计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 306-313.doi: 10.11896/jsjkx.201200047

• 信息安全 • 上一篇    下一篇

视频隐私保护技术综述

金华, 朱靖宇, 王昌达   

  1. 江苏大学计算机科学与通信工程学院 江苏 镇江212000
  • 收稿日期:2020-12-03 修回日期:2021-04-09 出版日期:2022-01-15 发布日期:2022-01-18
  • 通讯作者: 金华(jinghua@ujs.edu.cn)
  • 基金资助:
    国家自然科学基金(61902156);国家重点研发计划(2017YFC1600804);江苏省自然科学基金(BK20180860)

Review on Video Privacy Protection

JIN Hua, ZHU Jing-yu, WANG Chang-da   

  1. School of Computer Science & Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212000,China
  • Received:2020-12-03 Revised:2021-04-09 Online:2022-01-15 Published:2022-01-18
  • About author:JIN Hua,born in 1977,Ph.D,associate professor.His main research interests include privacy protection and information security.
  • Supported by:
    National Natural Science Foundation of China(61902156),National Key Research and Development Program of China(2017YFC1600804) and Natural Science Foundation of Jiangsu Province(BK20180860).

摘要: 随着视频处理技术的迅速发展及硬件成本的不断降低,监控设备得到了越来越广泛的应用。视频监控普及所带来的隐私问题泄露逐渐成为了研究热点。根据目前视频隐私保护领域的研究现状,将视频隐私保护方法主要分为隐私主体识别、隐私主体保护以及隐私信息管理3个阶段,对每个阶段的算法进行分类概述并分析其优缺点,其中视频区域保护作为视频隐私保护领域的重要组成部分,联系视频编码发展历程对保护方法进行了分析和比较。最后探讨了视频隐私保护领域目前存在的问题并对未来的研究方向进行了展望,为视频隐私保护的相关研究提供了参考。

关键词: 视频编码, 视频加密, 数据隐藏, 隐私保护, 隐私区域提取

Abstract: With the rapid development of video processing technology and the continuous reduction of hardware costs,surveillance equipment has become more and more widely used.The leakage of privacy issues brought about by the popularity of video surveillance has gradually become a research hotspot.According to the current research status in this field,video privacy protection methods are mainly divided into three stages:privacy subject identification,privacy subject protection and privacy information management.Each stage algorithm is classified and summarized,and its advantages and disadvantages are analyzed.The privacy region protection is an important part of this field.The protection methods are analyzed and compared in connection with the development of video coding.Finally,the existing problems in the field of video privacy protection are discussed,and the future research direction is prospected,which provides a reference for the related research of video privacy protection.

Key words: Data hiding, Privacy protection, Privacy region extraction, Video coding, Video encryption

中图分类号: 

