SlideShare a Scribd company logo
Frédéric Dufaux and Touradj Ebrahimi

           Presents by Kobi Magnezi
Abstract
— Problem:
  Preserving privacy in video surveillance
— Solution:
  Scrambling regions of interest (ROI) in a video
  sequence.
— Implementation:
  efficient solution based on transform-domain
  scrambling
Abstract
— Real life:
   — MPEG-4
   — Motion JPEG 2000
— Results:
   — Conceal information in ROI in the scene while
     providing with a good level of security
   — Scrambling is flexible – distortion can be adjusted
   — Small impact on coding performance and
     negligible computational complexity increase.
Motivation
— Video surveillance systems are becoming ubiquitous.
   — Strategic places
   — Airports
   — Banks
   — Public transportation
   — Busy city centers.
— Increase security but fear the loss of privacy
   — à slowing down the deployment of video surveillance.
George Orwell
Big brother: “While tens of millions in government
  funding have been spent on research improving video
  surveillance, virtually none has been invested in
  technologies to enhance privacy or effectively balance
  privacy and security”
Architecture

Wireless




           Wired
Architecture
Architecture

                      ROI
     Scramble




                Compress



                            •Face detections
                            •Change Detection
                            •Tracking
                            •Skin detection
    Privacy Video           •Object segmentation & tracking
                            •Combination
5 Previous approaches addressed
privacy in video surveillance
Blinkering Surveillance: Enabling
Video Privacy through Computer Vision. IBM Technical
— “Just enoughquot; of the video stream
— OO
— PrivacyCam
Blinkering Surveillance: Enabling
Video Privacy through Computer Vision. IBM Technical
— Approach
   — OO representation of the scene
   — Re-render frames based on ACL
— Technology
   — Privacy console that manages different versions of the
     video data based on ACL.
   — Privacy Cam - smart camera produces a video stream
     with the privacy-intrusive information already removed.
“The networked
sensor tapestry (NeST): a privacy enhanced software
architecture for interactive analysis of data in video-sensor
networks
— Networked Sensor Tapestry (NeST)
  Test-bed under development
   — Secure sharing
   — Capture
   — Distributing
   — Archiving
— Architecture
   — Centralized server
   — Mobile hardware clients (TinyOS)
   — Layered XML messaging schema
“The networked
sensor tapestry (NeST): a privacy enhanced software
architecture for interactive analysis of data in video-sensor
networks
— Main concepts:
   — privacy buffer
   — privacy filters
   — privacy grammar
— The utility of the architecture
   — variety of hardware/software clients
   — remote sensor interface device
   — software modules for sensor data
   — data visualization, sensor control
   — data archival applications
Preserving Privacy by De-identifying Facial Images
— Algorithm to protect the privacy by de-identifying
  faces
— Old approaches
  — Blacking out each face
  — covering eyes
  — randomly perturbing image pixels
  à fail for robustness of face recognition methods
Preserving Privacy by De-identifying Facial Images
New approach - k-Same
limits the ability of face recognition software.
The algorithm
• determines similarity between faces
• creates new faces by averaging image components,
• varying k.
Privacy through Invertible Cryptographic Obscuration
— Scene distortion via cryptography
— Encryption techniques to improve the privacy aspects




                                       Allowing full access
      Allowing general
                                         (i.e. violation of
       surveillance to
                                      privacy) only with use
          continue
                                       of a decryption key
Video surveillance using JPEG 2000
— JPEG 2000 compression
— Events detection and ROI identification
— Compressed video streams
  are scrambled and signed
   — Privacy
   — Data Integrity
— Standards
   — JPSEC
   — JPWL
JPWL / JPSec Schema
Previous approaches with JPEG
— The process
   — Identify ROI (people, privacy-sensitive info)
   — ROIs à Code-blocks
   — Code-blocks scrambled by ACL
   — Lowering quality layer of the codestream (bandwidth)
— Drawback
   — Shape of the scrambled region is restricted to match
     code-block boundaries.
How we’ll make it better?
— We want that
   — Scene remains understandable
   — The people are unidentifiable.
— Security
   — private encryption key
   — Control who can unlock and view the whole scene in
     clear.
How we’ll make it better?
— Output: single protected code-stream to all clients
  — No private key à distorted version of the content
  — Private key à unscramble the code-stream.


— Can be used with
   — DCT-based: Motion JPEG, MPEG-4 or AVC                 2x HD !!
   — DWT-based Motion JPEG 2000.
                                                           64 kBits
                                                          960 MBits
— Goodies
   — Flexible Technique can be restricted to arbitrary-shape ROIs
   — Level of distortion (fuzzy to completely noisy)
Public/Private key encryption
Why Compress/Encode
  Video Source                     Output Data Rate[Kbits/sec]
  Quarter VGA @20 frames/sec       36 864.00


  CIF camera @30 frames/sec        72 990.72


  VGA @30 frames/sec               221 184.00


  Transmission Medium              Data Rate [Kbits/sec]


  Wireline modem                   56

  GPRS (estimated average rate)    30


  3G/WCDMA (theoretical maximum)   384
MPEG-4
— Based on a motion compensation
— Block-based DCT
— Compression




                    Predicted frames
                      Intraframes
Four 8x8
              Blocks for DCT




   16x16
MacroBlocks
black with lot of
                                                              change in
                                                            frequency à
DCT                                                       random matrix
cosine function: horizontal, diagonal
and vertical frequencies




                                        one color -->
                                        matrix with 1st
                                        large value &
                                            zeros
DCT
                 cosine function: horizontal, diagonal
                 and vertical frequencies




                                       Much of the signal
                                       energy lies at Low
                                       frequencies




High frequencies.
Often small to be
neglected with a
little distortion.
Human visual system
                          experiments
                      standard quantization
                             matrix




 >50 less compress
 * (100-quality)/50
<50 more compress
   / lower quality
     * 50/quality
Quality factor of 75
Quality factor of 20
Quality factor of 5
Quality factor of 3
Entropy Encoder (Compress…)
— Variable length Coding
     Huffman Coding
     or others…
Huffman Coding
— The symbol with the highest probability is assigned
  the shortest code and vice versa.
— Code words length is not fixed (VLC)
— A codeword cannot be a prefix for another codeword
  (Self Synchronized Code)
Huffman Coding
Video Scrambling
Earlier works                        Our approach
— Traditional cryptographic          — Bit scrambling
  techniques
— Encrypt the compressed             — Encrypt before compressing
  video.
— Whole image completely             — Whole scene remains
  distorted à indecipherable            comprehensible but some
                                        objects cannot be identified

                              —   Coding performance
                              —   Complexity increase
                              —   Arbitrary-shape ROI
                              —   Flexible distortion
So when we scrambling?
Before                                        After
Perform scrambling in the original            Apply scrambling after encoding. (the
  image prior to encoding.                      compressed codestream is directly
— Advantage:                                    scrambled)
  Very simple and independent                 — Disadvantage:
  from the encoding scheme                      Very difficult to guarantee that the
  subsequently used.                            scrambled codestream will not
— Disadvantage:                                 crash a standard decoder.
  Significantly altering the statistics of
  the video signal, hence making the
  ensuing compression less efficient.
                                                Scrambling in the transform-domain.
                                                  Region-based transform domain
                                             scrambling technique inverting the signs of
                                                   selected transform coefficients
Transform-domain Scrambling
— Frames transform using an energy compaction
  transform: DCT, DWT
— The resulting coefficients are then entropy coded
  using techniques such as Huffman or arithmetic
  coding.
MPEG-4 & Scrambling
— Effectively applied
  on the quantized
  DCT coefficients,
  and outside of the
  motion
  compensation loop
The scrambling recipe
— What can be scrambled?
  — In general, DC coefficients are strongly correlated and
    are therefore unsuitable for scrambling.
  — Their signs are not.
The scrambling recipe
— So what can be done?
   — All DC coefficients of the blocks corresponding to the
     ROIs are scrambled by pseudo-randomly flipping their
     sign.
The scrambling recipe
— The shape of the scrambled region is restricted to
  match the 8x8 DCT blocks boundaries.
— Level of scrambling = fewer AC coefficients.
Drifts…
— Unauthorized decoder (not capable of unscrambling) will
  use a different motion compensation loop than an
  authorized decoder
— Result:
  Unauthorized decoder may experience a drift, resulting in
— artifacts in the scrambled sequence
How to avoid it?
— Scrambled MB in the reference frame, are always
  INTRA coded.
— Prevents the drift in motion compensation loop




                     Predicted frames
                       Intraframes
Encryption
— PRNG initialized by a seed
   — SHA1PRNG with 64bit seed
   — Increase security à Multiple seed can be used
— Seeds value encrypted using RSA
   — Inserted to the code-stream
— Shape of ROI’s
   — Meta Data in MPEG-4 (private data / codestream)
   — Separate Channel
Complexity?
— Flipping sings of selected coefficients
Scrambling
— Effectively applied after the DWT and quantization,
  and before the arithmetic coder
De-Srambling
— The process is fully reversible. At the decoder,
  authorized users have merely to perform the exact
  inverse operation.
Looks familiar?
— Similar approach as proposed for MPEG-4
— Quantized wavelet coefficients are scrambled by
  pseudo randomly flipping their sign
                                            KM2
— Level of scrambling = fewer resolution levels.
Slide 56

                 ????         KM2
             bandwith
Kobi Magnezi, 10/06/2009
Goodies of JPEG2000
— The shape of the ROIs
  — Embedded ROI mechanism of JPEG 2000.
— Leveraging standard JPEG security (JPSEC)
  — The seeds (for PRNG) can be encrypted and
    embedded in the codestream.
    à Fully JPSEC compliant.
Varying scrambling strength for
MPEG-4
Varying scrambling strength for
Motion HPEG 2000
Coding
efficiency
MPEG-4

     Less than 10%
    bitrate increases
Coding
efficiency
Motion
JPEG2000

   Approximately 10%
    bitrate increases
Security Strength
— Brute-force attack
   — tries all combinations reversing the signs of all non-zero AC
     coefficients.
— CIF frame (352x288)
   — We consider the luminance component
   — MPEG-4 and Motion JPEG 2000
   — à 99’792 AC coefficients.
— ROI’s
   — Suppose that the attacker knows the ROIs which cover 5% of the image
   — à restricting the number of corresponding AC coefficients to 4’990.
— Non-Zero
   — assuming that only 5 % of those are nonzero
   — Need to try reversing the signs of 250 coefficients
     à 2250 combinations for each frame.
— à good level of security.
something to think about…
Eagle Eye

More Related Content

What's hot

IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13Vision Solutions
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
Matlab 2014 15
Matlab 2014 15Matlab 2014 15
Matlab 2014 15shahu2212
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 

What's hot (8)

IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13IEEE ECE main projects list 2012 13
IEEE ECE main projects list 2012 13
 
dwm
dwmdwm
dwm
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Matlab 2014 15
Matlab 2014 15Matlab 2014 15
Matlab 2014 15
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 

Viewers also liked

Privacy protection of visual information
Privacy protection of visual informationPrivacy protection of visual information
Privacy protection of visual informationTouradj Ebrahimi
 
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...Videoguy
 
Pros and Cons of Eyetracking
Pros and Cons of EyetrackingPros and Cons of Eyetracking
Pros and Cons of EyetrackingLuke Hay
 
Dmitry Stepanov - Detector of interest point from region of interest on NBI ...
Dmitry Stepanov - Detector of interest point from region of interest on  NBI ...Dmitry Stepanov - Detector of interest point from region of interest on  NBI ...
Dmitry Stepanov - Detector of interest point from region of interest on NBI ...AIST
 
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositoriesklschoef
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an imageHarsukh Chandak
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorHugo Guyader
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibilityJeffrey Funk
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...Hakan Boz
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015klschoef
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentationPeter Smith
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Prajs Ks
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionWayne Jones Jnr
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing pptashwini.jagdhane
 

Viewers also liked (20)

Privacy protection of visual information
Privacy protection of visual informationPrivacy protection of visual information
Privacy protection of visual information
 
Mw2012 eyetracking
Mw2012 eyetrackingMw2012 eyetracking
Mw2012 eyetracking
 
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO ...
 
Pros and Cons of Eyetracking
Pros and Cons of EyetrackingPros and Cons of Eyetracking
Pros and Cons of Eyetracking
 
Dmitry Stepanov - Detector of interest point from region of interest on NBI ...
Dmitry Stepanov - Detector of interest point from region of interest on  NBI ...Dmitry Stepanov - Detector of interest point from region of interest on  NBI ...
Dmitry Stepanov - Detector of interest point from region of interest on NBI ...
 
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog RepositoriesICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
ICME 2016 - Tutorial on Interactive Search in Video & Lifelog Repositories
 
Extraction of region of interest in an image
Extraction of region of interest in an imageExtraction of region of interest in an image
Extraction of region of interest in an image
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Eye Tracking & Consumer Behavior
Eye Tracking & Consumer BehaviorEye Tracking & Consumer Behavior
Eye Tracking & Consumer Behavior
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibility
 
An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...An eye tracker analysis of the influence of applicant attractiveness on emplo...
An eye tracker analysis of the influence of applicant attractiveness on emplo...
 
Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015Interactive Video Search - Tutorial at ACM Multimedia 2015
Interactive Video Search - Tutorial at ACM Multimedia 2015
 
Region Of Interest Extraction
Region Of Interest ExtractionRegion Of Interest Extraction
Region Of Interest Extraction
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Eye-tracking presentation
Eye-tracking presentationEye-tracking presentation
Eye-tracking presentation
 
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
Theeye tribe, it s a eye tracking device which makes the usage of PC, laptops...
 
Eye Tracking & Design
Eye Tracking & DesignEye Tracking & Design
Eye Tracking & Design
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 

Similar to Scrambling For Video Surveillance

H 264 in cuda presentation
H 264 in cuda presentationH 264 in cuda presentation
H 264 in cuda presentationashoknaik120
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
 
20200509 sid china digital optics and digital modulation_v5.0
20200509 sid china digital optics and digital modulation_v5.020200509 sid china digital optics and digital modulation_v5.0
20200509 sid china digital optics and digital modulation_v5.0Chun-Wei Tsai
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnologyPrashant Madnavat
 
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati..."Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...Edge AI and Vision Alliance
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jainSahil Jain
 
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,..."Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...Edge AI and Vision Alliance
 
2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]imec.archive
 
2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]imec.archive
 
Fujifilm - e2v L3 Vision
Fujifilm - e2v L3 VisionFujifilm - e2v L3 Vision
Fujifilm - e2v L3 VisionBernard Genoud
 
Battle of the Codecs
Battle of the CodecsBattle of the Codecs
Battle of the CodecsJames Uren
 
Optimisation and Compression Intro
Optimisation and Compression IntroOptimisation and Compression Intro
Optimisation and Compression IntroJames Uren
 
Developing Next-Generation Games with Stage3D (Molehill)
Developing Next-Generation Games with Stage3D (Molehill) Developing Next-Generation Games with Stage3D (Molehill)
Developing Next-Generation Games with Stage3D (Molehill) Jean-Philippe Doiron
 
Efficient video perception through AI
Efficient video perception through AIEfficient video perception through AI
Efficient video perception through AIQualcomm Research
 
Video Compression Basics
Video Compression BasicsVideo Compression Basics
Video Compression BasicsSanjiv Malik
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 

Similar to Scrambling For Video Surveillance (20)

H 264 in cuda presentation
H 264 in cuda presentationH 264 in cuda presentation
H 264 in cuda presentation
 
SJNC13.pptx
SJNC13.pptxSJNC13.pptx
SJNC13.pptx
 
Dr.s.shiyamala fpga ppt
Dr.s.shiyamala  fpga pptDr.s.shiyamala  fpga ppt
Dr.s.shiyamala fpga ppt
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
 
20200509 sid china digital optics and digital modulation_v5.0
20200509 sid china digital optics and digital modulation_v5.020200509 sid china digital optics and digital modulation_v5.0
20200509 sid china digital optics and digital modulation_v5.0
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati..."Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...
"Designing Deep Neural Network Algorithms for Embedded Devices," a Presentati...
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
 
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,..."Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...
"Implementing Histogram of Oriented Gradients on a Parallel Vision Processor,...
 
2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]
 
2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]2008 brokerage 04 smart vision system [compatibility mode]
2008 brokerage 04 smart vision system [compatibility mode]
 
Fujifilm - e2v L3 Vision
Fujifilm - e2v L3 VisionFujifilm - e2v L3 Vision
Fujifilm - e2v L3 Vision
 
Battle of the Codecs
Battle of the CodecsBattle of the Codecs
Battle of the Codecs
 
Optimisation and Compression Intro
Optimisation and Compression IntroOptimisation and Compression Intro
Optimisation and Compression Intro
 
Developing Next-Generation Games with Stage3D (Molehill)
Developing Next-Generation Games with Stage3D (Molehill) Developing Next-Generation Games with Stage3D (Molehill)
Developing Next-Generation Games with Stage3D (Molehill)
 
Efficient video perception through AI
Efficient video perception through AIEfficient video perception through AI
Efficient video perception through AI
 
Video Compression Basics
Video Compression BasicsVideo Compression Basics
Video Compression Basics
 
IMAGE PROCESSING
IMAGE PROCESSINGIMAGE PROCESSING
IMAGE PROCESSING
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 

More from Kobi Magnezi

Level Up - Design Thinking
Level Up - Design ThinkingLevel Up - Design Thinking
Level Up - Design ThinkingKobi Magnezi
 
ZipCar Avis Acquisition Valuation
ZipCar Avis Acquisition ValuationZipCar Avis Acquisition Valuation
ZipCar Avis Acquisition ValuationKobi Magnezi
 
Cookening - share your culinary love
Cookening - share your culinary loveCookening - share your culinary love
Cookening - share your culinary loveKobi Magnezi
 
Operation Management Field Project - Tribe
Operation Management Field Project - TribeOperation Management Field Project - Tribe
Operation Management Field Project - TribeKobi Magnezi
 
VMware analysis and strategy
VMware analysis and strategyVMware analysis and strategy
VMware analysis and strategyKobi Magnezi
 
Crowdsourcing in business
Crowdsourcing in businessCrowdsourcing in business
Crowdsourcing in businessKobi Magnezi
 
FULD competition - The future of education
FULD competition - The future of educationFULD competition - The future of education
FULD competition - The future of educationKobi Magnezi
 
D7 IP BU Project - Hungry-Man
D7 IP BU Project - Hungry-ManD7 IP BU Project - Hungry-Man
D7 IP BU Project - Hungry-ManKobi Magnezi
 
Unified Desktop by Microsoft CCA
Unified Desktop by Microsoft CCAUnified Desktop by Microsoft CCA
Unified Desktop by Microsoft CCAKobi Magnezi
 
2012 Mobile Trends
2012 Mobile Trends2012 Mobile Trends
2012 Mobile TrendsKobi Magnezi
 
Mobile breaks walls
Mobile breaks wallsMobile breaks walls
Mobile breaks wallsKobi Magnezi
 
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירי
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירימטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירי
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדיריKobi Magnezi
 
מצגת פתיחה מוטי גוטמן,מנכל מטריקס
מצגת פתיחה  מוטי גוטמן,מנכל מטריקסמצגת פתיחה  מוטי גוטמן,מנכל מטריקס
מצגת פתיחה מוטי גוטמן,מנכל מטריקסKobi Magnezi
 
שיווק דיגיטאלי רב ערוצי
שיווק דיגיטאלי רב ערוצישיווק דיגיטאלי רב ערוצי
שיווק דיגיטאלי רב ערוציKobi Magnezi
 
כנס שיווק רב ערוצי מטריקס 2010
כנס שיווק רב ערוצי מטריקס 2010כנס שיווק רב ערוצי מטריקס 2010
כנס שיווק רב ערוצי מטריקס 2010Kobi Magnezi
 

More from Kobi Magnezi (15)

Level Up - Design Thinking
Level Up - Design ThinkingLevel Up - Design Thinking
Level Up - Design Thinking
 
ZipCar Avis Acquisition Valuation
ZipCar Avis Acquisition ValuationZipCar Avis Acquisition Valuation
ZipCar Avis Acquisition Valuation
 
Cookening - share your culinary love
Cookening - share your culinary loveCookening - share your culinary love
Cookening - share your culinary love
 
Operation Management Field Project - Tribe
Operation Management Field Project - TribeOperation Management Field Project - Tribe
Operation Management Field Project - Tribe
 
VMware analysis and strategy
VMware analysis and strategyVMware analysis and strategy
VMware analysis and strategy
 
Crowdsourcing in business
Crowdsourcing in businessCrowdsourcing in business
Crowdsourcing in business
 
FULD competition - The future of education
FULD competition - The future of educationFULD competition - The future of education
FULD competition - The future of education
 
D7 IP BU Project - Hungry-Man
D7 IP BU Project - Hungry-ManD7 IP BU Project - Hungry-Man
D7 IP BU Project - Hungry-Man
 
Unified Desktop by Microsoft CCA
Unified Desktop by Microsoft CCAUnified Desktop by Microsoft CCA
Unified Desktop by Microsoft CCA
 
2012 Mobile Trends
2012 Mobile Trends2012 Mobile Trends
2012 Mobile Trends
 
Mobile breaks walls
Mobile breaks wallsMobile breaks walls
Mobile breaks walls
 
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירי
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירימטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירי
מטריקס, שיווק רב ערוצי, הרצאתו של יהונתן אדירי
 
מצגת פתיחה מוטי גוטמן,מנכל מטריקס
מצגת פתיחה  מוטי גוטמן,מנכל מטריקסמצגת פתיחה  מוטי גוטמן,מנכל מטריקס
מצגת פתיחה מוטי גוטמן,מנכל מטריקס
 
שיווק דיגיטאלי רב ערוצי
שיווק דיגיטאלי רב ערוצישיווק דיגיטאלי רב ערוצי
שיווק דיגיטאלי רב ערוצי
 
כנס שיווק רב ערוצי מטריקס 2010
כנס שיווק רב ערוצי מטריקס 2010כנס שיווק רב ערוצי מטריקס 2010
כנס שיווק רב ערוצי מטריקס 2010
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Scrambling For Video Surveillance

  • 1. Frédéric Dufaux and Touradj Ebrahimi Presents by Kobi Magnezi
  • 2. Abstract — Problem: Preserving privacy in video surveillance — Solution: Scrambling regions of interest (ROI) in a video sequence. — Implementation: efficient solution based on transform-domain scrambling
  • 3. Abstract — Real life: — MPEG-4 — Motion JPEG 2000 — Results: — Conceal information in ROI in the scene while providing with a good level of security — Scrambling is flexible – distortion can be adjusted — Small impact on coding performance and negligible computational complexity increase.
  • 4. Motivation — Video surveillance systems are becoming ubiquitous. — Strategic places — Airports — Banks — Public transportation — Busy city centers. — Increase security but fear the loss of privacy — à slowing down the deployment of video surveillance.
  • 5. George Orwell Big brother: “While tens of millions in government funding have been spent on research improving video surveillance, virtually none has been invested in technologies to enhance privacy or effectively balance privacy and security”
  • 8. Architecture ROI Scramble Compress •Face detections •Change Detection •Tracking •Skin detection Privacy Video •Object segmentation & tracking •Combination
  • 9. 5 Previous approaches addressed privacy in video surveillance
  • 10. Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Technical — “Just enoughquot; of the video stream — OO — PrivacyCam
  • 11. Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Technical — Approach — OO representation of the scene — Re-render frames based on ACL — Technology — Privacy console that manages different versions of the video data based on ACL. — Privacy Cam - smart camera produces a video stream with the privacy-intrusive information already removed.
  • 12. “The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks — Networked Sensor Tapestry (NeST) Test-bed under development — Secure sharing — Capture — Distributing — Archiving — Architecture — Centralized server — Mobile hardware clients (TinyOS) — Layered XML messaging schema
  • 13. “The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks — Main concepts: — privacy buffer — privacy filters — privacy grammar — The utility of the architecture — variety of hardware/software clients — remote sensor interface device — software modules for sensor data — data visualization, sensor control — data archival applications
  • 14. Preserving Privacy by De-identifying Facial Images — Algorithm to protect the privacy by de-identifying faces — Old approaches — Blacking out each face — covering eyes — randomly perturbing image pixels à fail for robustness of face recognition methods
  • 15. Preserving Privacy by De-identifying Facial Images New approach - k-Same limits the ability of face recognition software. The algorithm • determines similarity between faces • creates new faces by averaging image components, • varying k.
  • 16. Privacy through Invertible Cryptographic Obscuration — Scene distortion via cryptography — Encryption techniques to improve the privacy aspects Allowing full access Allowing general (i.e. violation of surveillance to privacy) only with use continue of a decryption key
  • 17. Video surveillance using JPEG 2000 — JPEG 2000 compression — Events detection and ROI identification — Compressed video streams are scrambled and signed — Privacy — Data Integrity — Standards — JPSEC — JPWL
  • 18. JPWL / JPSec Schema
  • 19. Previous approaches with JPEG — The process — Identify ROI (people, privacy-sensitive info) — ROIs à Code-blocks — Code-blocks scrambled by ACL — Lowering quality layer of the codestream (bandwidth) — Drawback — Shape of the scrambled region is restricted to match code-block boundaries.
  • 20. How we’ll make it better? — We want that — Scene remains understandable — The people are unidentifiable. — Security — private encryption key — Control who can unlock and view the whole scene in clear.
  • 21. How we’ll make it better? — Output: single protected code-stream to all clients — No private key à distorted version of the content — Private key à unscramble the code-stream. — Can be used with — DCT-based: Motion JPEG, MPEG-4 or AVC 2x HD !! — DWT-based Motion JPEG 2000. 64 kBits 960 MBits — Goodies — Flexible Technique can be restricted to arbitrary-shape ROIs — Level of distortion (fuzzy to completely noisy)
  • 23.
  • 24. Why Compress/Encode Video Source Output Data Rate[Kbits/sec] Quarter VGA @20 frames/sec 36 864.00 CIF camera @30 frames/sec 72 990.72 VGA @30 frames/sec 221 184.00 Transmission Medium Data Rate [Kbits/sec] Wireline modem 56 GPRS (estimated average rate) 30 3G/WCDMA (theoretical maximum) 384
  • 25. MPEG-4 — Based on a motion compensation — Block-based DCT — Compression Predicted frames Intraframes
  • 26. Four 8x8 Blocks for DCT 16x16 MacroBlocks
  • 27. black with lot of change in frequency à DCT random matrix cosine function: horizontal, diagonal and vertical frequencies one color --> matrix with 1st large value & zeros
  • 28. DCT cosine function: horizontal, diagonal and vertical frequencies Much of the signal energy lies at Low frequencies High frequencies. Often small to be neglected with a little distortion.
  • 29. Human visual system experiments standard quantization matrix >50 less compress * (100-quality)/50 <50 more compress / lower quality * 50/quality
  • 30.
  • 35. Entropy Encoder (Compress…) — Variable length Coding Huffman Coding or others…
  • 36. Huffman Coding — The symbol with the highest probability is assigned the shortest code and vice versa. — Code words length is not fixed (VLC) — A codeword cannot be a prefix for another codeword (Self Synchronized Code)
  • 38.
  • 39. Video Scrambling Earlier works Our approach — Traditional cryptographic — Bit scrambling techniques — Encrypt the compressed — Encrypt before compressing video. — Whole image completely — Whole scene remains distorted à indecipherable comprehensible but some objects cannot be identified — Coding performance — Complexity increase — Arbitrary-shape ROI — Flexible distortion
  • 40. So when we scrambling? Before After Perform scrambling in the original Apply scrambling after encoding. (the image prior to encoding. compressed codestream is directly — Advantage: scrambled) Very simple and independent — Disadvantage: from the encoding scheme Very difficult to guarantee that the subsequently used. scrambled codestream will not — Disadvantage: crash a standard decoder. Significantly altering the statistics of the video signal, hence making the ensuing compression less efficient. Scrambling in the transform-domain. Region-based transform domain scrambling technique inverting the signs of selected transform coefficients
  • 41. Transform-domain Scrambling — Frames transform using an energy compaction transform: DCT, DWT — The resulting coefficients are then entropy coded using techniques such as Huffman or arithmetic coding.
  • 42.
  • 43. MPEG-4 & Scrambling — Effectively applied on the quantized DCT coefficients, and outside of the motion compensation loop
  • 44. The scrambling recipe — What can be scrambled? — In general, DC coefficients are strongly correlated and are therefore unsuitable for scrambling. — Their signs are not.
  • 45. The scrambling recipe — So what can be done? — All DC coefficients of the blocks corresponding to the ROIs are scrambled by pseudo-randomly flipping their sign.
  • 46. The scrambling recipe — The shape of the scrambled region is restricted to match the 8x8 DCT blocks boundaries. — Level of scrambling = fewer AC coefficients.
  • 47.
  • 48. Drifts… — Unauthorized decoder (not capable of unscrambling) will use a different motion compensation loop than an authorized decoder — Result: Unauthorized decoder may experience a drift, resulting in — artifacts in the scrambled sequence
  • 49. How to avoid it? — Scrambled MB in the reference frame, are always INTRA coded. — Prevents the drift in motion compensation loop Predicted frames Intraframes
  • 50.
  • 51. Encryption — PRNG initialized by a seed — SHA1PRNG with 64bit seed — Increase security à Multiple seed can be used — Seeds value encrypted using RSA — Inserted to the code-stream — Shape of ROI’s — Meta Data in MPEG-4 (private data / codestream) — Separate Channel
  • 52. Complexity? — Flipping sings of selected coefficients
  • 53.
  • 54. Scrambling — Effectively applied after the DWT and quantization, and before the arithmetic coder
  • 55. De-Srambling — The process is fully reversible. At the decoder, authorized users have merely to perform the exact inverse operation.
  • 56. Looks familiar? — Similar approach as proposed for MPEG-4 — Quantized wavelet coefficients are scrambled by pseudo randomly flipping their sign KM2 — Level of scrambling = fewer resolution levels.
  • 57. Slide 56 ???? KM2 bandwith Kobi Magnezi, 10/06/2009
  • 58. Goodies of JPEG2000 — The shape of the ROIs — Embedded ROI mechanism of JPEG 2000. — Leveraging standard JPEG security (JPSEC) — The seeds (for PRNG) can be encrypted and embedded in the codestream. à Fully JPSEC compliant.
  • 59.
  • 61. Varying scrambling strength for Motion HPEG 2000
  • 62. Coding efficiency MPEG-4 Less than 10% bitrate increases
  • 63. Coding efficiency Motion JPEG2000 Approximately 10% bitrate increases
  • 64.
  • 65. Security Strength — Brute-force attack — tries all combinations reversing the signs of all non-zero AC coefficients. — CIF frame (352x288) — We consider the luminance component — MPEG-4 and Motion JPEG 2000 — à 99’792 AC coefficients. — ROI’s — Suppose that the attacker knows the ROIs which cover 5% of the image — à restricting the number of corresponding AC coefficients to 4’990. — Non-Zero — assuming that only 5 % of those are nonzero — Need to try reversing the signs of 250 coefficients à 2250 combinations for each frame. — à good level of security.
  • 66. something to think about…