal A, Soundararajan R, Bovik AC (2013) Making a Completely Blind Image Quality Analyzer. IEEE Signal Process Lett 22(3):209–212
Nakashima Y, Ikeno T, Babaguchi N (2016) Evaluating Protection Capability for Visual Privacy Information. IEEE Secur Privacy 14(1):55–61
Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 12(2):232–243
Paruchuri J, Cheung S, Hail M (2009) Video Data Hiding for Managing Privacy Information in Surveillance Systems. EURASIP J Inf Secur 236139 https://doi.org/10.1155/2009/236139
Padilla-López JR, Chaaraoui AA, Flórez-Revuelta F (2015) Visual privacy protection methods: A survey. Expert Syst Applic 42(9):4177–4195
Padilla-López JR, Chaaraoui AA, Gu F, Flóorez-Revuelta F (2015) Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15(6):12959–12982
Ribaric S, Ariyaeeinia A, Pavesic N (2016) De-identification for privacy protection in multimedia content: A survey. Signal Process Image Commun 47:131–151
Saini MK, Atrey PK, Mehrotra S, Kankanhalli MS (2013) Privacy-aware publication of surveillance video. Int J Trust Manag Comput Commun 1(1):23–51
Saini M, Atrey PK, Mehrotra S, Emmanuel S, Kankanhalli M (2010) Privacy modeling for video data publication. IEEE International Conference on Multimedia and Expo, Suntec City, pp. 60–65. https://doi.org/10.1109/ICME.2010.5583334
The ORL Database, https://cam-orl.co.uk/facedatabase.html. Accessed 29-30 Dec 2020
Waltemate T, Gall D, Roth D, Botsch M, Latoschik ME (2018) The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response. IEEE Trans Vis Comput Graph 24(4):1643–1652. https://doi.org/10.1109/TVCG.2018.2794629
Winkler G (1995) Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A mathematical introduction. Springer-Verlag
Venkatanath N, Praneeth D, Chandrasekhar BhM, Channappayya SS, Medasani SS (2015) Blind image quality evaluation using perception based features. Twenty First National Conference on Communications (NCC) 2015:1–6. https://doi.org/10.1109/NCC.2015.7084843
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conclusion and future work
This paper has presented a novel visual privacy protection algorithm for de-identifying the visual objects in a digital image. The result of the object de-identification is an image in which the visual objects have been modified to bear a different look in a way that imitates the animal’s coloration adaptation process by randomly merging and separating the nearby surfaces using adaptive local histogram shift.
Our approach exploits the blurring techniques to segment the image into several visually ‘flat surfaces” after specifying the coverage, surface saliency, and shift diversity requirements of the visual objects. The same number of randomly generated shifts, big or small, is assigned to each of the “flat surfaces”, decides if the neighboring surfaces are merged or separated according to the conditions of similar or disruptive coloration in animals.
The technique is capable of not only merging nearby surfaces into one larger surface with details of lower or higher contrast but also separating nearby surfaces of visual resemblance into several visually different surfaces, which changes the visual objects into a different appearance. Comparative experiments show that a careful selection of the blurring parameters and the diversity constraints is necessary and sufficient to handle this task.
Our method performs almost as well as previous techniques for facial de-identification and in instances in which all visual identifiers are de-identified, as an ad hoc algorithm without references, it outperforms earlier work in terms of security, robustness, intelligibility, and reversibility.
Currently, we are investigating extensions for a smooth color shift in real color still images and for motion camouflage of visual objects from video, which promise to impose a new set of challenges.
Conflicts of interest /Competing interests
The authors have no relevant financial or non-financial interests to disclose, and no funding was received for conducting this study.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yao, X. VPP_AHA: Visual Privacy Protection via Adaptive Histogram Adjustment. Multimed Tools Appl 81, 6277–6303 (2022). https://doi.org/10.1007/s11042-021-11749-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11749-4