An efficient privacy protection scheme for data security in video surveillance

被引:26
|
作者
Du, Ling [1 ]
Zhang, Wei [2 ]
Fu, Huazhu [3 ]
Ren, Wenqi [4 ]
Zhang, Xinpeng [5 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Sci & Technol, Tianjin 300387, Peoples R China
[2] JD AI Res, Beijing, Peoples R China
[3] ASTAR, Singapore, Singapore
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Fudan Univ, Sch Comp Sci & Technol, Shanghai 200433, Peoples R China
关键词
Privacy protection; Data security; Video surveillance; AUTOMATIC FACE SEGMENTATION;
D O I
10.1016/j.jvcir.2019.01.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advancement in video surveillance has raised significant concerns about privacy protection. The existing methods focus on identifying the sensitive region and preserving the behavior of the target, however, they ignore the recoverability of private content. In this paper, we propose a novel and efficient privacy protection scheme for data security in video surveillance, which jointly addresses several key challenges, including de-identification, behavior preservation, recoverability, and compressibility in one unified system. Our method constructs a public stream and a private residual error stream by blurring the private sensitive region. With our scheme, ordinary users could recognize the behaviors in the public identity-protected video stream for surveillance purpose, while authorized users are able to access the recovered private content (e.g., for law investigations). Moreover, the compressed privacy protected region and residual error could be able to save the costs associated with transmission and storage. The extensive experiments on two standard surveillance datasets and a user study demonstrate the effectiveness of our privacy protection system. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:347 / 362
页数:16
相关论文
共 50 条
  • [41] BFOD: Blockchain-Based Privacy Protection and Security Sharing Scheme of Flight Operation Data
    Li, Xinyan
    Zhao, Huimin
    Deng, Wu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 3392 - 3401
  • [42] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
    Huang, Wen
    Liao, Yongjian
    Zhou, Shijie
    Chen, Hongjie
    IEEE ACCESS, 2019, 7 : 43453 - 43461
  • [43] An Efficient Consortium Blockchain Dual Privacy Protection Scheme
    Yang, Haipeng
    Han, Peng
    Xiong, Lili
    Li, Yuanyuan
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCS 2023, 2024, 2098 : 225 - 241
  • [44] An Efficient and Privacy Protection Communication Scheme for Smart Grid
    Guan, Albert
    Guan, D. J.
    IEEE ACCESS, 2020, 8 : 179047 - 179054
  • [45] Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security
    Sargsyan, Tatevik
    INTERNATIONAL JOURNAL OF COMMUNICATION, 2016, 10 : 2221 - 2237
  • [46] A certificateless aggregate signature scheme for security and privacy protection in VANET
    Cahyadi, Eko Fajar
    Su, Tzu-Wei
    Yang, Chou-Chen
    Hwang, Min-Shiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (05)
  • [47] Privacy in video surveillance
    Cavallaro, Andrea
    IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (02) : 168 - +
  • [48] Special Issue on Intelligent Video Surveillance for Public Security and Personal Privacy
    Babaguchi, Noboru
    Cavallaro, Andrea
    Chellappa, Rama
    Dufaux, Frederic
    Wang, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (10) : 1559 - 1561
  • [49] ANALISIS OF BUSINESS CONTROL THROUGH THE USE OF VIDEO SURVEILLANCE, PRIVACY RIGHT AND RIGHT TO PROTECTION OF PERSONAL DATA
    Pascual Lopez, Jesus
    Sanz Martin, Laura
    REVISTA GENERAL DEL DERECHO DEL TRABAJO Y DE LA SEGURIDAD SOCIAL, 2021, (58):
  • [50] Blockchain Data Availability Scheme with Strong Data Privacy Protection
    Liu, Xinyu
    Ji, Shan
    Wang, Xiaowan
    Liu, Liang
    Ren, Yongjun
    INFORMATION, 2023, 14 (02)