A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects
We present a novel framework for encoding images obtained by a security monitoring camera with protecting the privacy of moving objects in the images. We are motivated by the fact that although security monitoring cameras can deter crimes, they may infringe the privacy of those who and objects which are recorded by the cameras. Moving objects, whose privacy should be protected, in an input image (recorded by a monitoring camera) are encrypted and hidden in a JPEG bitstream. Therefore, a normal JPEG viewer generates a masked image, where the moving objects are unrecognizable or completely invisible. Only a special viewer with a password can reconstruct the original recording. Data hiding is achieved by watermarking and encrypting with the advanced encryption standard (AES). We illustrate a concept of our framework and an algorithm of the encoder and the special viewer. Moreover, we show an implementation example.
KeywordsPrivacy protection security camera watermarking JPEG encoding
Unable to display preview. Download preview PDF.
- 1.Kitahara, I., Kogure, K., Hagita, N.: Stealth Vision for Protecting Privacy. In: Proc. of 17th International Conference on Pattern Recognition (ICPR 2004), vol. 4, pp. 404–407 (2004)Google Scholar
- 2.Wickramasuriya, J., Alhazzazi, M., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy-Protecting Video Surveillance. In: SPIE International Symposium on Electronic Imaging (Real-Time Imaging IX), San Jose, CA (January 2005)Google Scholar
- 3.Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y., Ekin, A.: Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Technical Paper, RC 22886 (W0308-109), August 28 (2003), http://www.research.ibm.com/peoplevision/rc22886.pdf
- 4.Staffer, C., Grimson, W.E.L.: Adaptive Background Mixture Models for Real-Time Tracking. In: CVPR 1999, Fort Colins, CO, June, p. 2246 (1999)Google Scholar
- 5.Lipton, A., Fujiyoshi, H., Patil, R.S.: Moving Target Detection and Classification from Real-Time Video. In: Proceeding of IEEE WACV 1998 (November 1998)Google Scholar
- 6.Grimson, W.E.L., Stauffer, C., Romano, R., Lee, L.: Using Adaptive Tracking to Classify and Monitor Activities in a Site. In: IEEE Proc. Computer Vision and Pattern Recognition, pp. 22–31 (1998)Google Scholar
- 7.Collins, R.T., Lipton, A.J., Kanade, T.: A System for Video Surveillance and Monitoring, Carnegie Mellon University, May. MU-RI-TR-00-12, Robotics Institute (2000)Google Scholar
- 8.Katzenbeisser, S., Petitcolas, F.A.P., Petticolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers (2002)Google Scholar
- 9.Pennebacker, W.B., Mitchell, J.L.: JPEG Still Data Compression Standard, Van Nostrand Reinhold (1993)Google Scholar
- 10.Announcing the Advanced Encryption Standard (AES) (November 26, 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf