SlideShare uma empresa Scribd logo
1 de 1
Region-of-Interest Scrambling for
                                                      Scalable Surveillance Video using JPEG XR
                                                                 Hosik Sohn, Wesley De Neve, and Yong Man Ro
                                            Image and Video Systems Lab, Department of Electrical Engineering, KAIST, Daejeon, Korea


I. INTRODUCTION
   In this paper, we discuss a privacy-protected video surveillance                                      • Contains more transform coefficients than a DC subband, but less
   system that makes use of the JPEG XR standard. This standard                                            transform coefficients than an HP subband.
   offers a low-complexity solution for the scalable coding of high-
                                                                                                           • Random Permutation (RP) was applied to the different transform
   resolution images. To address privacy concerns, face regions are
                                                                                                             coefficients in the LP subband.
   detected and subsequently scrambled in the transform domain,
   taking into account the scalability features of JPEG XR.                                                3) HP and Flexbits Subbands

II. IMAGE CODING USING JPEG XR                                                                           • Visual effect of scrambled HP
1. Scalable Intra Coding                                                                                  subbands can hardly be seen at
                                                                                                          4CIF resolution.
 • Low computational complexity, while offering a high image quality
                                                                                                         • Even at a low spatial resolution,
   and spatial and quality scalability provisions.
                                                                                                           face regions with a sufficiently
 • Frequency domain in JPEG XR (4 subbands) : DC (1), low pass (15),                                       high resolution cannot be
   high pass (240), and Flexbits (256) subband.                                                                                                           Fig 3. Visual impact of scrambled HP subbands:
                                                                                                           concealed adequately.                            (a) QCIF resolution and (b) 4CIF resolution.
2. ROI Representation                                                                                    • For this reason, we propose not to scramble HP subbands and
                                                                                                           Flexbits subbands.
  • Uniform tile layout : each tile has the
    same width and height.                                                                          IV. EXPERIMENTAL RESULTS
  • Non-uniform tile layout : tiles may have                                                          1. Visual Results
    different widths and heights.

III. SCRAMBLING                                                    Fig 1. ROI representation

1. Proposed Encoder Architecture
                                                            Secret key
                            DC                                                                      Fig 4. Privacy-protected surveillance video: (a) DC, (b) DC + LP, (c) DC + LP + HP, and (d) DC + LP
               LBT   LBT     Q      Pred.                   Scrambling                              + HP + Flexbits.
                                                                         • Adaptive
                            Low pass                                       entropy                    2. Bit Stream Overhead Analysis
                                                 Adaptive                  coding
                             Q      Pred.                   Scrambling                         Table 1. Bit stream overhead according to the tile size
                                                  scan                   • Fixed
                            High pass/Flexbits                             length                  Tile grid                 1x1 MB   5x5 MB   10x10 MB
                                                                                                                   9 tiles
                                                 Adaptive                  coding              Bit rate (Kbit/s)               (%)      (%)       (%)
                             Q      Pred.
                                                  scan                                               629            10.6     771.9     72.2      16.5
                                                                                                     955            7.3      482.1     47.6      11.2
                  Fig 2. Architecture of our modified JPEG XR encoder
                                                                                                    1348            4.5      323.0     32.8      7.4
2. Subband-Adaptive Scrambling                                                                      1964            2.8      207.9     21.5      4.6

   Important factors for scrambling                                                                 2809            1.9      135.5     14.2      3.2
                                                                                                    4404            1.2       86.8     8.9       1.9
     • Visual importance of the subband.                                                            5791            0.5       54.4     5.0       0.6

