Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video

Expand
  • (College of Information Security, Shanghai Jiaotong University, Shanghai 200240, China)

Online published: 2014-10-13

Abstract

A selective encryption scheme for region of interest (ROI) of H.264 video is proposed to protect the personal privacy in a video. The most important part of video can be protected with less cost and operation by only encrypting the content of ROIs. Human face regions are selected as ROI and detected by using Gaussian skin color model. Independent ROI encoding is realized with the mechanism of flexible macro-block ordering (FMO). Frames are divided into grid-like slice-groups which can be combined flexibly to form a required ROI. Both luminance component and chrominance component of the macro-blocks in ROI are modified to achieve good encryption quality and location accuracy. In the process of decryption, the encrypted area is located automatically. There is no need to transmit additional position information of ROIs to the end of decryption. The encrypted video is decrypted correctly with the secret key. JM18.4 software is employed to perform the simulation experiment. Experimental results show the accuracy and effectiveness of our scheme to encrypt and decrypt the ROIs in H.264 video.

Cite this article

GUO Jie*(郭捷), XU Jia-yun (徐家运), BAO Jia-li (鲍佳立) . Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video[J]. Journal of Shanghai Jiaotong University(Science), 2014 , 19(4) : 385 -391 . DOI: 10.1007/s12204-014-1513-7

References

[1] Stutz T, Uhl A. A survey of H.264 AVC/SVC encryption [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(3): 325-339.
[2] Newton E M, Sweeney L, Malin B. Preserving privacy by de-identifying face images [J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(2): 232-243.
[3] Qi M B, Chen X R, Jiang J G, et al. Face protection of H. 264 video based on detecting and tracking [C]//Proceedings of 8th International Conference on Electronic Measurement and Instruments. Xi’an,China: IEEE, 2007: 2172-2177.
[4] Kim Y Y, Jin S H, Bae T M, et al. A selective video encryption for the region of interest in scalable video coding [C]//Proceedings of IEEE TENCON 2007. Taipei, China: IEEE, 2007: 1-4.
[5] Dufaux F, Ebrahimi T. Scrambling for privacy protection in video surveillance systems [J]. IEEE Transactions on Circuits and Systems for Video Technology,2008, 18(8): 1168-1174.
[6] Zhao Y D, Zhuo L, Mao N S, et al. An object-based unequal encryption method for H.264 compressed surveillance videos [C]//Proceedings of 2012 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC2012). Hong Kong,China: IEEE, 2012: 419-424.
[7] Peng F, Zhu X W, Long M. An ROI privacy protection scheme for H.264 video based on FMO and chaos [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(10): 1688-1699.
[8] Wang C X, Li Z Y. Face detection based on skin Gaussian model and KL transform [C]//Proceedings of 9th ACIS International Conference on Software Engineering,Artificial Intelligence, Networking, and Parallel/Distribute Computing. Phuket, Thailand: IEEE,2008: 522-525.
Options
Outlines

/