An efficient privacy protection scheme for data security in video surveillance

被引:26
作者
Du, Ling [1 ]
Zhang, Wei [2 ]
Fu, Huazhu [3 ]
Ren, Wenqi [4 ]
Zhang, Xinpeng [5 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Technol, Tianjin 300387, Peoples R China
[2] JD AI Res, Beijing, Peoples R China
[3] ASTAR, Singapore, Singapore
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Fudan Univ, Sch Comp Sci & Technol, Shanghai 200433, Peoples R China
关键词
Privacy protection; Data security; Video surveillance; AUTOMATIC FACE SEGMENTATION;
D O I
10.1016/j.jvcir.2019.01.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advancement in video surveillance has raised significant concerns about privacy protection. The existing methods focus on identifying the sensitive region and preserving the behavior of the target, however, they ignore the recoverability of private content. In this paper, we propose a novel and efficient privacy protection scheme for data security in video surveillance, which jointly addresses several key challenges, including de-identification, behavior preservation, recoverability, and compressibility in one unified system. Our method constructs a public stream and a private residual error stream by blurring the private sensitive region. With our scheme, ordinary users could recognize the behaviors in the public identity-protected video stream for surveillance purpose, while authorized users are able to access the recovered private content (e.g., for law investigations). Moreover, the compressed privacy protected region and residual error could be able to save the costs associated with transmission and storage. The extensive experiments on two standard surveillance datasets and a user study demonstrate the effectiveness of our privacy protection system. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:347 / 362
页数:16
相关论文
共 57 条
  • [1] Blind Robust Watermarking of 3d Motion Data
    Agarwal, Parag
    Prabhakaran, Balakrishnan
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2010, 6 (01)
  • [2] Person De-Identification in Videos
    Agrawal, Prachi
    Narayanan, P. J.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (03) : 299 - 310
  • [3] [Anonymous], INT C IM PROC
  • [4] [Anonymous], 2013, 18 INT C DIG SIGN PR
  • [5] [Anonymous], IEEE INT C AUT FAC G
  • [6] [Anonymous], ADV CRYPTOLOGY EUROC
  • [7] [Anonymous], P MEDIAEVAL 2014 WOR
  • [8] [Anonymous], IEEE CHIN SUMM INT C
  • [9] [Anonymous], 2005, INT WORKSH IM AN MUL
  • [10] [Anonymous], INT J ADV RES COMPUT