     • Available amount of coded data in the subband.                                               8158            0.2       35.0     3.0       0.2      Fig. 5. Bit stream overhead introduced by
                                                                                                                                                          scrambling
     • Level of security offered by the scrambling technique .                                         3. Security Considerations
     • Effect on the coding efficiency.                                                                                                                    • DC subband in one MB
     • Computational complexity of the scrambling technique.                                                                                                  2N+1 combinations
  1) Scrambling for DC Subbands                                                                                                                              (N: the number of bits used to
                                                                                                                                                             represent the fixed length part of
   Random Sign Inversion (RSI):                                                                                                                              the DC coefficient)
   where D denotes the data to be scrambled and where De denotes the                                                                                       • LP subband in one MB
   pseudo-randomly sign-flipped data.                                                                                                                        15! Combinations
   Random Bit Flipping (RBF) is applied to the DC refinement bits and                                                                                      • Total number of combinations
   the level refinement bits:                                                                      Fig. 6. Average number of bits used to represent
                                                                                                                                                             2N+1 + 15!
                                                                                                   the fixed length part of a DC coefficient


   B denotes the data to be encrypted while Be denotes the encrypted V. CONCLUSIONS
   data. Further, bi denotes the ith bit of B and R denotes the set of
                                                                           This paper discussed an approach for scrambling privacy-sensitive
   pseudo-random bits.
                                                                           face regions in scalable surveillance video coded using JPEG XR. Our
   Each DC coefficient is partitioned into a significant part and a approach is the result of a trade-off between the visual importance of
   refinement bits. The significant part is again partitioned into a level subbands, the amount of coded data in the subbands, the level of
   value and level refinement bits.                                        security offered by a particular scrambling technique, the effect of
  2) Scrambling for LP Subbands                                            scrambling on the coding efficiency, and the computational complexity
                                                                           of the scrambling technique used. The results show that privacy-
 • LP subband : visually less important than a DC subband, but sensitive regions can be successfully concealed with a feasible level of
    visually more important than an HP subband.                            protection.

Mais conteúdo relacionado

Destaque

DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...Videoguy
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Pros and Cons of Eyetracking
Pros and Cons of EyetrackingPros and Cons of Eyetracking
Pros and Cons of EyetrackingLuke Hay
 
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositoriesklschoef
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorHugo Guyader
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibilityJeffrey Funk
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...Hakan Boz
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015klschoef
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Immersive Telepresence
Immersive TelepresenceImmersive Telepresence
Immersive TelepresenceITU
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networkingKikima Jimmy
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentationPeter Smith
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Prajs Ks
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing pptashwini.jagdhane
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies IntroductionMohammed Fareed
 

Destaque (18)

Mw2012 eyetracking
Mw2012 eyetrackingMw2012 eyetracking
Mw2012 eyetracking
 
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Pros and Cons of Eyetracking
Pros and Cons of EyetrackingPros and Cons of Eyetracking
Pros and Cons of Eyetracking
 
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer Behavior
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibility
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Immersive Telepresence
Immersive TelepresenceImmersive Telepresence
Immersive Telepresence
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networking
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentation
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
 
Eye Tracking & Design
Eye Tracking & DesignEye Tracking & Design
Eye Tracking & Design
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 

Mais de Wesley De Neve

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Wesley De Neve
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Wesley De Neve
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Wesley De Neve
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Wesley De Neve
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla SymposiumWesley De Neve
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101Wesley De Neve
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumWesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusWesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusWesley De Neve
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Wesley De Neve
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesWesley De Neve
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Wesley De Neve
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsWesley De Neve
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Wesley De Neve
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesWesley De Neve
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Wesley De Neve
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...Wesley De Neve
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Wesley De Neve
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingWesley De Neve
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Wesley De Neve
 

Mais de Wesley De Neve (20)

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
 
Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...Impact of adversarial examples on deep learning models for biomedical image s...
Impact of adversarial examples on deep learning models for biomedical image s...
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Region-of-interest scrambling for scalable surveillance video using JPEG XR