  • TP309
[1]WICKRAMASURIYA J,DATT M,MEHROTRA S,et al.Privacy protecting data collection in media spaces[C]//Proceedings of the 12th ACM International Conference on Multimedia.2004:48-55.
[2]LUO Y,CHEUNG S C S,LAZZERETTI R,et al.Anonymous subject identification and privacy information management in video surveillance[J].International Journal of Information Security,2017,17(3):261-278.
[3]ZHAO Z,CHEUNG S C.Multi-camera surveillance with visual tagging and generic camera placement[C]//IEEE International Conference on Distributed Smart Cameras.2007:259-266.
[4]SCHIFF J,MEINGAST M,MULLIGAN D K,et al.Respectful cameras:detecting visual markers in real-time to address privacy concerns[C]//IEEE/RSJ International Conference on Intelligent Robots & Systems.2009:65-89.
[5]KORSHUNOV P,EBRAHIMI T.Using warping for privacyprotection in video surveillance[C]//18th International Confe-rence on Digital Signal Processing (DSP).2013:1-6.
[6]MARTÍNEZ-PONTE I,DESURMONT X,MEESSEN J,et al.Robust human face hiding ensuring privacy[C]//6th International Workshop on Image Analysis for Multimedia Interactive Services.2005:4.
[7]ZHAO W,QIN S.A new method for target detection based on analysis of motion vector field in dynamic video scene[J].Proceedings of Spie the International Society for Optical Enginee-ring,2009,7495:4264-4267.
[8]ZHANG P,KALLIVAYALIL T,EMMANUEL T,et al.Privacy preserving video surveillance using pedestrian tracking me-chanism[C]//Proceedings of the 2nd ACM Workshop on Multimedia in Forensics,Security and Intelligence ACM.2010:31-36.
[9]WANG Y,O'NEILL M,KURUGOLLU F.Privacy region protection for H.264/AVC by encrypting the intra prediction modes without drift error in I frames[C]//IEEE International Conference on Acoustics.2013:2964-2968.
[10]LUO Y,CHEUNG S C.Privacy information management forvideo surveillance [C]//Conference on Biometric and Surveillance Technology for Human and Activity Identification X.2013:871207.1-871207.7.
[11]LEE Y,MICHEALS R J,FILLIBEN J J,et al.VASIR:Anopen-source research platform for advanced iris recognition technologies[J].Journal of Research of the National Institute of Standards & Technology,2013,118:218-259.
[12]MEGHERBI N,AMBELLOUIS S,COLÔT O,et al.Joint audio-video people tracking using belief theory[C]//IEEE Conference on Advanced Video & Signal Based Surveillance.2005:135-140.
[13]KUMAR P,MITTAL A,KUMAR P.A multimodal audio visible and infrared surveillance system (MAVISS)[C]//International Conference on Intelligent Sensing & Information Proces-sing.2005:151-156.
[14]CHEUNG S C S,VENKATESH M V,PARUCHURI J K,et al.Protecting and Managing Privacy Information in Video Surveillance Systems[M]//Protecting Privacy in Video Surveillance.London:Springer,2009:11-33.
[15]MARTIN K,PLATANIOTIS K N.Privacy protected surveil-lance using secure visual object coding[J].IEEE Transactions on Circuits & Systems for Video Technology,2008,18(8):1152-1162.
[16]ZHOU X,YANG C,YU W.Moving object detection by detecting contiguous outliers in the low-rank representation[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2011,35(3):597-610.
[17]DU L,ZHANG W,FU H,et al.An efficient privacy protection scheme for data security in video surveillance[J].Journal of Vi-sual Communication & Image Representation,2019,59(2):347-362.
[18]BAN Y,KIM S K,KIM S,et al.Face detection based on skin color likelihood[J].Pattern Recognition,2014,47(4):1573-1585.
[19]DEY A.A contour based procedure for face detection and trac-king from video[C]//Proceedings of International Conference of Recent Advances in Information Technology.2016:483-488.
[20]ERDÉLYI Á,WINKLER T,RINNER B.Privacy protection vs.utility in visual data-An objective evaluation framework[J].Multimedia Tools and Applications,2018,77(2):2285-2312.
[21]JAIRATH S,BHARADWAJ S,VATSA M,et al.Adaptive skin color model to improve video face detection[J].Advances in Intelligent Systems & Computing,2016,390:131-142.
