期刊文献+

Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video

Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video
原文传递
导出
摘要 A selective encryption scheme for region of interest(ROI) of H.264 video is proposed to protect the personal privacy in a video. The most important part of video can be protected with less cost and operation by only encrypting the content of ROIs. Human face regions are selected as ROI and detected by using Gaussian skin color model. Independent ROI encoding is realized with the mechanism of flexible macro-block ordering(FMO). Frames are divided into grid-like slice-groups which can be combined flexibly to form a required ROI.Both luminance component and chrominance component of the macro-blocks in ROI are modified to achieve good encryption quality and location accuracy. In the process of decryption, the encrypted area is located automatically.There is no need to transmit additional position information of ROIs to the end of decryption. The encrypted video is decrypted correctly with the secret key. JM18.4 software is employed to perform the simulation experiment.Experimental results show the accuracy and effectiveness of our scheme to encrypt and decrypt the ROIs in H.264 video. A selective encryption scheme for region of interest (ROI) of H.264 video is proposed to protect the personal privacy in a video. The most important part of video can be protected with less cost and operation by only encrypting the content of ROIs. Human face regions are selected as ROI and detected by using Gaussian skin color model. Independent ROI encoding is realized with the mechanism of flexible macro-block ordering (FMO). Frames are divided into grid-like slice-groups which can be combined flexibly to form a required ROI. Both luminance component and chrominance component of the macro-blocks in ROI are modified to achieve good encryption quality and location accuracy. In the process of decryption, the encrypted area is located automatically. There is no need to transmit additional position information of ROIs to the end of decryption. The encrypted video is decrypted correctly with the secret key. JM18.4 software is employed to perform the simulation experiment. Experimental results show the accuracy and effectiveness of our scheme to encrypt and decrypt the ROIs in H.264 video.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期385-391,共7页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China(No.61073157)
关键词 region of interest(ROI) selective video encryption flexible macro-block ordering(FMO) region of interest (ROI), selective video encryption, flexible macro-block ordering (FMO)
  • 相关文献

参考文献8

  • 1STUTZ T, UHL A. A survey of H.264 AVC/SVC en- cryption [J]. IEEE Transactions on Circuits and Sys- tems for Video Technology, 2012, 22(3): 325-339.
  • 2NEWTON E M, SWEENEY L, AALIN B. Preserving pri- vacy by de-identifying face images [J]. IEEE Trans- actions on Knowledge and Data Engineering, 2005, 17(2): 232-243.
  • 3QI M B, CHEN X R, JIANC J G, et al. Face pro- tection of H. 264 video based on detecting and track- ing [C]//Proceedings of 8th International Conference on Electronic Measurement and Instruments. Xi'an, China: IEEE, 2007: 2172-2177.
  • 4KIM Y Y, JIN S H, BAE T M, et al. A selective video encryption for the region of interest in scal- able video coding [C]//Proceedings of IEEE TENCON 2007. Taipei, China: IEEE, 2007: 1-4.
  • 5DUFAUX F, EBRAHIMI T. Scrambling for privacy pro- tection in video surveillance systems [J]. IEEE Trans- actions on Circuits and Systems for Video Technology, 2008, 18(8): 1168-1174.
  • 6ZHAO Y D, ZHUO L, MAO N S, et al. An object-based unequal encryption method for H.264 compressed surveillance videos [C]//Proceedings of 2012 IEEE In- ternational Conference on Signal Processing, Commu- nications and Computing (ICSPCC2012).Hong Kong, China: IEEE, 2012: 419-424.
  • 7PENG F, ZHU X W, LONG M. An ROI privacy protec- tion scheme for H.264 video based on FMO and chaos [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(10): 1688-1699.
  • 8WANG C X, LI Z Y. Face detection based on skin Gaussian model and KL transform [C]//Proceedings of 9th A CIS International Conference on Software Engi- neering, Artificial Intelligence, Networking, and Par- allel/Distributed Computing. Phuket, Thailand: IEEE, 2008: 522-525.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部