Compression Independent Reversible Encryption for Privacy in Video Surveillance
- PDF / 7,699,566 Bytes
- 13 Pages / 600.05 x 792 pts Page_size
- 80 Downloads / 228 Views
Research Article Compression Independent Reversible Encryption for Privacy in Video Surveillance Paula Carrillo,1 Hari Kalva,2 and Spyros Magliveras3 1 Texas
Instruments Incorporated, Stafford, TX 77477, USA of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL 33431, USA 3 Department of Mathematical Sciences, Florida Atlantic University, Boca Raton, FL 33431, USA 2 Department
Correspondence should be addressed to Hari Kalva, [email protected] Received 16 April 2009; Revised 21 September 2009; Accepted 13 December 2009 Recommended by Andrew Senior One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting regions that reveal identity (e.g., faces or vehicle tags) are necessary to preserve individuals’ right to privacy while recognizing the legitimate needs for video surveillance. The video used in surveillance applications usually needs to be transcoded or recoded for distribution and archival. Transcoding a traditionally encrypted video is not possible without decrypting the video first. This paper presents a compression algorithm independent solution that provides privacy in video surveillance applications. The proposed approach uses permutation-based encryption in the pixel domain to hide identity revealing features. The permutation-based encryption tolerates lossy compression and transcoding and allows decryption of the transcoded video at a later time. The use of permutation-based encryption makes the proposed solution independent of the compression algorithms used and robust to transcoding. The cost of providing this privacy is an increase in bitrate that depends on the percentage of blocks encrypted. Copyright © 2009 Paula Carrillo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction With video surveillance becoming an integral part of our security infrastructure, privacy rights are beginning to gain importance. The key concern is the fact that private citizens, who are not suspects, are being recorded and recordings archived through the use of video surveillance systems. Such a record-everything-and-process-later approach has serious privacy implications. The same privacy issues arise when surveillance cameras routinely record highway traffic as vehicle tags are recorded. The solution of removing the identities by blurring/blackening the portions of video is not acceptable to security personnel as they may have legitimate need to review the videos. On the contrary, leaving the videos with identities of people and vehicles public is a breach of privacy. A solution to the problem is selective encryption of portions of the video that reveal identity (e.g., faces, vehicle tag
Data Loading...