An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos

With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2013-10, Vol.8 (10), p.1688-1699
Hauptverfasser: FEI PENG, ZHU, Xiao-Wen, MIN LONG
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1699
container_issue 10
container_start_page 1688
container_title IEEE transactions on information forensics and security
container_volume 8
creator FEI PENG
ZHU, Xiao-Wen
MIN LONG
description With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, where human face regions are selected as an example of ROI. First, the human face regions in the video are detected and extracted. Then, they are mapped into slice groups by using FMO technology in H.264. After that, these regions are encrypted using selective video encryption based on chaos. Experimental results and analysis show that the proposed scheme can effectively protect the private information of H.264 video and, therefore, can strike a good balance among the security, encryption efficiency, and coding performance. It has great potential to be used in the privacy protection of the video of CCTV.
doi_str_mv 10.1109/TIFS.2013.2259819
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1432979813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6507633</ieee_id><sourcerecordid>3073295411</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-6a3e05ca10671ebe54e539205560703f087212bd60c3d4d653c9b4331e6a9e013</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhhdRsFZ_gHgJiOClNZOv3T3WYj-gUrHVa0izs3RLu6nJVui_N6WlB3OZwDzz8vIkyT3QLgDNX-bjwazLKPAuYzLPIL9IWiCl6ijK4PL8B36d3ISwolQIUFkrGfZq8jkdkw9f_Rq7j9M1aJvK1WRml7hBUjpPRl2mBPmuCnTk1QQsSNwP3qfE1AXpL40Lt8lVadYB706znXwN3ub9UWcyHY77vUnHcqmajjIcqbQGqEoBFygFSp4zGtvRlPKSZikDtigUtbwQhZLc5gvBOaAyOcb67eT5mLv17meHodGbKlhcr02Nbhc0xFwp8_gi-vgPXbmdr2M7DYKzPI2aeKTgSFnvQvBY6q2vNsbvNVB9UKsPavVBrT6pjTdPp2QTrFmX3tS2CudDlqaZEDyL3MORqxDxvFaSpopz_gfk0nyb</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1432979813</pqid></control><display><type>article</type><title>An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos</title><source>IEEE Electronic Library (IEL)</source><creator>FEI PENG ; ZHU, Xiao-Wen ; MIN LONG</creator><creatorcontrib>FEI PENG ; ZHU, Xiao-Wen ; MIN LONG</creatorcontrib><description>With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, where human face regions are selected as an example of ROI. First, the human face regions in the video are detected and extracted. Then, they are mapped into slice groups by using FMO technology in H.264. After that, these regions are encrypted using selective video encryption based on chaos. Experimental results and analysis show that the proposed scheme can effectively protect the private information of H.264 video and, therefore, can strike a good balance among the security, encryption efficiency, and coding performance. It has great potential to be used in the privacy protection of the video of CCTV.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2013.2259819</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Artificial intelligence ; CCTV ; Chaos ; Chaos theory ; chaotic encryption ; Closed circuit television ; Computer information security ; Computer science; control theory; systems ; Cryptography ; Encryption ; Exact sciences and technology ; Face ; FMO ; H.264 coding ; Human ; Image color analysis ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Pattern recognition. Digital image processing. Computational geometry ; Privacy ; privacy protection ; ROI ; Signal and communications theory ; Software ; Strikes ; Studies ; Surveillance ; Telecommunications and information theory</subject><ispartof>IEEE transactions on information forensics and security, 2013-10, Vol.8 (10), p.1688-1699</ispartof><rights>2014 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-6a3e05ca10671ebe54e539205560703f087212bd60c3d4d653c9b4331e6a9e013</citedby><cites>FETCH-LOGICAL-c356t-6a3e05ca10671ebe54e539205560703f087212bd60c3d4d653c9b4331e6a9e013</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6507633$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6507633$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=27784438$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>FEI PENG</creatorcontrib><creatorcontrib>ZHU, Xiao-Wen</creatorcontrib><creatorcontrib>MIN LONG</creatorcontrib><title>An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, where human face regions are selected as an example of ROI. First, the human face regions in the video are detected and extracted. Then, they are mapped into slice groups by using FMO technology in H.264. After that, these regions are encrypted using selective video encryption based on chaos. Experimental results and analysis show that the proposed scheme can effectively protect the private information of H.264 video and, therefore, can strike a good balance among the security, encryption efficiency, and coding performance. It has great potential to be used in the privacy protection of the video of CCTV.