Title :
Coding and encryption of visual objects for privacy protected surveillance
Author :
Martin, Karl ; Plataniotis, Konstantinos N.
Author_Institution :
Edward S. Rogers Sr. Dept. of ECE, Univ. of Toronto, Toronto, ON
Abstract :
This paper presents a scheme for secure coding of arbitrarily-shaped visual objects. Called SecST-SPIHT, it employs SPIHT based coding along with selective encryption for efficient, secure storage and transmission of visual object shape and texture. The selective encryption utilizes a novel bit classification scheme which ensures protection of the entire code by encrypting only a small number of bits (less than 5% for securing shape and texture, and less than 0.5% for just the texture). The encryption is performed in the compressed domain and does not affect the rate-distortion performance of the coder. A parameter allows control over the strength of the encryption versus required processing overhead. The scheme can be employed in a privacy protected surveillance system, whereby visual objects of human subjects are encrypted so that the content is only available to certain entities, such as persons of authority, possessing the correct decryption key.
Keywords :
cryptography; data privacy; image coding; trees (mathematics); video surveillance; SecST-SPIHT; arbitrarily-shaped visual object; bit classification scheme; hierarchical trees; privacy protected surveillance; selective encryption; shape set partitioning; texture set partitioning; visual object coding; visual object encryption; visual object shape; visual object texture; Cryptography; Humans; Monitoring; Privacy; Protection; Rate-distortion; Security; Shape; Strontium; Video surveillance; Cryptography; Image coding; Privacy; Security; Surveillance;
Conference_Titel :
Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-1765-0
Electronic_ISBN :
1522-4880
DOI :
10.1109/ICIP.2008.4712016