2018
DOI: 10.1007/978-3-030-03338-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Face Detection and Encryption for Privacy Preserving in Surveillance Video

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The last subgroup of obfuscation-based B-PETs relies on various image transformations to conceal (remove or obscure) sensitive regions in facial images or video. These transformations include image subsampling [135], scrambling [137], [140], [154], [155], [163], mosaicing [110], [162], warping [143], morphing [145], foveation [153], halftoning [161], image puzzling [149], steganography, and others. Techniques from this group are often tied to various compression standards [147] and exploit selected characteristics of the standards for privacy enhancement.…”
Section: Image Transformationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The last subgroup of obfuscation-based B-PETs relies on various image transformations to conceal (remove or obscure) sensitive regions in facial images or video. These transformations include image subsampling [135], scrambling [137], [140], [154], [155], [163], mosaicing [110], [162], warping [143], morphing [145], foveation [153], halftoning [161], image puzzling [149], steganography, and others. Techniques from this group are often tied to various compression standards [147] and exploit selected characteristics of the standards for privacy enhancement.…”
Section: Image Transformationsmentioning
confidence: 99%
“…Liu et al [163] introduced an approach to privacy enhancement in video that relies on skin color information to detect face-region candidates and an SVM-based classifier to refine candidate regions and determine final face locations. (Reversible) scrambling procedures are utilized to modify both spatial positions of pixels within a face region as well as their values.…”
Section: Image Transformationsmentioning
confidence: 99%
“…Additionally, Liu et al [12] proposed an efficient method based on spatial and value scrambling models to preserve face regions on surveillance videos. This scheme was able to localize and encrypt multiple faces well with satisfied antiattack property.…”
Section: Introductionmentioning
confidence: 99%
“…The transformation technique extends to reversible watermarking techniques for embedding and later extracting facial regions [102], video anonymization through pixel relocation and semi-blind watermarking by Cichowski and Czyzewski [33], and Liu et al's reversible scrambling based on 3. Related Works skin color detection and Support Vector Machine (SVM) classifiers for action recognition in videos [126]. Techniques like the chaos cryptography-based data scrambling for surveillance video by Rahman et al [159] and Melle and Dugelay's reversible scrambling using image self-similarities [135] demonstrate the diverse applications and the balance between privacy protection and data intelligibility.…”
mentioning
confidence: 99%