Abstract

Closed-circuit television (CCTV) and video surveillance systems (VSSs) are becoming increasingly more common each year to help prevent incidents/accidents and ensure the security of public places and facilities. The increased presence of VSS is also increasing the number of per capita exposures to CCTV cameras. To help protect the privacy of the exposed objects, attention is being drawn to technologies that utilize intelligent video surveillance systems (IVSSs). IVSSs execute a wide range of surveillance duties—from simple identification of objects in the recorded video data, to understanding and identifying the behavioral patterns of objects and the situations at the incident/accident scenes, as well as the processing of video information to protect the privacy of the recorded objects against leakage. Besides, the recorded privacy information is encrypted and recorded using blockchain technology to prevent forgery of the image. The technology herein proposed (the “proposed mechanism”) is implemented to a VSS, where the mechanism converts the original visual information recorded on a VSS into a similarly constructed image information, so that the original information can be protected against leakage. The face area extracted from the image information is recorded in a separate database, allowing the creation of a restored image that is in perfect symmetry with the original image for images with virtualized face areas. Specifically, the main section of this study proposes an image modification mechanism that inserts a virtual face image that closely matches a predetermined similarity and uses a blockchain as the storage area.

Highlights

  • Closed-circuit television (CCTV) and video surveillance systems (VSSs), installed for incident/accident prevention in public places or investigation, are becoming increasingly more common each year

  • The public’s interest in intelligent visual surveillance systems (IVSSs) is growing, as the system combines technologies that allow the understanding of the scenes of incidents/accidents and the behavioral patterns of the objects, to predict incidents/accidents and warn the VSS users, and prevent the leakage of personal information [4,5,6,7]

  • An IVSS records the persons in areas targeted for recording to help understand the locations and detect the faces of the persons so that they can be used as the basis for assessment and decision-making [8,9,10,11]

Read more

Summary

Introduction

Closed-circuit television (CCTV) and video surveillance systems (VSSs), installed for incident/. Accident prevention in public places or investigation, are becoming increasingly more common each year With their numbers on the rise, controversy over the privacy violation of objects being recorded is rising [1,2,3]. Detecting a person’s face and using the image, later on, can compromise the personal information of the individual that was recorded in the original video data. Continuously in thetechnique same location; the of patients is a valid technique statistical processing using recorded visual data or legitimate for using the does visual not to protect the privacy ofthe patients. Paper is as follows: techniques studiesthe related to the de-identification visual data; Section introduces the face of Section 2and examines current status of techniques of and studies related to 3the de-identification image modification mechanism; andthe. Differences between thetechniques commercialized or previously introduced techniques and the proposed system

Examination of the Existing
Mosaic
Removal
Encryption
Related
Face Region Detection Module
Virtual Face Features Generation Module
Virtual Face Feature Vector and Data Generation Module
Face Features Recovery Module
Face Image Restore Module
Comparison and Analysis of the Proposed Mechanism and the Existing Techniques
Mosaic-applied
Removed
Encrypted
13. Comparison
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.