Abstract
In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest are described. An analysis of efficiency of the developed encryption approach with respect to visual stream resolution and the number of protected objects is performed. Experimental procedures related to stream processing on a single core, single node and multiple nodes of the supercomputer platform are also provided. The obtained results are presented and discussed. Moreover, possible future improvements of the methodology are suggested.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-319-02895-8_64
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, K., Davis, L.S.: Object detection and tracking for intelligent video surveillance. In: Lin, W., Tao, D., Kacprzyk, J., Li, Z., Izquierdo, E., Wang, H. (eds.) Multimedia Analysis, Processing and Communications. SCI, vol. 346, pp. 265–288. Springer, Heidelberg (2011)
Czyżewski, A., Dalka, P.: Moving Object Detection and Tracking for the Purpose of Multimodal Surveillance System in Urban Areas. In: Tsihrintzis, G.A., Virvou, M., Howlett, R.J., Jain, L.C. (eds.) New Direct. in Intel. Interac. Multimedia, SCI, vol. 142, pp. 75–84. Springer, Heidelberg (2008)
Ellwart, D., Czyżewski, A.: Viewpoint independent shape-based object classification for video surveillance. In: International Workshop on Image Analysis for Multimedia Interactive Services, Delft, Netherlands (2011)
Viola, P., Jones, M.: Robust Real-Time Face Detection. International Journal of Computer Vision 57(2), 137–154 (2004)
Sheng, H., Wen, C., Li, Q., Xiong, Z.: Real-Time Anti-Interference Location of Vehicle License Plates Using High-Definition Video. IEEE Intelligent Transportation Systems Society 1(4), 17–23 (2009)
Szczodrak, M., Kotus, J., Kopaczewski, K., Opatka, K., Czyżewski, A., Krawczyk, H.: Behavior Analysis and Dynamic Crowd Management in Video Surveillance System. In: International Workshop on Database and Expert Systems Applications, pp. 371–375 (2011)
Szwoch, G., Dalka, P., Czyżewski, A.: Objects classification based on their physical sizes for detection of events in camera images. In: Signal Processing: Algorithms, Architectures, Arrangements, and Applications. New Trends in Audio and Video, pp. 15–20 (2008)
Andrade, E.L., Blunsden, S., Fisher, R.B.: Hidden Markov models for optical flow analysis in crowds. In: International Conference on Pattern Recognition, pp. 460–463 (2006)
Krawczyk, H., Knopa, R., Proficz, J.: Basic management strategies on KASKADA platform. In: International Conference on Computer as a Tool, pp. 1–4 (2011)
Newton, E., Sweeney, L., Malin, B.: Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering 17(2), 232–243 (2005)
Bitouk, D., Kumar, N., Dhillon, S., Belhumeur, P.N., Nayar, S.K.: Face Swapping: Automatically Replacing Faces in Photographs. ACM Transactions on Graphics, Proceedings of SIGGRAPH (2008)
Rodrigues, J.M., Puech, W., Bors, A.G.: Selective Encryption of Human Skin in JPEG Images. In: IEEE International Conference on Image Processing, pp. 1981–1984 (October 2006)
Korus, P., Szmuc, W., Dziech, A.: A scheme for censorship of sensitive image content with high-quality reconstruction ability. In: IEEE International Conference on Multimedia and Expo, pp. 1073–1078 (July 2010)
Bloom, J.A., Cox, I.J., Fridrich, J., Kalker, T., Miller, M.L.: Digital Watermarking and Steganography, Boston (2008)
Chattopadhyay, A., Boult, T.: PrivacyCam: A Privacy Preserving Camera Using uCLinux on the Blackfin DSP. In: IEEE Workshop on Embedded Vision Systems (2007)
Carrillo, P., Kalva, H., Magliveras, S.: Compression Independent Reversible Encryption in Video Surveillance. Journal on Information Security (December 2009)
Cichowski, J., Czyżewski, A.: Reversible Video Stream Anonymization for Video Surveillance Systems Based on Pixels Relocation and Watermarking. IEEE International Conference on Computer Vision, Workshop on Visual Surveillance, 1971–1977 (November 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cichowski, J., Czyżewski, A., Kostek, B. (2013). Visual Data Encryption for Privacy Enhancement in Surveillance Systems. In: Blanc-Talon, J., Kasinski, A., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2013. Lecture Notes in Computer Science, vol 8192. Springer, Cham. https://doi.org/10.1007/978-3-319-02895-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-02895-8_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02894-1
Online ISBN: 978-3-319-02895-8
eBook Packages: Computer ScienceComputer Science (R0)