Cichowski et al., 2013 - Google Patents
Visual data encryption for privacy enhancement in surveillance systemsCichowski et al., 2013
- Document ID
- 17063178857086319239
- Author
- Cichowski J
- Czyżewski A
- Kostek B
- Publication year
- Publication venue
- International Conference on Advanced Concepts for Intelligent Vision Systems
External Links
Snippet
In this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting …
- 230000000007 visual effect 0 title abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00711—Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5269033B2 (en) | Image privacy masking method and apparatus | |
| Ito et al. | Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks | |
| Guo et al. | Efficient privacy-preserving anomaly detection and localization in bitstream video | |
| Bao et al. | Survey on deep learning applications in digital image security | |
| Kumar et al. | Studies on Steganography Images and Videos Using Deep Learning Techniques | |
| Chen et al. | Reversible attack based on local visible adversarial perturbation | |
| Dhingra et al. | A novel chaotic map-based encryption scheme for surveillance videos | |
| Darwish et al. | Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function | |
| Dong et al. | A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain | |
| Vairaprakash et al. | A Discrete Rajan Transform-based robustness improvement encrypted watermark scheme backed by Support Vector Machine | |
| Cichowski et al. | Visual data encryption for privacy enhancement in surveillance systems | |
| Savakar et al. | Copy-move image forgery detection using shannon entropy | |
| Kumar et al. | A Secure Image Watermarking Scheme Based on DWT, SVD and Arnold Transform | |
| Ediriweera et al. | Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography | |
| Suneetha et al. | Enhancement of Security for Cloud Data Using Partition-Based Steganography | |
| Soman et al. | Block-based forgery detection using global and local features | |
| Mahurkar et al. | Advance Approach for Securing Secret Information Through the Combination of Reversible Data Hiding and Visual Cryptography Mechanism | |
| Zhang et al. | StegEraser: Defending cybersecurity against malicious covert communications | |
| Wang et al. | An efficient passive authentication scheme for copy-move forgery based on DCT | |
| MaungMaung et al. | On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning | |
| Modiga et al. | Secure Embedding of Sensitive Identity Data in Surveillance Videos Using Steganography | |
| Chang et al. | Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. | |
| Ahuja et al. | Video data security: analysis, relevance and open challenges | |
| Bhure et al. | Securing Data Using Image Steganography and Encryption Techniques 22 | |
| Abd Al-Munaf et al. | Encryption edge points in face using light stream algorithm |