IET Conference on Crime and Security 2006
DOI: 10.1049/ic:20060346
|View full text |Cite
|
Sign up to set email alerts
|

Face protection by fast selective encryption in a video

Abstract: In this paper we propose an approach for monitoring human activities in an indoor environment using detected and tracked face and selective encryption. The objective is to encrypt partially the human face in a video sequence. This approach is based on AES stream ciphering using VLC (Variable Length Coding) of the Huffman's vector. The proposed scheme allows scalable decryption of a specific region of image and result in a significant reduction in encrypting and decrypting processing time. It also provides a co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…J.M. Rodrigues et al [9] proposed a method to partially encrypt the face in video sequence. This method is based on Advanced Encryption Standard (AES) stream ciphering using variable length coding of the Huffman's vector.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…J.M. Rodrigues et al [9] proposed a method to partially encrypt the face in video sequence. This method is based on Advanced Encryption Standard (AES) stream ciphering using variable length coding of the Huffman's vector.…”
Section: Related Workmentioning
confidence: 99%
“…Dominant approaches are scrambling and data hiding methods [3][4][5][6][7][8], cryptographic encryption [2,9], and access control policy [10,11]. The scrambling and data hiding approaches usually first identify the regions of interest in video data that are potentially privacy-sensitive, and scramble that region to minimize the chance of privacy leakage.…”
Section: Introductionmentioning
confidence: 99%
“…ese authors also carried out a balance between image similarities and differences in order to detect human faces even when they had noise or facial expressions and different poses [2]. However, facial recognition can also be utilized to generate damage; thus, it is necessary permit the protection of identity by means of encryption systems, which can be employed to code photographs completely, although it is most recommendable to perform selective encryption, whether on the borders or using facial detection because this considerably reduces the system's time and resources [3,4]. Shakir et al detected faces in the images, considering a database that contains information of different parts of the skin [5].…”
Section: Introductionmentioning
confidence: 99%
“…Dominant approaches are scrambling method [1]- [3], data hiding [4]- [6], cryptographic encryption [7], [8], and access control policy [9], [10]. The scrambling and data hiding approaches usually first identify the regions of interest in video data that are potentially privacy-sensitive, and scramble that region to minimize the chance of privacy leakage.…”
Section: Introductionmentioning
confidence: 99%
“…J.M. Rodrigues et al [8] proposed a method to partially encrypt the face in video sequence. This method is based on Advanced Encryption Standard (AES) stream ciphering using variable length coding of the Huffman's vector.…”
Section: Introductionmentioning
confidence: 99%