A selective encryption scheme for region of interest (ROI) of H.264 video is proposed to protect the
personal privacy in a video. The most important part of video can be protected with less cost and operation by
only encrypting the content of ROIs. Human face regions are selected as ROI and detected by using Gaussian
skin color model. Independent ROI encoding is realized with the mechanism of flexible macro-block ordering
(FMO). Frames are divided into grid-like slice-groups which can be combined flexibly to form a required ROI.
Both luminance component and chrominance component of the macro-blocks in ROI are modified to achieve good
encryption quality and location accuracy. In the process of decryption, the encrypted area is located automatically.
There is no need to transmit additional position information of ROIs to the end of decryption. The encrypted video
is decrypted correctly with the secret key. JM18.4 software is employed to perform the simulation experiment.
Experimental results show the accuracy and effectiveness of our scheme to encrypt and decrypt the ROIs in H.264
video.
GUO Jie*(郭捷), XU Jia-yun (徐家运), BAO Jia-li (鲍佳立)
. Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video[J]. Journal of Shanghai Jiaotong University(Science), 2014
, 19(4)
: 385
-391
.
DOI: 10.1007/s12204-014-1513-7
[1] Stutz T, Uhl A. A survey of H.264 AVC/SVC encryption [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(3): 325-339.
[2] Newton E M, Sweeney L, Malin B. Preserving privacy by de-identifying face images [J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(2): 232-243.
[3] Qi M B, Chen X R, Jiang J G, et al. Face protection of H. 264 video based on detecting and tracking [C]//Proceedings of 8th International Conference on Electronic Measurement and Instruments. Xi’an,China: IEEE, 2007: 2172-2177.
[4] Kim Y Y, Jin S H, Bae T M, et al. A selective video encryption for the region of interest in scalable video coding [C]//Proceedings of IEEE TENCON 2007. Taipei, China: IEEE, 2007: 1-4.
[5] Dufaux F, Ebrahimi T. Scrambling for privacy protection in video surveillance systems [J]. IEEE Transactions on Circuits and Systems for Video Technology,2008, 18(8): 1168-1174.
[6] Zhao Y D, Zhuo L, Mao N S, et al. An object-based unequal encryption method for H.264 compressed surveillance videos [C]//Proceedings of 2012 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC2012). Hong Kong,China: IEEE, 2012: 419-424.
[7] Peng F, Zhu X W, Long M. An ROI privacy protection scheme for H.264 video based on FMO and chaos [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(10): 1688-1699.
[8] Wang C X, Li Z Y. Face detection based on skin Gaussian model and KL transform [C]//Proceedings of 9th ACIS International Conference on Software Engineering,Artificial Intelligence, Networking, and Parallel/Distribute Computing. Phuket, Thailand: IEEE,2008: 522-525.