[go: up one dir, main page]

Cichowski et al., 2013 - Google Patents

Visual data encryption for privacy enhancement in surveillance systems

Cichowski et al., 2013

Document ID
17063178857086319239
Author
Cichowski J
Czyżewski A
Kostek B
Publication year
Publication venue
International Conference on Advanced Concepts for Intelligent Vision Systems

External Links

Snippet

In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00711Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis

Similar Documents

Publication Publication Date Title
JP5269033B2 (en) Image privacy masking method and apparatus
Ito et al. Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks
Guo et al. Efficient privacy-preserving anomaly detection and localization in bitstream video
Bao et al. Survey on deep learning applications in digital image security
Kumar et al. Studies on Steganography Images and Videos Using Deep Learning Techniques
Chen et al. Reversible attack based on local visible adversarial perturbation
Dhingra et al. A novel chaotic map-based encryption scheme for surveillance videos
Darwish et al. Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function
Dong et al. A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain
Vairaprakash et al. A Discrete Rajan Transform-based robustness improvement encrypted watermark scheme backed by Support Vector Machine
Cichowski et al. Visual data encryption for privacy enhancement in surveillance systems
Savakar et al. Copy-move image forgery detection using shannon entropy
Kumar et al. A Secure Image Watermarking Scheme Based on DWT, SVD and Arnold Transform
Ediriweera et al. Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography
Suneetha et al. Enhancement of Security for Cloud Data Using Partition-Based Steganography
Soman et al. Block-based forgery detection using global and local features
Mahurkar et al. Advance Approach for Securing Secret Information Through the Combination of Reversible Data Hiding and Visual Cryptography Mechanism
Zhang et al. StegEraser: Defending cybersecurity against malicious covert communications
Wang et al. An efficient passive authentication scheme for copy-move forgery based on DCT
MaungMaung et al. On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning
Modiga et al. Secure Embedding of Sensitive Identity Data in Surveillance Videos Using Steganography
Chang et al. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack.
Ahuja et al. Video data security: analysis, relevance and open challenges
Bhure et al. Securing Data Using Image Steganography and Encryption Techniques 22
Abd Al-Munaf et al. Encryption edge points in face using light stream algorithm