Forward and Inverse Reversible De-Identification Method for Lossless Compressed Images to Make the System Reversible
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Video surveillance cameras are becoming ubiquitous in many developed countries. This has raised several privacy concerns which have pushed policy makers to regulate their use. One approach to provide privacy is to obfuscate sensitive regions within an image/video which prevents the identification of the persons being captured. The authors have proposed an irreversible obfuscation method which however, prevents the use of the captured videos from aiding criminal investigation or to be used as evidence in court. De-Identification is a process which can be used to ensure privacy by concealing the identity of in dividuals captured by video surveillance systems. One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials. This work presents a novel Reversible De-Identification method that can be used in conjunction with any obfuscation process. The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme. The proposed method ensures an overall single-pass embedding capacity of1.25 bpp, where 99.8% of the images considered required less than 0.8 bpp while none of them required more than1.1 bpp. Experimental results further demonstrate that the proposed method managed to recover and authenticate allimages considered.
Authors and Affiliations
J. Sribhuvaneswari, S. Thenappan
slugThe Soundness of Surveys: Offline and Online
the Internet can be an efficient medium for the relocation, exchange, and collection of information in psychologyrelated research and data. The qualified simplicity and inexpensiveness of creating and maintaining Web-bas...
Security Framework for Internet of Things (IOT) Cloud Data Sync
The Internet of Things (IoT) is an important topic in technology industry, policy and engineering circle has become headline news in both the specialty press and the popular media. A lot of important questions has been...
Induction Motor Fed By Γ Z- Source Inverter
The main focus is on the losses that occur in an Induction motor and to select a suitable Inverter that feeds the Induction motor. Various analysis are performed on the different types of Inverters and on completion of...
Performance and Emission Characteristics of Biodiesel with CaO Nanocatalyst
With the depletion of fossil fuels worldwide, country has been sort for different fuel opportunities which can enrich the vehicle and give the best operating performances as like normal fuel sources. Hence the best way...
slugA Survey on Image Segmentation Using Clustering Techniques
Image is information which has to be processed effectively. Segmentation, partitions the image into multiple segments. Image segmentation assigns label to every pixel in an image such that p...