Treffer: Privacy Protected Surveillance Using Secure Visual Object Coding

Title:
Privacy Protected Surveillance Using Secure Visual Object Coding
Source:
Video SurveillanceIEEE transactions on circuits and systems for video technology. 18(8):1152-1162
Publisher Information:
New York, NY: Institute of Electrical and Electronics Engineers, 2008.
Publication Year:
2008
Physical Description:
print, 24 ref
Original Material:
INIST-CNRS
Subject Terms:
Telecommunications, Télécommunications, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Electronique, Electronics, Circuits électriques, optiques et optoélectroniques, Electric, optical and optoelectronic circuits, Propriétés des circuits, Circuit properties, Circuits électroniques, Electronic circuits, Convertisseurs de signal, Signal convertors, Telecommunications et theorie de l'information, Telecommunications and information theory, Théorie de l'information, du signal et des communications, Information, signal and communications theory, Théorie du signal et des communications, Signal and communications theory, Codage, codes, Coding, codes, Cryptographie, Cryptography, Télécommunications, Telecommunications, Systèmes, réseaux et services de télécommunications, Systems, networks and services of telecommunications, Transmission et modulation (techniques et équipements), Transmission and modulation (techniques and equipments), Base ondelette, Wavelet base, Base ondíta, Circuit codeur, Coding circuit, Circuito codificación, Codage adaptatif, Adaptive coding, Codificación adaptativa, Confidentialité, Confidentiality, Confidencialidad, Corps forme arbitraire, Arbitrary shape body, Cuerpo forma arbitraria, Débit information, Information rate, Índice información, Décryptage, Decryption, Desciframiento, Evaluation performance, Performance evaluation, Evaluación prestación, Monitorage, Monitoring, Monitoreo, Méthode partition, Partition method, Método partición, Partitionnement, Partitioning, Subdivisión, Structure hiérarchisée, Hierarchized structure, Estructura jerarquizada, Sécurité, Safety, Seguridad, Texture, Textura, Théorie vitesse distorsion, Rate distortion theory, Traitement signal, Signal processing, Procesamiento señal, Transformation ondelette, Wavelet transformation, Transformación ondita, Transmission information, Information transmission, Transmisión información, Vie privée, Private life, Vida privada, Cryptage sélectif, Selective encryption, Encryption, partitioning in hierarchical trees (SPIHT), privacy protection, security, set partitioning in hierarchical trees (SPIHT), shape adaptive coding, shape and texture coding, surveillance, visual object coding, wavelet-based coding
Document Type:
Fachzeitschrift Article
File Description:
text
Language:
English
Author Affiliations:
Edward S. Rogers Sr. Department of Electrical and Computer Engineering, Multimedia Laboratory, University of Toronto, Toronto, ON M5S 3G4, Canada
ISSN:
1051-8215
Rights:
Copyright 2008 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Electronics

Telecommunications and information theory
Accession Number:
edscal.20657735
Database:
PASCAL Archive

Weitere Informationen

This paper presents the Secure Shape and Texture SPIHT (SecST-SPIHT) scheme for secure coding of arbitrarily shaped visual objects. The scheme can be employed in a privacy protected surveillance system, whereby visual objects are encrypted so that the content is only available to authorized personnel with the correct decryption key. The secure visual object coder employs shape and texture set partitioning in hierarchical trees (ST-SPIHT) along with a novel selective encryption scheme for efficient, secure storage and transmission of visual object shape and textures. The encryption is performed in the compressed domain and does not affect the rate-distortion performance of the coder. A separate parameter for each encrypted object controls the strength of the encryption versus required processing overhead. Security analyses are provided, demonstrating the confidentiality of both the encrypted and unencrypted portions of the secured output bit-stream, effectively securing the entire object shape and texture content. Experimental results showed that no object details are revealed to attackers who do not possess the correct decryption key. Using typical parameter values and output bit-rates, the SecST-SPIHT coder is shown to require encryption on less than 5% of the output bit-stream, a significant reduction in computational overhead compared to whole content encryption schemes.