Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/AVSS.2009.48guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy Protection in Video Surveillance Systems Using Scalable Video Coding

Published: 02 September 2009 Publication History

Abstract

Thanks to high-speed internet access and feature-rich mobile devices, the demand for ubiquitous and secure surveillance systems has increased. In this paper, we propose a privacy-protected video surveillance system that makes use of Scalable Video Coding (SVC). SVC can be used to fulfill the requirement of omnipresence. Further, to address privacy concerns, we detect face regions and subsequently scramble these regions-of-interest (ROIs) in the compressed domain. To demonstrate the feasibility of the proposed video surveillance system, simulation results are provided. The results show that our system is able to provide a good level of security, while offering access to surveillance video content in heterogeneous usage environments.

References

[1]
American Civil Liberties Union (ACLU), "What's Wrong With Public Video Surveillance?", Online available: http://www.aclu.org/privacy/spying/14863res20020225.html.
[2]
F. Dufaux and T. Ebrahimi, "Scrambling for Privacy Protection in Video Surveillance Systems", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, Issue 8, pp. 1168-1174, Aug. 2008.
[3]
K. Martin and K. N. Plataniotis, "Privacy Protected Surveillance Using Secure Visual Object Coding", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, Issue 8, pp. 1152-1162, Aug. 2008.
[4]
E. N. Newton, L. Sweeney, and B. Malin, "Preserving privacy by deidentifying face images", IEEE Transactions on Knowledge and Data Engineering, Vol. 17, Issue 2, pp. 232-243, Feb. 2005.
[5]
I. Martinez-Ponte, X. Desurmont, J. Meessen, and J.-F. Delaigle, "Robust human face hiding ensuring privacy," in Proc. Int. Workshop Image Anal. Multimedia Interactive Services (WIAMIS), Apr. 2005.
[6]
H. Schwarz, D. Marpe, and T. Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, Issue 9, pp. 1103-1120, Sept. 2007.
[7]
P. Lambert, W. De Neve, Y. Dhondt, and R. Van de Walle, " Flexible macroblock ordering in H.264/AVC," Journal of Visual Communication and Image Representation, Vol. 17, Issue 2, pp. 358- 375, Apr. 2006.
[8]
T. Wiegand, G. Sullivan, J. Reichel, H. Schwarz, and M.Wien," Joint Draft ITU-T Rec. H.264 | ISO/IEC 14496-10 / Amd.3 Scalable video coding," Joint Video Team, Doc. JVT-X201, July. 2007.
[9]
ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q.6, JVT-U173, "Proposal for a Simple Profile for Scalable Video Coding," Oct. 2006.
[10]
P. Viola and M. Jones, "Rapid Object Detection using a Boosted Cascade of Simple Features", Proc. of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1, pp. 511-518, 2001.
[11]
R. Lienhart, A. Kuranov and V. Pisarevsky, "Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection," Proc. of 25th German Pattern Recognition Symposium (DAGM), Sept. 2003.
[12]
F. Dufaux and T. Ebrahimi, "H.264/AVC video scrambling for privacy protection," IEEE International Conference on Image Processing (ICIP), pp. 1688-1691, Oct. 2008.
[13]
Y. G. Kim, S. H. Jin, and Y. M. Ro, "Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding," the 7th International Workshop on Digital Watermarking, LNCS, Vol. 5041, pp. 71-86, Dec. 2008.
[14]
"Joint Scalable Video Model JSVM - 11," JVT-X202, July, 2007.
[15]
Surveillance Performance EValuation Initiative (SPEVI) Datasets, Online available: http://www.elec.qmul.ac.uk/staffinfo/andrea/spevi.html.
[16]
Open Computer Vision Library. Online available: http:/sourceforge.net/projects/opencvlibrary/.

Cited By

View all
  • (2018)Computationally efficient selective video encryption with chaos based block cipherMultimedia Tools and Applications10.5555/3287850.328790477:21(27981-27995)Online publication date: 1-Nov-2018
  • (2017)Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC)Wireless Personal Communications: An International Journal10.1007/s11277-017-4771-597:4(5115-5135)Online publication date: 1-Dec-2017
  • (2016)Secure privacy vault design for distributed multimedia surveillance systemFuture Generation Computer Systems10.1016/j.future.2014.10.01955:C(344-352)Online publication date: 1-Feb-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
AVSS '09: Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance
September 2009
573 pages
ISBN:9780769537184

Publisher

IEEE Computer Society

United States

Publication History

Published: 02 September 2009

Author Tags

  1. privacy protection
  2. scalable video coding (SVC)
  3. video surveillance system

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Computationally efficient selective video encryption with chaos based block cipherMultimedia Tools and Applications10.5555/3287850.328790477:21(27981-27995)Online publication date: 1-Nov-2018
  • (2017)Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC)Wireless Personal Communications: An International Journal10.1007/s11277-017-4771-597:4(5115-5135)Online publication date: 1-Dec-2017
  • (2016)Secure privacy vault design for distributed multimedia surveillance systemFuture Generation Computer Systems10.1016/j.future.2014.10.01955:C(344-352)Online publication date: 1-Feb-2016
  • (2016)Video surveillance system based on a scalable application-oriented architectureMultimedia Tools and Applications10.1007/s11042-015-2987-575:24(17187-17213)Online publication date: 1-Dec-2016
  • (2016)Understanding trust in privacy-aware video surveillance systemsInternational Journal of Information Security10.1007/s10207-015-0286-915:3(225-234)Online publication date: 1-Jun-2016
  • (2016)Building a post-compression region-of-interest encryption framework for existing video surveillance systemsMultimedia Systems10.1007/s00530-015-0473-622:5(617-639)Online publication date: 1-Oct-2016
  • (2016)Defeating face de-identification methods based on DCT-block scramblingMachine Vision and Applications10.1007/s00138-015-0743-527:2(251-262)Online publication date: 1-Feb-2016
  • (2015)Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overheadImage Communication10.1016/j.image.2015.04.01335:C(71-84)Online publication date: 1-Jul-2015
  • (2014)Slice groups for post-compression region of interest encryption in SVCProceedings of the 2nd ACM workshop on Information hiding and multimedia security10.1145/2600918.2600940(15-22)Online publication date: 11-Jun-2014
  • (2014)Threat-based evaluation for context-aware multimedia surveillance systemProceedings of the 8th International Conference on Ubiquitous Information Management and Communication10.1145/2557977.2558000(1-8)Online publication date: 9-Jan-2014
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media