Skip to main content
Log in

Region of interest based selective encryption scheme for privacy protection in H.264 video

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

A selective encryption scheme for region of interest (ROI) of H.264 video is proposed to protect the personal privacy in a video. The most important part of video can be protected with less cost and operation by only encrypting the content of ROIs. Human face regions are selected as ROI and detected by using Gaussian skin color model. Independent ROI encoding is realized with the mechanism of flexible macro-block ordering (FMO). Frames are divided into grid-like slice-groups which can be combined flexibly to form a required ROI. Both luminance component and chrominance component of the macro-blocks in ROI are modified to achieve good encryption quality and location accuracy. In the process of decryption, the encrypted area is located automatically. There is no need to transmit additional position information of ROIs to the end of decryption. The encrypted video is decrypted correctly with the secret key. JM18.4 software is employed to perform the simulation experiment. Experimental results show the accuracy and effectiveness of our scheme to encrypt and decrypt the ROIs in H.264 video.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Stütz T, Uhl A. A survey of H.264 AVC/SVC encryption [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(3): 325–339.

    Article  Google Scholar 

  2. Newton E M, Sweeney L, Malin B. Preserving privacy by de-identifying face images [J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(2): 232–243.

    Article  Google Scholar 

  3. Qi M B, Chen X R, Jiang J G, et al. Face protection of H. 264 video based on detecting and tracking [C]//Proceedings of 8th International Conference on Electronic Measurement and Instruments. Xi’an, China: IEEE, 2007: 2172–2177.

    Google Scholar 

  4. Kim Y Y, Jin S H, Bae T M, et al. A selective video encryption for the region of interest in scalable video coding [C]//Proceedings of IEEE TENCON 2007. Taipei, China: IEEE, 2007: 1–4.

    Google Scholar 

  5. Dufaux F, Ebrahimi T. Scrambling for privacy protection in video surveillance systems [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(8): 1168–1174.

    Article  Google Scholar 

  6. Zhao Y D, Zhuo L, Mao N S, et al. An object-based unequal encryption method for H.264 compressed surveillance videos [C]//Proceedings of 2012 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC2012). Hong Kong, China: IEEE, 2012: 419–424.

    Google Scholar 

  7. Peng F, Zhu X W, Long M. An ROI privacy protection scheme for H.264 video based on FMO and chaos [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(10): 1688–1699.

    Article  Google Scholar 

  8. Wang C X, Li Z Y. Face detection based on skin Gaussian model and KL transform [C]//Proceedings of 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Phuket, Thailand: IEEE, 2008: 522–525.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Guo  (郭捷).

Additional information

Foundation item: the National Natural Science Foundation of China (No. 61073157)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, J., Xu, Jy. & Bao, Jl. Region of interest based selective encryption scheme for privacy protection in H.264 video. J. Shanghai Jiaotong Univ. (Sci.) 19, 385–391 (2014). https://doi.org/10.1007/s12204-014-1513-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-014-1513-7

Key words

CLC number

Navigation