[22]AGRAWAL P,NARAYANAN P J.Person de-identification in videos[C]//Asian Conference on Computer Vision.2009:266-267.
[23]DUFAUX F,EBRAHIMI T.A framework for the validation of privacy protection solutions in video surveillance[C]//Procee-dings of IEEE Conference on Multimedia and Expo.2010:66-71.
[24]NEWTON E M,SWEENEY L,MALIN B.Preserving privacy by de-identifying face images[J].IEEE Transactions on Know-ledge and Data Engineering,2005,17(2):232-243.
[25]CARRILLO P,KALVA H,MAGLIVERAS S.Compression independent reversible encryption for privacy in video surveillance[J].EURASIP journal on information security,2009,2009(2):1-13.
[26]UPMANYU M,NAMBOODIRI A M,SRINATHAN K,et al.Efficient privacy preserving video surveillance[C]//2009 IEEE 12th International Conference on Computer Vision.2009:1639-1646.
[27]AHN J,SHIM H J,JEON B,et al.Digital video scramblingmethod using intra prediction mode[M]//Advances in Multimedia Information Processing(PCM 2004).2004:386-393.
[28]JIANG J G,LI Y,LIANG L W.Research and improvement of the video encryption algorithm for H.264[J].Acta Electronica Sinica,2007,35(9):1724-1727.
[29]JIANG J,XING S,QI M.An intra prediction mode-based video encryption algorithm in H.264[C]//International Conference on Multimedia Information Networking & Security.2009:478-482.
[30]ZHENG L,XUE L.Motion vector encryption in multimediastreaming[C]//International Multimedia Modelling Conference.2004:64-71.
[31]SHI C,BHARGAVA B.Efficient MPEG video encryption algorithm[C]//IEEE Symposium on Reliable Distributed Systems.1998:381-386.
[32]LIAN S,LIU Z,REN Z,et al.Secure advanced video codingbased on selective encryption algorithms[J].IEEE Transactions on Consumer Electronics,2006,52(2):621-629.
[33]IKENAGA T,GOTO S.A partial scramble scheme for H.264 video[C]//7th International Conference on Asic.2013:802-805.
[34]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549.
[35]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools & Applications,2016,76(3):3235-3253.
[36]YEUNG S,ZHU S,ZENG B.Partial video encryption based on alternative integer transforms[C]//Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS).2010:933-936.
[37]YEUNG S K A,ZHU S,ZENG B.Design of new unitary trans-forms for perceptual video encryption[J].IEEE Transactions on Circuits & Systems for Video Technology,2011,21(9):1341-1345.
[38]SHAHID Z,PUECH W.Visual protection of HEVC video by selective encryption of CABAC binstrings[J].IEEE Transactions on Multimedia,2014,16(1):24-36.
[39]ZENG W,LEI S.Efficient frequency domain selective scramb-ling of digital video[J].IEEE Transactions on Multimedia,2003,5(1):118-129.
[40]LEE H J,NAM J.Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain[C]//Acm International Conference on Multimedia.2006:93-96.
[41]ZHOU J T,LIANG Z Q,CHEN Y,et al.Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table[J].IEEE Signal Processing Letters,2007,14(3):201-204.
[42]XIE D,KUO C.Enhanced multiple Huffman table (MHT) encryption scheme using key hopping[C]//2004 IEEE International Symposium on Circuits and Systems.2004:568-571.
[43]DUFAUX F,EBRAHIMI T.Scrambling for privacy protection in video surveillance systems[J].IEEE Transactions on Circuits & Systems for Video Technology,2008,18(8):1168-1174.
[44]DUFAUX F,EBRAHIMI T.H.264/AVC video scrambling for privacy protection[C]//2008 15th IEEE International Confe-rence on Image Processing.2008:1688-1691.
[45]FARAJALLAH M,HAMIDOUCHE W,DEFORGES O,et al.ROI encryption for the HEVC coded video contents[C]//2015 IEEE International Conference on Image Processing (ICIP).2015:3096-3100.
[46]TONG L,DAI F,ZHANG Y,et al.Restricted H.264/AVCvideo coding for privacy region scrambling[C]//2010 IEEE International Conference on Image Processing.2010:2089-2092.
[47]DAI F,TONG L,ZHANG Y,et al.Restricted H.264/AVCvideo coding for privacy protected video scrambling[J].Journal of Visual Communication & Image Representation,2011,22(6):479-490.
[48]TANG L.Methods for encrypting and decrypting MPEG video data efficiently[C]//Proceedings of the fourth ACM international conference on Multimedia.1997:219-229.
