通信学报 ›› 2013, Vol. 34 ›› Issue (8): 154-160.doi: 10.3969/j.issn.1000-436x.2013.08.020
佟玲玲,李扬曦,黄文延
出版日期:
2013-08-25
发布日期:
2017-08-31
基金资助:
Ling-ling TONG,Yang-xi LI,Wen-ting HUANG
Online:
2013-08-25
Published:
2017-08-31
Supported by:
摘要:
互联网的快速发展和各类视频应用的日益普及,使视频个人隐私保护得到广泛关注。如何在保证视频应用的同时使隐私信息不被泄露是目前亟待研究和解决的热点问题。针对这些问题从视频隐私保护技术的研究现状进行综述,从隐私提取、隐私区域保护及访问权限控制3个方面进行概括、比较和分析。此外,对与视频隐私保护相关的一些问题,如隐私的定义、感知安全性评价等方面进行了讨论。最后总结了视频隐私保护技术面临的挑战,并对其发展趋势进行展望。
佟玲玲,李扬曦,黄文延. 视频隐私保护技术综述[J]. 通信学报, 2013, 34(8): 154-160.
Ling-ling TONG,Yang-xi LI,Wen-ting HUANG. Review on video privacy protection[J]. Journal on Communications, 2013, 34(8): 154-160.
表1
典型的视频隐私保护方案"
文献 | 隐私区域提取 | 隐私区域保护 | 应用场景 |
[ | 融合RFID信息的简单背景运动物体检测 | 编码前保护:数据替换 | 有简单背景的室内环境,保护特定人物信息 |
[ | 基于PCA的人脸识别方法[ | 编码前保护:数据替换 | 使用人脸识别软件进行面部图像识别 |
[ | 基于辅助信息的人脸检测 | 编码前保护:数据替换 | 复杂场景中的特定人物保护 |
[ | 假设区域已知 | 编码前保护:编码前加密 | 与编码标准无关的场景 |
[ | 人脸及运动区域检测 | 编码前保护:编码前加密 | 室内及室外视频监控系统 |
[ | 运动检测及跟踪 | 编码前保护:去除外观保持结构 | 养老院,保护特定人物但保持其行为可见 |
[ | 假设区域已知 | 编码前保护:数据多重拷贝 | 视频监控系统 |
[ | 假设区域已知 | 与编码结合的保护:变换系数加密 | 视频监控系统 |
[ | 假设区域已知 | 与编码结合的保护:熵编码加密 | 需要对物体形状及纹理信息同时进行保护的场景 |
[ | 运动物体及人脸检测 | 与编码结合的保护:熵编码加密 | 网络多媒体应用 |
[ | 基于辅助信息的运动物体检测 | 数据隐藏:基于物体的图像修补和数据隐藏 | 实验室环境下的多摄像头系统 |
[ | 人脸检测 | 数据隐藏:人脸替换和数据隐藏 | 视频监控系统 |
[1] | SENIOR A , PANKANTI S ,et al. Blinkering Surveillance:Enabling Video Privacy Through Computer Vision[R]. IBM Technical Paper,RC22886 (W0308-109), 2003. |
[2] | Special issue on privacy-aware multimedia surveillance systems[EB/OL]. . |
[3] | Special issue on multimedia contents security in social networks applications[EB/OL]. . |
[4] | Special issue on recent advances on analysis and processing for distributed video systems[EB/OL]. . |
[5] | MARTIN K , PLATANIOTIS K N . Privacy protected surveillance using secure visual object coding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008,18(8): 1152-1162. |
[6] | WICKRAMASURI J , DATT M ,et al. Privacy protecting data collection in media spaces[A]. Proceedings of the 12th annual ACM international conference on Multimedia[C]. ACM, 2004. 48-55. |
[7] | STAUFFER C , GRIMSON W E L . Adaptive background mixture models for real-time tracking[A]. IEEE Computer Society Conference on Computer Vision and Pattern Recognition[C]. 1999. |
[8] | STAUFFER C , GRIMSON W L . Learning patterns of activity using real-time tracking[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000,22(8): 747-757. |
[9] | NEWTON E , SWEENEY L , MAIN B . Preserving privacy by de-identifying face images[J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(2): 232-243. |
[10] | CHEN D , CHANG Y , YAN R ,et al. Tools for protecting the privacy of specific individuals in video[J]. EURASIP Journal on Advances in Signal Processing, 2007,(2007): 1-9. |
[11] | BOULT E . Pico:privacy through invertible cryptographic obscuration[A]. Computer Vision for Interactive and Intelligent Environment[C]. 2005. 27-38. |
[12] | TURK M , PENTLAND A . Eigenfaces for recognition[J]. Journal of Cognitive Neuroscience, 1991,3(1): 71-86. |
[13] | YILMAZ A , JAVED O , SHAH M . Object tracking:a survey[J]. Acm Computing Surveys, 2006,38(4): 13-18. |
[14] | YANG M , KRIEGMAN D , AHUJA N . Detecting faces in images:a survey[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(1): 34-58. |
[15] | SCHIFF J et al . Respectful cameras:detecting visual markers in real-time to address privacy concerns[A]. Protecting Privacy in Video Surveillance[C]. London Springer, 2009. |
[16] | ZHAO J , CHEUNG S C . Multi-camera surveillance with visual tagging and generic camera placement[A]. ACM/IEEE Int Conf on Distributed Smart Cameras[C]. 2007. 259-266. |