  • 1. Region-of-Interest Scrambling for Scalable Surveillance Video using JPEG XR Hosik Sohn, Wesley De Neve, and Yong Man Ro Image and Video Systems Lab, Department of Electrical Engineering, KAIST, Daejeon, Korea I. INTRODUCTION In this paper, we discuss a privacy-protected video surveillance • Contains more transform coefficients than a DC subband, but less system that makes use of the JPEG XR standard. This standard transform coefficients than an HP subband. offers a low-complexity solution for the scalable coding of high- • Random Permutation (RP) was applied to the different transform resolution images. To address privacy concerns, face regions are coefficients in the LP subband. detected and subsequently scrambled in the transform domain, taking into account the scalability features of JPEG XR. 3) HP and Flexbits Subbands II. IMAGE CODING USING JPEG XR • Visual effect of scrambled HP 1. Scalable Intra Coding subbands can hardly be seen at 4CIF resolution. • Low computational complexity, while offering a high image quality • Even at a low spatial resolution, and spatial and quality scalability provisions. face regions with a sufficiently • Frequency domain in JPEG XR (4 subbands) : DC (1), low pass (15), high resolution cannot be high pass (240), and Flexbits (256) subband. Fig 3. Visual impact of scrambled HP subbands: concealed adequately. (a) QCIF resolution and (b) 4CIF resolution. 2. ROI Representation • For this reason, we propose not to scramble HP subbands and Flexbits subbands. • Uniform tile layout : each tile has the same width and height. IV. EXPERIMENTAL RESULTS • Non-uniform tile layout : tiles may have 1. Visual Results different widths and heights. III. SCRAMBLING Fig 1. ROI representation 1. Proposed Encoder Architecture Secret key DC Fig 4. Privacy-protected surveillance video: (a) DC, (b) DC + LP, (c) DC + LP + HP, and (d) DC + LP LBT LBT Q Pred. Scrambling + HP + Flexbits. • Adaptive Low pass entropy 2. Bit Stream Overhead Analysis Adaptive coding Q Pred. Scrambling Table 1. Bit stream overhead according to the tile size scan • Fixed High pass/Flexbits length Tile grid 1x1 MB 5x5 MB 10x10 MB 9 tiles Adaptive coding Bit rate (Kbit/s) (%) (%) (%) Q Pred. scan 629 10.6 771.9 72.2 16.5 955 7.3 482.1 47.6 11.2 Fig 2. Architecture of our modified JPEG XR encoder 1348 4.5 323.0 32.8 7.4 2. Subband-Adaptive Scrambling 1964 2.8 207.9 21.5 4.6 Important factors for scrambling 2809 1.9 135.5 14.2 3.2 4404 1.2 86.8 8.9 1.9 • Visual importance of the subband. 5791 0.5 54.4 5.0 0.6 • Available amount of coded data in the subband. 8158 0.2 35.0 3.0 0.2 Fig. 5. Bit stream overhead introduced by scrambling • Level of security offered by the scrambling technique . 3. Security Considerations • Effect on the coding efficiency. • DC subband in one MB • Computational complexity of the scrambling technique.  2N+1 combinations 1) Scrambling for DC Subbands (N: the number of bits used to represent the fixed length part of Random Sign Inversion (RSI): the DC coefficient) where D denotes the data to be scrambled and where De denotes the • LP subband in one MB pseudo-randomly sign-flipped data.  15! Combinations Random Bit Flipping (RBF) is applied to the DC refinement bits and • Total number of combinations the level refinement bits: Fig. 6. Average number of bits used to represent  2N+1 + 15! the fixed length part of a DC coefficient B denotes the data to be encrypted while Be denotes the encrypted V. CONCLUSIONS data. Further, bi denotes the ith bit of B and R denotes the set of This paper discussed an approach for scrambling privacy-sensitive pseudo-random bits. face regions in scalable surveillance video coded using JPEG XR. Our Each DC coefficient is partitioned into a significant part and a approach is the result of a trade-off between the visual importance of refinement bits. The significant part is again partitioned into a level subbands, the amount of coded data in the subbands, the level of value and level refinement bits. security offered by a particular scrambling technique, the effect of 2) Scrambling for LP Subbands scrambling on the coding efficiency, and the computational complexity of the scrambling technique used. The results show that privacy- • LP subband : visually less important than a DC subband, but sensitive regions can be successfully concealed with a feasible level of visually more important than an HP subband. protection.