H.264 Video Privacy Protection Method Using Regions of Interest Encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127118

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570

References:


[1] Yun Seong Ko, Kwang Hyuk Park and Chang Soo Kim. “Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems.” Journal of Korea Multimedia Society Vol. 19, No. 1 (2016): 51-59
[2] Unterweger, Andreas, and Andreas Uhl. "Slice groups for post-compression region of interest encryption in H. 264/AVC and its scalable extension." Signal processing: image communication 29.10 (2014): 1158-1170
[3] T. Wiegand, G.J. Sullivan, G. Bjontegaard and A. Luthra. "Overview of the H. 264/AVC video coding standard." IEEE Transactions on circuits and systems for video technology 13.7 (2003): 560-576.
[4] Yeongyun Kim, Sung Ho Jin, Tae Meon Bae and Yong Man Ro. "A selective video encryption for the region of interest in scalable video coding." TENCON 2007-2007 IEEE Region 10 Conference. IEEE, 2007.
[5] Liu, Fuwen, and Hartmut Koenig. “A survey of video encryption algorithms.” Computers & Security 29.1, 2010
[6] Carrillo, Paula, Hari Kalva, and Spyros Magliveras. "Compression independent object encryption for ensuring privacy in video surveillance." 2008 IEEE International Conference on Multimedia and Expo. IEEE, 2008.
[7] Sk. Md. Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, A. El Saddik and Eiji Okamoto. "A real-time privacy-sensitive data hiding approach based on chaos cryptography." Multimedia and Expo (ICME), 2010 IEEE International Conference on. IEEE, 2010.
[8] Lingling Tong, Feng Dai, Yongdong Zhang and Jintao Li. "Restricted H. 264/AVC video coding for privacy region scrambling." 2010 IEEE International Conference on Image Processing. IEEE, 2010.
[9] Dufaux, Frédéric, and Touradj Ebrahimi. "A framework for the validation of privacy protection solutions in video surveillance." Multimedia and Expo (ICME), 2010 IEEE International Conference on. IEEE, 2010.
[10] Hosik Sohn, Esla T. AnzaKu, Wesley De Neve, Yong Man Ro and Konstantinos N. Plataniotis. "Privacy protection in video surveillance systems using scalable video coding." Advanced Video and Signal Based Surveillance, 2009. AVSS'09. Sixth IEEE International Conference on. IEEE, 2009.
[11] Zeng, Wenjun, and Shawmin Lei. "Efficient frequency domain selective scrambling of digital video." IEEE Transactions on Multimedia 5.1 (2003): 118-129.
[12] Dubois, Loic, William Puech, and Jacques Blanc-Talon. "Smart selective encryption of cavlc for h. 264/avc video." 2011 IEEE International Workshop on Information Forensics and Security. IEEE, 2011.
[13] Andreas Unterweger, Kevin Van Ryckegem, Dominik Engel and Andreas Uhl. "Building a post-compression region-of-interest encryption framework for existing video surveillance systems." Multimedia Systems (2015): 1-23.
[14] Iqbal, Razib, Sharmeen Shahabuddin, and Shervin Shirmohammadi. "Compressed-domain spatial adaptation resilient perceptual encryption of live H. 264 video." Information Sciences Signal Processing and their Applications (ISSPA), 2010 10th International Conference on. IEEE, 2010.
[15] Datong Chen, Yi Chang, Rong Yan and Jie Yang. "Tools for protecting the privacy of specific individuals in video." EURASIP Journal on Applied Signal Processing 2007.1 (2007): 107-107.
[16] Dufaux, Frederic, and Touradj Ebrahimi. "Scrambling for privacy protection in video surveillance systems." IEEE Transactions on Circuits and Systems for Video Technology 18.8 (2008): 1168-1174.
[17] Unterweger, Andreas, Jan De Cock, and Andreas Uhl. "Bit Stream Based Encryption for Regions of Interest in H. 264/AVC Videos with Drift Minimization. “
[18] Peng, Fei, Xiao-wen Zhu, and Min Long. "An ROI privacy protection scheme for H. 264 video based on FMO and Chaos." IEEE transactions on information forensics and security 8.10 (2013): 1688-1699.
[19] Tourapis, Alexis Michael, Karsten Sühring, and Gary Sullivan. "H. 264/MPEG-4 AVC reference software manual." Geneva, ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q 6 (2007).