[49]BHARGAVA B,SHI C,WANG S.MPEG video encryption algorithms[J].Acm Multimedia,1998,24(1):57-79.
[50]PENG F,ZHU X W,LONG M.An ROI privacy protectionscheme for H.264 video based on FMO and Chaos[J].IEEE Transactions on Information Forensics & Security,2013,8(10):1688-1699.
[51]TEW Y,MINEMURA K,WONG K S.HEVC selective encryp-tion using transform skip signal and sign bin[C]//Asia-pacific Signal & Information Processing Association Summit & Confe-rence.2015:963-970.
[52]TAHA M A,SIDATY N,HAMIDOUCHE W,et al.End-to-End Real-Time ROI-Based Encryption in HEVC Videos[C]//2018 26th European Signal Processing Conference (EUSIPCO).2018:171-175.
[53]HAMIDOUCHE W,FARAJALLAH M,SIDATY N,et al.Real-time selective video encryption based on the chaos system in scalable HEVC extension[J].Signal Processing Image Communication,2017,58:73-86.
[54]ZHANG X,SEO S H,WANG C.A lightweight encryptionmethod for privacy protection in surveillance videos[J].IEEE Access,2018,6:18074-18087.
[55]ZHANG W.Hiding Privacy information in video surveillancesystem[C]//Processing of IEEE International Conference on Image Processing.2005:868-871.
[56]YU X,BABAGUCHI N.Privacy preserving:hiding a face in aface[M]//Computer Vision-ACCV 2007.Berlin:Springer,2007:651-661.
[57]LI G,ITO Y,YU X,et al.Recoverable privacy protection forvideo content distribution[J].EURASIP Journal on Information Security,2009,200(3):293031.
[58]DU L,LI Y.Privacy preserving for human object in video surveillance via visual cryptography[C]//Proceedings 2014 IEEE International Conference on Security,Pattern Analysis,and Cybernetics (SPAC).2014:80-85.
[59]MA X,ZENG W K,YANG W T,et al.Lossless ROI privacy protection of H.264/AVC compressed surveillance videos[J].IEEE Transactions on Emerging Topics in Computing,2016,4(3):349-362.
[60]NAWAZ T,FERRYMAN J.An annotation-free method forevaluating privacy protection techniques in videos[C]//2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).2015:1-6.
[61]KORSHUNOV P,MELLE A,DUGELAY J L,et al.Frame-work for objective evaluation of privacy filters[C]//SPIE Optical Engineering+Applications.2013:219-224.
[62]SOHN H,LEE D,NEVE W D,et al.An objective and subjectiveevaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR[M]//Effective Surveillance for Homeland Security:Balancing Technology and Social issues.Boca Raton:CRC Press,Taylor & Francis,2013:111-140.
[63]ERDÉLYI Á,WINKLER T,RINNER B.Privacy protection vs.utility in visual data-An objective evaluation framework[J].Multimedia Tools and Applications,2018,77(2):2285-2312.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 郝洁, 平萍, 付德银, 赵红泽.
压缩差值后的双直方图平移可逆信息隐藏方法
Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences
计算机科学, 2022, 49(9): 340-346. https://doi.org/10.11896/jsjkx.220300238
[5] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[6] 杨桃雨, 徐媛媛, 谭增洁.
面向6G的全景视频片划分优化编码算法
Tile Partition Optimized Omnidirectional Video Coding for 6G Network
计算机科学, 2022, 49(6): 66-72. https://doi.org/10.11896/jsjkx.220400034
[7] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[8] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[9] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[10] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[11] 成昭炜, 沈航, 汪悦, 王敏, 白光伟.
基于深度强化学习的无人机辅助弹性视频多播机制
Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast
计算机科学, 2021, 48(9): 271-277. https://doi.org/10.11896/jsjkx.201000078
[12] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[13] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
[14] 季琰, 戴华, 姜莹莹, 杨庚, 易训.
面向混合云的可并行多关键词Top-k密文检索技术
Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds
计算机科学, 2021, 48(5): 320-327. https://doi.org/10.11896/jsjkx.200300160
[15] 郭蕊, 芦天亮, 杜彦辉.
WSN中基于目标决策的源位置隐私保护方案
Source-location Privacy Protection Scheme Based on Target Decision in WSN
计算机科学, 2021, 48(5): 334-340. https://doi.org/10.11896/jsjkx.200400099
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!