Skip to main content

Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

  • 2507 Accesses

Abstract

To mitigate privacy concerns, scrambling can be used to conceal face regions present in surveillance video content. Given that lightweight scrambling tools may not protect chroma information in order to limit bit rate overhead in heterogeneous usage environments, this paper investigates how the presence of non-scrambled chroma information in face regions influences the effectiveness of automatic and human face recognition (FR). To that end, we apply three automatic FR techniques to face images that have been privacy-protected by means of a layered scrambling technique developed for Motion JPEG XR, testing the effectiveness of automatic FR and layered scrambling using various experimental conditions. In addition, we investigate whether agreement exists between the judgments of 32 human observers and the output of automatic FR. Our experimental results demonstrate that human observers are not able to successfully recognize face images when simultaneously visualizing scrambled luma and non-scrambled chroma information. However, when an adversary has access to the coded bit stream structure, the presence of non-scrambled chroma information may significantly contribute to privacy leakage. By additionally applying layered scrambling to chroma information, our experimental results show that the amount of privacy leakage can be substantially decreased at the cost of an increase in bit rate overhead, and with the increase in bit rate overhead dependent on the number of scalability layers used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bowyer, K.W.: Face recognition technology: security versus privacy. IEEE Society on Social Implications of Technology 23, 9–19 (2004)

    Google Scholar 

  2. Dufaux, F., Ebrahimi, T.: Scrambling for Privacy Protection in Video Surveillance Systems. IEEE Transactions on Circuits and Systems for Video Technology 18, 1168–1174 (2008)

    Article  Google Scholar 

  3. Carrillo, P., Kalva, H., Magliveras, S.: Compression Independent Reversible Encryption for Privacy in Video Surveillance. EURASIP Journal on Information Security 2009, Article ID 429581, 13 pages (2009)

    Google Scholar 

  4. Sohn, H., De Neve, W., Ro, Y.M.: Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR. IEEE Transactions on Circuits and Systems for Video Technology 21, 170–177 (2011)

    Article  Google Scholar 

  5. Sohn, H., Anzaku, E.T., De Neve, W., Ro, Y.M., Plataniotis, K.N.: Privacy Protection in Video Surveillance Systems Using Scalable Video Coding. In: IEEE International Conference on Advanced Video and Signal Based Surveillance, pp. 424–429 (2009)

    Google Scholar 

  6. Zeng, W., Lei, S.: Efficient frequency domain video scrambling for content access control. In: Proceedings of ACM International Conference on Multimedia, pp. 285–294 (1999)

    Google Scholar 

  7. Tong, L., Dai, F., Zhang, Y., Li, J.: Visual security evaluation for video encryption. In: Proceedings of ACM International Conference on Multimedia, pp. 835–838 (2010)

    Google Scholar 

  8. Dufaux, F., Ebrahimi, T.: H.264/AVC video scrambling for privacy protection. In: Proceedings of IEEE International Conference on Image Processing, pp. 1688–1691 (2008)

    Google Scholar 

  9. Sohn, H., De Neve, W., Ro, Y.M.: Region-of-Interest Scrambling for Scalable Surveillance Video using JPEG XR. In: Proceedings of ACM International Conference on Multimedia, pp. 861–864 (2009)

    Google Scholar 

  10. Rodrigues, J.-M., Puech, W., Bors, A.: A Selective Encryption for Heterogeneous Color JPEG Images Based on VLC and AES Stream Cipher. In: Proceedings of European Conference on Colour in Graphics, Imaging and Vision, pp. 34–39 (2006)

    Google Scholar 

  11. Zou, J., Ward, R.K., Qi, D.: A new digital image scrambling method based on Fibonacci numbers. In: Proceedings of International Symposium on Circuits and Systems, III-965-8 (2004)

    Google Scholar 

  12. Dufaux, F., Ebrahimi, T.: A Framework for the Validation of Privacy Protection Solutions in Video Surveillance. In: IEEE International Conference on Multimedia & Expo., pp. 66–71 (2010)

    Google Scholar 

  13. Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Transactions on Image Processing 15(7), 2061–2075 (2006)

    Article  Google Scholar 

  14. Tran, T.D., Liu, T., Topiwala, P.: Performance comparison of leading image codecs: H.264/AVC Intra, JPEG2000, and Microsoft HD Photo. In: Proceedings of SPIE, pp. 66960B.1–66960B.14 (2007)

    Google Scholar 

  15. Srinivasan, S., Tu, C., Regunathan, S.L., Sullivan, G.J.: HD Photo: A new image coding technology for digital photography. In: Proceedings of SPIE, pp. 66960A.1–66960A.19 (2007)

    Google Scholar 

  16. Sim, T., Baker, S., Bsat, M.: The CMU pose, illumination, and expression database. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1615–1618 (2003)

    Article  Google Scholar 

  17. IVY Lab Video Surveillance Dataset, http://ivylab.kaist.ac.kr/demo/vs/dataset.htm

  18. Turk, M.A., Pentland, A.P.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3, 71–86 (1991)

    Article  Google Scholar 

  19. Belhumeur, P.N., Hesphanha, J.P., Kriegman, D.J.: Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence 9, 711–720 (1997)

    Article  Google Scholar 

  20. Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 28, 2037–2041 (2006)

    Article  Google Scholar 

  21. Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.: The FERET database and evaluation procedure for face recognition algorithms. Image and Vision Computing Journal 16, 295–306 (1998)

    Article  Google Scholar 

  22. Wang, J., Plataniotis, K.N., Lu, J., Venetsanopoulos, A.N.: On solving the face recognition problem with one training sample per subject. Pattern Recognition 39, 1746–1762 (2006)

    Article  MATH  Google Scholar 

  23. Jain, A.K., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recognition 38, 2270–2285 (2005)

    Article  Google Scholar 

  24. Perlibakas, V.: Distance measures for PCA-based face recognition. Pattern Recognition Letters 25, 1421–1430 (2004)

    Article  Google Scholar 

  25. Choi, J.Y., Ro, Y.M., Plataniotis, K.N.: Color face recognition for degraded face images. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 39, 1217–1230 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sohn, H., Lee, D., De Neve, W., Plataniotis, K.N., Ro, Y.M. (2012). Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics