SlideShare a Scribd company logo
1 of 1
Download to read offline
www.projectsatbangalore.com 09591912372
Reversible De-Identification for Lossless Image
Compression using Reversible Watermarking
Reuben A. Farrugia
*Department of Communications and Computer Engineering,
University of Malta,
Msida, Malta
reuben.farrugia@um.edu.mt
Abstract - De-Identification is a process which can be used
to ensure privacy by concealing the identity of individuals
captured by video surveillance systems. One important
challenge is to make the obfuscation process reversible so
that the original image/video can be recovered by persons in
possession of the right security credentials. This work
presents a novel Reversible De-Identification method that
can be used in conjunction with any obfuscation process.
The residual information needed to reverse the obfuscation
process is compressed, authenticated, encrypted and
embedded within the obfuscated image using a two-level
Reversible Watermarking scheme. The proposed method
ensures an overall single-pass embedding capacity of
1.25 bpp, where 99.8% of the images considered required
less than 0.8 bpp while none of them required more than
1.1 bpp. Experimental results further demonstrate that the
proposed method managed to recover and authenticate all
images considered.
I. INTRODUCTION
Video surveillance cameras are becoming ubiquitous
in many developed countries. This has raised several
privacy concerns which have pushed policy makers to
regulate their use. One approach to provide privacy is to
obfuscate sensitive regions within an image/video which
prevents the identification of the persons being captured.
The authors in [1,2] have proposed an irreversible
obfuscation method which however, prevents the use of
the captured videos from aiding criminal investigation or
to be used as evidence in court [3].
Reversible De-Identification is a process which, while
still concealing the identity of individuals, enables persons
in possession of high security credentials to recover the
original multimedia content containing private
information. The authors in [4] encode the region of
interest (ROI) and background in separate data layers
using JPEG2000. On the other hand, the authors in [5,6]
employ encryption strategies directly on the pixel
intensities of the ROI. However, these methods
completely destroy the naturalness of the captured video.
A ROI transform-domain scrambling technique was
presented in [7,8,9] for different image/video compression
standards. The scrambling process better maintains the
naturalness of the video. However this method is less
secure since it reveals the intensity levels of the original
content. Moreover, the obfuscation and reversibility
processes are dependent on each other, and thus cannot be
used in conjunction with other obfuscation methods. Non-
reversible watermarking was adopted in [3,10] to solve the
latter issue and embed the information needed to recover
the De-Identified region within the video itself. However,
both these schemes are irreversible since the noise
introduced by the watermark embedding process is
permanent. Moreover, these schemes have registered a
substantial reduction in compression efficiency. The
authors in [11] employ reversible watermarking to solve
the former issue. However, this method induces
significant distortions within the obfuscated image
themselves.
This work presents a Reversible De-Identification
method for lossless images. This approach adopts
Reversible Watermarking to make the system reversible.
The proposed solution is completely independent from the
obfuscation process, and is thus generic. Nonetheless, this
work employs the k-Same obfuscation process, which
ensures k-anonymity, to obfuscate the face of frontal
images. The difference between the original and
obfuscated image is compressed, authenticated, encrypted
and embedded within the obfuscated image itself. This
method keeps the naturalness of the obfuscated images
while the original image can only be recovered by
individuals having the proper encryption key. The
Reversible Watermarking schemes adopted in this work
were found to outperform existing state-of-the-art
schemes. Furthermore, experimental results demonstrate
that the proposed scheme can recover and authenticate all
obfuscated images considered.
This paper is organized as follows: Section II provides
a high-level description of the proposed system and
introduces the notation used in the latter sections. The
Forward and Inverse Reversible De-Identification
processes are explained in more detail in sections III and
IV with the experimental results delivered in section V.
The final comments and concluding remarks are drawn in
section VI.
II. SYSTEM OVERVIEW
Fig. 1 illustrates the schematic diagram of the
Forward Reversible De-Identification process which
receives the original image I and conceals the face of the
person using the Face Obfuscation process to generate an
obfuscated image Iฯด. This work considers color images
using the YCbCr color space. The coordinates of the top
left corner and bottom right corner of the De-identified
region is enclosed within the bounding box ฮฒ, which is
passed to both ROI Extraction processes to extract the
MIPRO 2014, 26-30 May 2014, Opatija, Croatia
1258

More Related Content

What's hot

Bachelors project
Bachelors projectBachelors project
Bachelors project
Ganesh Grandhi
ย 

What's hot (7)

A DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTS
A DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTSA DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTS
A DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTS
ย 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
ย 
Digital Image Watermarking Techniques: A Review
Digital Image Watermarking Techniques: A ReviewDigital Image Watermarking Techniques: A Review
Digital Image Watermarking Techniques: A Review
ย 
24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)24 7912 9261-1-ed a meaningful (edit a)
24 7912 9261-1-ed a meaningful (edit a)
ย 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
ย 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ย 
Bachelors project
Bachelors projectBachelors project
Bachelors project
ย 

Viewers also liked (8)

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
ย 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portability
ย 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
ย 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
ย 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
ย 
human computer interface
human computer interfacehuman computer interface
human computer interface
ย 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
ย 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
ย 

Similar to Reversible De-Identification for Lossless Image Compression using Reversible Watermarking

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
idescitation
ย 
Z03301550160
Z03301550160Z03301550160
Z03301550160
ijceronline
ย 
Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002
vadnalasravi
ย 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
ย 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
ย 
Generic lossless visible watermarkingโ€”a
Generic lossless visible watermarkingโ€”aGeneric lossless visible watermarkingโ€”a
Generic lossless visible watermarkingโ€”a
Agnianbu Wrong
ย 

Similar to Reversible De-Identification for Lossless Image Compression using Reversible Watermarking (20)

18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
ย 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
ย 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
ย 
Fake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewFake Video Creation and Detection: A Review
Fake Video Creation and Detection: A Review
ย 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
ย 
Z03301550160
Z03301550160Z03301550160
Z03301550160
ย 
Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002Rey.survey watermarking auth_images.2002
Rey.survey watermarking auth_images.2002
ย 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
ย 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
ย 
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
ย 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
ย 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
ย 
Mobile Recorded Videos
Mobile Recorded Videos Mobile Recorded Videos
Mobile Recorded Videos
ย 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
ย 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
ย 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
ย 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
ย 
Generic lossless visible watermarkingโ€”a
Generic lossless visible watermarkingโ€”aGeneric lossless visible watermarkingโ€”a
Generic lossless visible watermarkingโ€”a
ย 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
ย 
IRJET- Data Hiding in Video Stream by Efficient Data Embedding
IRJET- Data Hiding in Video Stream by Efficient Data EmbeddingIRJET- Data Hiding in Video Stream by Efficient Data Embedding
IRJET- Data Hiding in Video Stream by Efficient Data Embedding
ย 

More from john236zaq

More from john236zaq (10)

Images as Occlusions of Textures: A Framework for Segmentation
Images as Occlusions of Textures: A Framework for SegmentationImages as Occlusions of Textures: A Framework for Segmentation
Images as Occlusions of Textures: A Framework for Segmentation
ย 
Image Restoration Using Joint Statistical Modeling in a Space-Transform Domain
Image Restoration Using Joint Statistical Modeling in a Space-Transform DomainImage Restoration Using Joint Statistical Modeling in a Space-Transform Domain
Image Restoration Using Joint Statistical Modeling in a Space-Transform Domain
ย 
Low-Complexity DFT-Based Channel Estimation with Leakage Nulling for OFDM Sys...
Low-Complexity DFT-Based Channel Estimation with Leakage Nulling for OFDM Sys...Low-Complexity DFT-Based Channel Estimation with Leakage Nulling for OFDM Sys...
Low-Complexity DFT-Based Channel Estimation with Leakage Nulling for OFDM Sys...
ย 
Low-Rank Neighbor Embedding for Single Image Super-Resolution
Low-Rank Neighbor Embedding for Single Image Super-ResolutionLow-Rank Neighbor Embedding for Single Image Super-Resolution
Low-Rank Neighbor Embedding for Single Image Super-Resolution
ย 
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Mining Weakly Labeled Web Facial Images for Search-Based Face AnnotationMining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
ย 
Modeling and Estimation of Transient Carrier Frequency Offset in Wireless Tra...
Modeling and Estimation of Transient Carrier Frequency Offset in Wireless Tra...Modeling and Estimation of Transient Carrier Frequency Offset in Wireless Tra...
Modeling and Estimation of Transient Carrier Frequency Offset in Wireless Tra...
ย 
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic PrefixOFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
OFDM Synthetic Aperture Radar Imaging With Sufficient Cyclic Prefix
ย 
Phase-Based Binarization of Ancient Document Images: Model and Applications
Phase-Based Binarization of Ancient Document Images: Model and ApplicationsPhase-Based Binarization of Ancient Document Images: Model and Applications
Phase-Based Binarization of Ancient Document Images: Model and Applications
ย 
Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A ...
Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A ...Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A ...
Progressive Image Denoising Through Hybrid Graph Laplacian Regularization: A ...
ย 
Stochastic Analysis of the LMS and NLMS Algorithms for Cyclostationary White ...
Stochastic Analysis of the LMS and NLMS Algorithms for Cyclostationary White ...Stochastic Analysis of the LMS and NLMS Algorithms for Cyclostationary White ...
Stochastic Analysis of the LMS and NLMS Algorithms for Cyclostationary White ...
ย 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 

Reversible De-Identification for Lossless Image Compression using Reversible Watermarking

  • 1. www.projectsatbangalore.com 09591912372 Reversible De-Identification for Lossless Image Compression using Reversible Watermarking Reuben A. Farrugia *Department of Communications and Computer Engineering, University of Malta, Msida, Malta reuben.farrugia@um.edu.mt Abstract - De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials. This work presents a novel Reversible De-Identification method that can be used in conjunction with any obfuscation process. The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme. The proposed method ensures an overall single-pass embedding capacity of 1.25 bpp, where 99.8% of the images considered required less than 0.8 bpp while none of them required more than 1.1 bpp. Experimental results further demonstrate that the proposed method managed to recover and authenticate all images considered. I. INTRODUCTION Video surveillance cameras are becoming ubiquitous in many developed countries. This has raised several privacy concerns which have pushed policy makers to regulate their use. One approach to provide privacy is to obfuscate sensitive regions within an image/video which prevents the identification of the persons being captured. The authors in [1,2] have proposed an irreversible obfuscation method which however, prevents the use of the captured videos from aiding criminal investigation or to be used as evidence in court [3]. Reversible De-Identification is a process which, while still concealing the identity of individuals, enables persons in possession of high security credentials to recover the original multimedia content containing private information. The authors in [4] encode the region of interest (ROI) and background in separate data layers using JPEG2000. On the other hand, the authors in [5,6] employ encryption strategies directly on the pixel intensities of the ROI. However, these methods completely destroy the naturalness of the captured video. A ROI transform-domain scrambling technique was presented in [7,8,9] for different image/video compression standards. The scrambling process better maintains the naturalness of the video. However this method is less secure since it reveals the intensity levels of the original content. Moreover, the obfuscation and reversibility processes are dependent on each other, and thus cannot be used in conjunction with other obfuscation methods. Non- reversible watermarking was adopted in [3,10] to solve the latter issue and embed the information needed to recover the De-Identified region within the video itself. However, both these schemes are irreversible since the noise introduced by the watermark embedding process is permanent. Moreover, these schemes have registered a substantial reduction in compression efficiency. The authors in [11] employ reversible watermarking to solve the former issue. However, this method induces significant distortions within the obfuscated image themselves. This work presents a Reversible De-Identification method for lossless images. This approach adopts Reversible Watermarking to make the system reversible. The proposed solution is completely independent from the obfuscation process, and is thus generic. Nonetheless, this work employs the k-Same obfuscation process, which ensures k-anonymity, to obfuscate the face of frontal images. The difference between the original and obfuscated image is compressed, authenticated, encrypted and embedded within the obfuscated image itself. This method keeps the naturalness of the obfuscated images while the original image can only be recovered by individuals having the proper encryption key. The Reversible Watermarking schemes adopted in this work were found to outperform existing state-of-the-art schemes. Furthermore, experimental results demonstrate that the proposed scheme can recover and authenticate all obfuscated images considered. This paper is organized as follows: Section II provides a high-level description of the proposed system and introduces the notation used in the latter sections. The Forward and Inverse Reversible De-Identification processes are explained in more detail in sections III and IV with the experimental results delivered in section V. The final comments and concluding remarks are drawn in section VI. II. SYSTEM OVERVIEW Fig. 1 illustrates the schematic diagram of the Forward Reversible De-Identification process which receives the original image I and conceals the face of the person using the Face Obfuscation process to generate an obfuscated image Iฯด. This work considers color images using the YCbCr color space. The coordinates of the top left corner and bottom right corner of the De-identified region is enclosed within the bounding box ฮฒ, which is passed to both ROI Extraction processes to extract the MIPRO 2014, 26-30 May 2014, Opatija, Croatia 1258