Computer Science ›› 2022, Vol. 49 ›› Issue (1): 306-313.doi: 10.11896/jsjkx.201200047

• Information Security • Previous Articles     Next Articles

Review on Video Privacy Protection

JIN Hua, ZHU Jing-yu, WANG Chang-da   

  1. School of Computer Science & Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212000,China
  • Received:2020-12-03 Revised:2021-04-09 Online:2022-01-15 Published:2022-01-18
  • About author:JIN Hua,born in 1977,Ph.D,associate professor.His main research interests include privacy protection and information security.
  • Supported by:
    National Natural Science Foundation of China(61902156),National Key Research and Development Program of China(2017YFC1600804) and Natural Science Foundation of Jiangsu Province(BK20180860).

Abstract: With the rapid development of video processing technology and the continuous reduction of hardware costs,surveillance equipment has become more and more widely used.The leakage of privacy issues brought about by the popularity of video surveillance has gradually become a research hotspot.According to the current research status in this field,video privacy protection methods are mainly divided into three stages:privacy subject identification,privacy subject protection and privacy information management.Each stage algorithm is classified and summarized,and its advantages and disadvantages are analyzed.The privacy region protection is an important part of this field.The protection methods are analyzed and compared in connection with the development of video coding.Finally,the existing problems in the field of video privacy protection are discussed,and the future research direction is prospected,which provides a reference for the related research of video privacy protection.

Key words: Data hiding, Privacy protection, Privacy region extraction, Video coding, Video encryption

CLC Number: 