[17] | LUO Y ,et al. Anonymous subject identification in privacy-aware video surveillance[A]. ,IEEE International Conference on Multimedia and Expo (ICME)[C]. 2010. 83-88. |
[18] | MEGHERBI N ,et al. Joint audio-video people tracking using belief theory[A]. IEEE Int Conf on Advanced Video and Signal Based Surveillance[C]. 2005. 135-140. |
[19] | KUMAR P , MITTAL A . A multimodal audio visible and infrared surveillance system (maviss)[A]. IEEE Int Conf of Intelligent Sensing and Information Processing[C]. 2005. 151-156. |
[20] | SHAKSHUKI E , WANG Y . Using agent-based approach to tracking moving objects[A]. 17th International Conference on 2003 Advanced Information Networking and Applications[C]. 2003. 578-581. |
[21] | CHEUNG S C ,et al. Protecting and managing privacy information in video surveillance systems[A]. Protecting Privacy in Video Surveillance[C]. 2009. 11-33. |
[22] | SOLANKI K ,et al. High-volume data hiding in images:introducing perceptual criteria into quantization based embedding[A]. IEEE International Conference on Acoustics,Speech,and Signal Processing (ICASSP)[C]. 2002. 3485-3488. |
[23] | AGRAWAL P , NARAYANAN P J . Person de-identification in videos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011,21(3): 299-310. |
[24] | KITAHARA I ,et al. Stealth vision for protecting privacy[A]. Proceedings of the 17th International Conference on Pattern Recognition[C]. 2004. 404-407. |
[25] | CARRILLO P , KALVA H , MAGLIVERAS S . Compression independent object encryption for ensuring privacy in video surveillance[A]. IEEE International Conference on Multimedia and Expo[C]. 2008. 273-276. |
[26] | CARRILLO P , KALVA H , MAGLIVERAS S . Compression independent reversible encryption for privacy in video surveillance[J]. EURASIP Journal on Information Security, 2009,(2009): 1-13. |
[27] | UPMANYU M ,et al. Efficient privacy preserving video surveillance[A]. IEEE 12th International Conference on Computer Vision[C]. 2009. 1639-1646. |
[28] | YEUNG S , ZHU S , ZENG B . Partial video encryption based on alternative integer transforms[A]. Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS)[C]. 2010. 933-936. |
[29] | YEUNG S , ZHU S , ZENG B . Partial video encryption based on alternating transforms[J]. IEEE Signal Processing Letters, 2009,16(10): 893-896. |
[30] | AHN J , SHIM H J , JEON B ,et al. Digital video scrambling method using intra prediction mode[A]. Advances in Multimedia Information Processing-PCM 2004[C]. Springer Berlin Heidelberg, 2005. 386-393. |
[31] | 蒋建国, 李援, 梁立伟 . H.264 视频加密算法的研究及改进[J]. 电子学报, 2007,35(9): 1724-1727. JIANG J G , LI Y , LIANG L W . Research and improvement of the video encryption algorithm for H.264[J]. Chinese Journal of Electronics, 2007,35(9): 1724-1727. |
[32] | LIAN S , LIU Z , REN Z et al . Secure advanced video coding based on selective encryption algorithms[J]. IEEE Transactions on Consumer Electronics, 2006,52(2): 621-629. |
[33] | LIU Z , LI X . Motion vector encryption in multimedia streaming[A]. Proceedings 10th International Multimedia Modelling Conference[C]. 2004. 64-71. |
[34] | SU P , HSU C , WU C . A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting[J]. Multimedia Tools and Applications, 2011,52(2/3): 529-549. |
[35] | LI S ,et al. On the design of perceptual MPEG-video encryption algorithms[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007,17(2): 214-223. |
[36] | THOMAS N . A novel secure H.264 transcoder using selective encryption[A]. International Conference on Image Processing.IEEE[C]. 2007. 85-88. |
[37] | LIU Y , YUAN C , ZHONG Y . A new digital rights management system in mobile applications using H.264 encryption[A]. The 9th International Conference on Advanced Communication Technology[C]. 2007. 583-586. |