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>CCTV</subject><subject>Chaos</subject><subject>Chaos theory</subject><subject>chaotic encryption</subject><subject>Closed circuit television</subject><subject>Computer information security</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Exact sciences and technology</subject><subject>Face</subject><subject>FMO</subject><subject>H.264 coding</subject><subject>Human</subject><subject>Image color analysis</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Privacy</subject><subject>privacy protection</subject><subject>ROI</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Strikes</subject><subject>Studies</subject><subject>Surveillance</subject><subject>Telecommunications and information theory</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhhdRsFZ_gHgJiOClNZOv3T3WYj-gUrHVa0izs3RLu6nJVui_N6WlB3OZwDzz8vIkyT3QLgDNX-bjwazLKPAuYzLPIL9IWiCl6ijK4PL8B36d3ISwolQIUFkrGfZq8jkdkw9f_Rq7j9M1aJvK1WRml7hBUjpPRl2mBPmuCnTk1QQsSNwP3qfE1AXpL40Lt8lVadYB706znXwN3ub9UWcyHY77vUnHcqmajjIcqbQGqEoBFygFSp4zGtvRlPKSZikDtigUtbwQhZLc5gvBOaAyOcb67eT5mLv17meHodGbKlhcr02Nbhc0xFwp8_gi-vgPXbmdr2M7DYKzPI2aeKTgSFnvQvBY6q2vNsbvNVB9UKsPavVBrT6pjTdPp2QTrFmX3tS2CudDlqaZEDyL3MORqxDxvFaSpopz_gfk0nyb</recordid><startdate>20131001</startdate><enddate>20131001</enddate><creator>FEI PENG</creator><creator>ZHU, Xiao-Wen</creator><creator>MIN LONG</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20131001</creationdate><title>An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos</title><author>FEI PENG ; ZHU, Xiao-Wen ; MIN LONG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-6a3e05ca10671ebe54e539205560703f087212bd60c3d4d653c9b4331e6a9e013</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>CCTV</topic><topic>Chaos</topic><topic>Chaos theory</topic><topic>chaotic encryption</topic><topic>Closed circuit television</topic><topic>Computer information security</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Exact sciences and technology</topic><topic>Face</topic><topic>FMO</topic><topic>H.264 coding</topic><topic>Human</topic><topic>Image color analysis</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Privacy</topic><topic>privacy protection</topic><topic>ROI</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Strikes</topic><topic>Studies</topic><topic>Surveillance</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>FEI PENG</creatorcontrib><creatorcontrib>ZHU, Xiao-Wen</creatorcontrib><creatorcontrib>MIN LONG</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FEI PENG</au><au>ZHU, Xiao-Wen</au><au>MIN LONG</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2013-10-01</date><risdate>2013</risdate><volume>8</volume><issue>10</issue><spage>1688</spage><epage>1699</epage><pages>1688-1699</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>With the increase of terrorist and criminal activities, closed circuit television (CCTV) is widely used on many occasions. However, abuse of surveillance video may result in the leakage of personal privacy. To protect the privacy in the video of CCTV, an encryption scheme for region of interest (ROI) of H.264 video based on flexible macroblock ordering (FMO) and chaos is proposed in this paper, where human face regions are selected as an example of ROI. First, the human face regions in the video are detected and extracted. Then, they are mapped into slice groups by using FMO technology in H.264. After that, these regions are encrypted using selective video encryption based on chaos. Experimental results and analysis show that the proposed scheme can effectively protect the private information of H.264 video and, therefore, can strike a good balance among the security, encryption efficiency, and coding performance. It has great potential to be used in the privacy protection of the video of CCTV.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIFS.2013.2259819</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2013-10, Vol.8 (10), p.1688-1699
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_1432979813
source IEEE Electronic Library (IEL)
subjects Applied sciences
Artificial intelligence
CCTV
Chaos
Chaos theory
chaotic encryption
Closed circuit television
Computer information security
Computer science
control theory
systems
Cryptography
Encryption
Exact sciences and technology
Face
FMO
H.264 coding
Human
Image color analysis
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Pattern recognition. Digital image processing. Computational geometry
Privacy
privacy protection
ROI
Signal and communications theory
Software
Strikes
Studies
Surveillance
Telecommunications and information theory
title An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T10%3A03%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20ROI%20Privacy%20Protection%20Scheme%20for%20H.264%20Video%20Based%20on%20FMO%20and%20Chaos&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=FEI%20PENG&rft.date=2013-10-01&rft.volume=8&rft.issue=10&rft.spage=1688&rft.epage=1699&rft.pages=1688-1699&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2013.2259819&rft_dat=%3Cproquest_RIE%3E3073295411%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1432979813&rft_id=info:pmid/&rft_ieee_id=6507633&rfr_iscdi=true