  • TP309
[1]WICKRAMASURIYA J,DATT M,MEHROTRA S,et al.Privacy protecting data collection in media spaces[C]//Proceedings of the 12th ACM International Conference on Multimedia.2004:48-55.
[2]LUO Y,CHEUNG S C S,LAZZERETTI R,et al.Anonymous subject identification and privacy information management in video surveillance[J].International Journal of Information Security,2017,17(3):261-278.
[3]ZHAO Z,CHEUNG S C.Multi-camera surveillance with visual tagging and generic camera placement[C]//IEEE International Conference on Distributed Smart Cameras.2007:259-266.
[4]SCHIFF J,MEINGAST M,MULLIGAN D K,et al.Respectful cameras:detecting visual markers in real-time to address privacy concerns[C]//IEEE/RSJ International Conference on Intelligent Robots & Systems.2009:65-89.
[5]KORSHUNOV P,EBRAHIMI T.Using warping for privacyprotection in video surveillance[C]//18th International Confe-rence on Digital Signal Processing (DSP).2013:1-6.
[6]MARTÍNEZ-PONTE I,DESURMONT X,MEESSEN J,et al.Robust human face hiding ensuring privacy[C]//6th International Workshop on Image Analysis for Multimedia Interactive Services.2005:4.
[7]ZHAO W,QIN S.A new method for target detection based on analysis of motion vector field in dynamic video scene[J].Proceedings of Spie the International Society for Optical Enginee-ring,2009,7495:4264-4267.
[8]ZHANG P,KALLIVAYALIL T,EMMANUEL T,et al.Privacy preserving video surveillance using pedestrian tracking me-chanism[C]//Proceedings of the 2nd ACM Workshop on Multimedia in Forensics,Security and Intelligence ACM.2010:31-36.
[9]WANG Y,O'NEILL M,KURUGOLLU F.Privacy region protection for H.264/AVC by encrypting the intra prediction modes without drift error in I frames[C]//IEEE International Conference on Acoustics.2013:2964-2968.
[10]LUO Y,CHEUNG S C.Privacy information management forvideo surveillance [C]//Conference on Biometric and Surveillance Technology for Human and Activity Identification X.2013:871207.1-871207.7.
[11]LEE Y,MICHEALS R J,FILLIBEN J J,et al.VASIR:Anopen-source research platform for advanced iris recognition technologies[J].Journal of Research of the National Institute of Standards & Technology,2013,118:218-259.
[12]MEGHERBI N,AMBELLOUIS S,COLÔT O,et al.Joint audio-video people tracking using belief theory[C]//IEEE Conference on Advanced Video & Signal Based Surveillance.2005:135-140.
[13]KUMAR P,MITTAL A,KUMAR P.A multimodal audio visible and infrared surveillance system (MAVISS)[C]//International Conference on Intelligent Sensing & Information Proces-sing.2005:151-156.
[14]CHEUNG S C S,VENKATESH M V,PARUCHURI J K,et al.Protecting and Managing Privacy Information in Video Surveillance Systems[M]//Protecting Privacy in Video Surveillance.London:Springer,2009:11-33.
[15]MARTIN K,PLATANIOTIS K N.Privacy protected surveil-lance using secure visual object coding[J].IEEE Transactions on Circuits & Systems for Video Technology,2008,18(8):1152-1162.
[16]ZHOU X,YANG C,YU W.Moving object detection by detecting contiguous outliers in the low-rank representation[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2011,35(3):597-610.
[17]DU L,ZHANG W,FU H,et al.An efficient privacy protection scheme for data security in video surveillance[J].Journal of Vi-sual Communication & Image Representation,2019,59(2):347-362.
[18]BAN Y,KIM S K,KIM S,et al.Face detection based on skin color likelihood[J].Pattern Recognition,2014,47(4):1573-1585.
[19]DEY A.A contour based procedure for face detection and trac-king from video[C]//Proceedings of International Conference of Recent Advances in Information Technology.2016:483-488.
[20]ERDÉLYI Á,WINKLER T,RINNER B.Privacy protection vs.utility in visual data-An objective evaluation framework[J].Multimedia Tools and Applications,2018,77(2):2285-2312.
[21]JAIRATH S,BHARADWAJ S,VATSA M,et al.Adaptive skin color model to improve video face detection[J].Advances in Intelligent Systems & Computing,2016,390:131-142.
[22]AGRAWAL P,NARAYANAN P J.Person de-identification in videos[C]//Asian Conference on Computer Vision.2009:266-267.
[23]DUFAUX F,EBRAHIMI T.A framework for the validation of privacy protection solutions in video surveillance[C]//Procee-dings of IEEE Conference on Multimedia and Expo.2010:66-71.
[24]NEWTON E M,SWEENEY L,MALIN B.Preserving privacy by de-identifying face images[J].IEEE Transactions on Know-ledge and Data Engineering,2005,17(2):232-243.
[25]CARRILLO P,KALVA H,MAGLIVERAS S.Compression independent reversible encryption for privacy in video surveillance[J].EURASIP journal on information security,2009,2009(2):1-13.
[26]UPMANYU M,NAMBOODIRI A M,SRINATHAN K,et al.Efficient privacy preserving video surveillance[C]//2009 IEEE 12th International Conference on Computer Vision.2009:1639-1646.
[27]AHN J,SHIM H J,JEON B,et al.Digital video scramblingmethod using intra prediction mode[M]//Advances in Multimedia Information Processing(PCM 2004).2004:386-393.
[28]JIANG J G,LI Y,LIANG L W.Research and improvement of the video encryption algorithm for H.264[J].Acta Electronica Sinica,2007,35(9):1724-1727.
[29]JIANG J,XING S,QI M.An intra prediction mode-based video encryption algorithm in H.264[C]//International Conference on Multimedia Information Networking & Security.2009:478-482.
[30]ZHENG L,XUE L.Motion vector encryption in multimediastreaming[C]//International Multimedia Modelling Conference.2004:64-71.
[31]SHI C,BHARGAVA B.Efficient MPEG video encryption algorithm[C]//IEEE Symposium on Reliable Distributed Systems.1998:381-386.
[32]LIAN S,LIU Z,REN Z,et al.Secure advanced video codingbased on selective encryption algorithms[J].IEEE Transactions on Consumer Electronics,2006,52(2):621-629.
[33]IKENAGA T,GOTO S.A partial scramble scheme for H.264 video[C]//7th International Conference on Asic.2013:802-805.
[34]SU P C,HSU C W,WU C Y.A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J].Multimedia Tools & Applications,2011,52(2/3):529-549.
