Chaos-cryptography based privacy preservation technique for video surveillance

被引:25
作者
Rahman, Sk. Md. Mizanur [1 ]
Hossain, M. Anwar [2 ]
Mouftah, Hussein [1 ]
El Saddik, Abdulmotaleb [1 ,2 ]
Okamoto, Eiji [3 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn SITE, Ottawa, ON K1N 6N5, Canada
[2] King Saud Univ, Coll Comp & Informat Sci CCIS, Riyadh 11543, Saudi Arabia
[3] Univ Tsukuba, Dept Risk Engn, Tsukuba, Ibaraki, Japan
关键词
Privacy and security; Chaos sryptography; Video surveillance system; IMAGE ENCRYPTION;
D O I
10.1007/s00530-011-0246-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A multimedia surveillance system aims to provide security and safety of people in a monitored space. However, due to the nature of surveillance, privacy-sensitive information such as face, gait, and other physical parameters based on the captured media from multiple sensors, can be revealed without the permission of the people who appear in the surveillance video. This is a major concern in recent days. Therefore, it is desirable to have such mechanism that can hide privacy-sensitive information as much as possible, yet supporting effective surveillance tasks. In this article, we propose a chaos cryptography based data scrambling approach that can be applied on selected regions of interest (ROIs) in video camera footage, which contains privacy-sensitive data. Our approach also supports multiple levels of abstraction of data hiding depending on the role of the authorized user. In order to evaluate the suitability of this approach, we applied our algorithm on some video camera footage and observed that our approach is computationally efficient and, hence, it can be applied for real-time video surveillance tasks in preserving privacy sensitive information.
引用
收藏
页码:145 / 155
页数:11
相关论文
共 40 条
  • [1] Ahmed H.H., 2006, J OPTIC ENG, V45, DOI [10.1117/1.2358991, DOI 10.1117/1.2358991]
  • [2] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [3] [Anonymous], CMUCS03119
  • [4] A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR
    BLUM, L
    BLUM, M
    SHUB, M
    [J]. SIAM JOURNAL ON COMPUTING, 1986, 15 (02) : 364 - 383
  • [5] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [6] Scrambling for privacy protection in video surveillance systems
    Dufaux, Frederic
    Ebrahimi, Touradj
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (08) : 1168 - 1174
  • [7] Dufaux Frederic., 2006, C COMPUTER VISION PA, P160
  • [8] FIDALEO DA, 2004, P ACM 2 INT WORKSH V
  • [9] Forre R., 1991, ADV CRYPTOLOGY EUROC, V0547, P76
  • [10] Gallo I., CHAOS LOGISTIC FUNCT