Advertisement

A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects

  • Kenichi Yabuta
  • Hitoshi Kitazawa
  • Toshihisa Tanaka
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3767)

Abstract

We present a novel framework for encoding images obtained by a security monitoring camera with protecting the privacy of moving objects in the images. We are motivated by the fact that although security monitoring cameras can deter crimes, they may infringe the privacy of those who and objects which are recorded by the cameras. Moving objects, whose privacy should be protected, in an input image (recorded by a monitoring camera) are encrypted and hidden in a JPEG bitstream. Therefore, a normal JPEG viewer generates a masked image, where the moving objects are unrecognizable or completely invisible. Only a special viewer with a password can reconstruct the original recording. Data hiding is achieved by watermarking and encrypting with the advanced encryption standard (AES). We illustrate a concept of our framework and an algorithm of the encoder and the special viewer. Moreover, we show an implementation example.

Keywords

Privacy protection security camera watermarking JPEG encoding 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kitahara, I., Kogure, K., Hagita, N.: Stealth Vision for Protecting Privacy. In: Proc. of 17th International Conference on Pattern Recognition (ICPR 2004), vol. 4, pp. 404–407 (2004)Google Scholar
  2. 2.
    Wickramasuriya, J., Alhazzazi, M., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy-Protecting Video Surveillance. In: SPIE International Symposium on Electronic Imaging (Real-Time Imaging IX), San Jose, CA (January 2005)Google Scholar
  3. 3.
    Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y., Ekin, A.: Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Technical Paper, RC 22886 (W0308-109), August 28 (2003), http://www.research.ibm.com/peoplevision/rc22886.pdf
  4. 4.
    Staffer, C., Grimson, W.E.L.: Adaptive Background Mixture Models for Real-Time Tracking. In: CVPR 1999, Fort Colins, CO, June, p. 2246 (1999)Google Scholar
  5. 5.
    Lipton, A., Fujiyoshi, H., Patil, R.S.: Moving Target Detection and Classification from Real-Time Video. In: Proceeding of IEEE WACV 1998 (November 1998)Google Scholar
  6. 6.
    Grimson, W.E.L., Stauffer, C., Romano, R., Lee, L.: Using Adaptive Tracking to Classify and Monitor Activities in a Site. In: IEEE Proc. Computer Vision and Pattern Recognition, pp. 22–31 (1998)Google Scholar
  7. 7.
    Collins, R.T., Lipton, A.J., Kanade, T.: A System for Video Surveillance and Monitoring, Carnegie Mellon University, May. MU-RI-TR-00-12, Robotics Institute (2000)Google Scholar
  8. 8.
    Katzenbeisser, S., Petitcolas, F.A.P., Petticolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2002)Google Scholar
  9. 9.
    Pennebacker, W.B., Mitchell, J.L.: JPEG Still Data Compression Standard, Van Nostrand Reinhold (1993)Google Scholar
  10. 10.
    Announcing the Advanced Encryption Standard (AES) (November 26, 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kenichi Yabuta
    • 1
  • Hitoshi Kitazawa
    • 1
  • Toshihisa Tanaka
    • 1
  1. 1.Department of Electrical and Electronic EngineeringTokyo University of Agriculture and TechnologyTokyoJapan

Personalised recommendations