[35]PENG F,GONG X Q,LONG M,et al.A selective encryptionscheme for protecting H.264/AVC video in multimedia social network[J].Multimedia Tools & Applications,2016,76(3):3235-3253.
[36]YEUNG S,ZHU S,ZENG B.Partial video encryption based on alternative integer transforms[C]//Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS).2010:933-936.
[37]YEUNG S K A,ZHU S,ZENG B.Design of new unitary trans-forms for perceptual video encryption[J].IEEE Transactions on Circuits & Systems for Video Technology,2011,21(9):1341-1345.
[38]SHAHID Z,PUECH W.Visual protection of HEVC video by selective encryption of CABAC binstrings[J].IEEE Transactions on Multimedia,2014,16(1):24-36.
[39]ZENG W,LEI S.Efficient frequency domain selective scramb-ling of digital video[J].IEEE Transactions on Multimedia,2003,5(1):118-129.
[40]LEE H J,NAM J.Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain[C]//Acm International Conference on Multimedia.2006:93-96.
[41]ZHOU J T,LIANG Z Q,CHEN Y,et al.Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table[J].IEEE Signal Processing Letters,2007,14(3):201-204.
[42]XIE D,KUO C.Enhanced multiple Huffman table (MHT) encryption scheme using key hopping[C]//2004 IEEE International Symposium on Circuits and Systems.2004:568-571.
[43]DUFAUX F,EBRAHIMI T.Scrambling for privacy protection in video surveillance systems[J].IEEE Transactions on Circuits & Systems for Video Technology,2008,18(8):1168-1174.
[44]DUFAUX F,EBRAHIMI T.H.264/AVC video scrambling for privacy protection[C]//2008 15th IEEE International Confe-rence on Image Processing.2008:1688-1691.
[45]FARAJALLAH M,HAMIDOUCHE W,DEFORGES O,et al.ROI encryption for the HEVC coded video contents[C]//2015 IEEE International Conference on Image Processing (ICIP).2015:3096-3100.
[46]TONG L,DAI F,ZHANG Y,et al.Restricted H.264/AVCvideo coding for privacy region scrambling[C]//2010 IEEE International Conference on Image Processing.2010:2089-2092.
[47]DAI F,TONG L,ZHANG Y,et al.Restricted H.264/AVCvideo coding for privacy protected video scrambling[J].Journal of Visual Communication & Image Representation,2011,22(6):479-490.
[48]TANG L.Methods for encrypting and decrypting MPEG video data efficiently[C]//Proceedings of the fourth ACM international conference on Multimedia.1997:219-229.
[49]BHARGAVA B,SHI C,WANG S.MPEG video encryption algorithms[J].Acm Multimedia,1998,24(1):57-79.
[50]PENG F,ZHU X W,LONG M.An ROI privacy protectionscheme for H.264 video based on FMO and Chaos[J].IEEE Transactions on Information Forensics & Security,2013,8(10):1688-1699.
[51]TEW Y,MINEMURA K,WONG K S.HEVC selective encryp-tion using transform skip signal and sign bin[C]//Asia-pacific Signal & Information Processing Association Summit & Confe-rence.2015:963-970.
[52]TAHA M A,SIDATY N,HAMIDOUCHE W,et al.End-to-End Real-Time ROI-Based Encryption in HEVC Videos[C]//2018 26th European Signal Processing Conference (EUSIPCO).2018:171-175.
[53]HAMIDOUCHE W,FARAJALLAH M,SIDATY N,et al.Real-time selective video encryption based on the chaos system in scalable HEVC extension[J].Signal Processing Image Communication,2017,58:73-86.
[54]ZHANG X,SEO S H,WANG C.A lightweight encryptionmethod for privacy protection in surveillance videos[J].IEEE Access,2018,6:18074-18087.
[55]ZHANG W.Hiding Privacy information in video surveillancesystem[C]//Processing of IEEE International Conference on Image Processing.2005:868-871.
[56]YU X,BABAGUCHI N.Privacy preserving:hiding a face in aface[M]//Computer Vision-ACCV 2007.Berlin:Springer,2007:651-661.
[57]LI G,ITO Y,YU X,et al.Recoverable privacy protection forvideo content distribution[J].EURASIP Journal on Information Security,2009,200(3):293031.
[58]DU L,LI Y.Privacy preserving for human object in video surveillance via visual cryptography[C]//Proceedings 2014 IEEE International Conference on Security,Pattern Analysis,and Cybernetics (SPAC).2014:80-85.
[59]MA X,ZENG W K,YANG W T,et al.Lossless ROI privacy protection of H.264/AVC compressed surveillance videos[J].IEEE Transactions on Emerging Topics in Computing,2016,4(3):349-362.
[60]NAWAZ T,FERRYMAN J.An annotation-free method forevaluating privacy protection techniques in videos[C]//2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).2015:1-6.
[61]KORSHUNOV P,MELLE A,DUGELAY J L,et al.Frame-work for objective evaluation of privacy filters[C]//SPIE Optical Engineering+Applications.2013:219-224.
[62]SOHN H,LEE D,NEVE W D,et al.An objective and subjectiveevaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR[M]//Effective Surveillance for Homeland Security:Balancing Technology and Social issues.Boca Raton:CRC Press,Taylor & Francis,2013:111-140.
[63]ERDÉLYI Á,WINKLER T,RINNER B.Privacy protection vs.utility in visual data-An objective evaluation framework[J].Multimedia Tools and Applications,2018,77(2):2285-2312.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[3] YANG Tao-yu, XU Yuan-yuan, TAN Zeng-jie. Tile Partition Optimized Omnidirectional Video Coding for 6G Network [J]. Computer Science, 2022, 49(6): 66-72.
[4] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[5] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[6] CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277.
[7] MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305.
[8] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[9] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[10] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[11] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[12] JI Xiao-xiang, SHEN Hang, BAI Guang-wei. Non-orthogonal Multiple Access Enabled Scalable Video Multicast in HetNets [J]. Computer Science, 2021, 48(11): 356-362.
[13] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[14] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[15] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!