[38] | TOSUN A , FENG W . Efficient multi-layer coding and encryption of MPEG video streams[A]. IEEE International Conference on Multimedia and Expo[C]. 2000. 119-122. |
[39] | ZENG W , LEI S . Efficient frequency domain selective scrambling of digital video[J]. IEEE Transactions on Multimedia, 2003,5(1): 118-129. |
[40] | LEE H J . Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain[A]. Proceedings of the 14th annual ACM international conference on Multimedia[C]. 2006. 93-96. |
[41] | DUFAUX F , EBRAHIMI T . Scrambling for privacy protection in video surveillance systems[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008,18(8): 1168-1174. |
[42] | XIE D , KUO C . Enhanced multiple Huffman table (MHT) encryption scheme using key hopping[A]. Proceedings of the International Symposium on Circuits and Systems[C]. 2004. 568-571. |
[43] | 包先雨, 蒋建国, 袁炜 ,等. H.264/AVC标准中基于 CABAC的数字视频加密研究[J]. 通信学报, 2007,28(6): 24-29. BAO X Y , JIANG J G , YUAN W ,et al. Study of CABAC-based digital video encryption in the H.264/AVC standard[J]. Journal on Communications, 2007,28(6): 24-29. |
[44] | DUFAUX F , EBRAHIMI T . H.264/AVC video scrambling for privacy protection[A]. 15th IEEE International Conference on Image Processing[C]. 2008. 1688-1691. |
[45] | 于俊清, 刘青, 何云峰 . 基于感兴趣区域的 H.264 视频加密算法[J]. 计算机学报, 2010,33(5): 945-953. YU J Q , LIU Q , HE Y F.H . 264 Video encryption algorithm based on region of interest[J]. Chinese Journal of Computers, 2010,33(5): 945-953. |
[46] | DAI F , TONG L , ZHANG Y ,et al. Restricted H.264/AVC video coding for privacy protected video scrambling[J]. Journal of Visual Communication and Image Representation, 2011,22(6): 479-490. |
[47] | LI G , ITO Y , YU X ,et al. A discrete wavelet transform based recoverable image processing for privacy protection[A]. Proceedings of the 15th IEEE International Conference on Image Processing[C]. 2008. 1372-1375. |
[48] | YU X , BABAGUCHI N . Privacy preserving:hiding a face in a face[A]. Computer Vision–ACCV 2007[C]. Springer Berlin Heidelberg, 2007. 651-661. |
[49] | ZHANG W , CHEUNG S C , CHEN M . Hiding privacy information in video surveillance system[A]. Proceedings of the 12th IEEE International Conference on Image Processing[C]. 2005. 868-871. |
[50] | LIOUDAKIS G ,et al. A middleware architecture for privacy protection[J]. Computer Networks, 2007,51(16): 4679-4696. |
[51] | SUN J , XU Z , LIU J ,et al. An objective visual security assessment for cipher-images based on local entropy[J]. Multimedia Tools and Applications, 2011,53(1): 75-95. |
[52] | TONG L L , DAI F , ZHANG Y D ,et al. Visual security evaluation for video encryption[A]. Proceedings of the International Conference on Multimedia[C]. 2010. 835-838. |
[53] | HOSIK S , NEVE W , YONG R . Privacy protection in video surveillance systems:analysis of subband-adaptive scrambling in JPEG XR[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2011,21(2): 170-177. |
[54] | VENKATESH M , CHEUNG S , ZHAO J . Efficient object-based video inpainting[J]. Pattern Recognition Letters, 2009,30(2): 168-179. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[4] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[8] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[9] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[10] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[11] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
[12] | 史瑞, 封化民, 谢惠琴, 史国振, 刘飚, 杨旸. 基于带智能卡的移动终端实现的隐私保护的属性票据方案[J]. 通信学报, 2022, 43(10): 26-41. |
[13] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[14] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
[15] | 马立川, 彭佳怡, 裴庆祺, 朱浩瑾. 高效的决策树隐私分类服务协议[J]. 通信学报, 2021, 42(8): 80-89. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|