Contribution of Non-scrambled Chroma Information in Privacy-Protected Face Images to Privacy Leakage
نویسندگان
چکیده
To mitigate privacy concerns, scrambling can be used to conceal face regions present in surveillance video content. Given that lightweight scrambling tools may not protect chroma information in order to limit bit rate overhead in heterogeneous usage environments, this paper investigates how the presence of non-scrambled chroma information in face regions influences the effectiveness of automatic and human face recognition (FR). To that end, we apply three automatic FR techniques to face images that have been privacy-protected by means of a layered scrambling technique developed for Motion JPEG XR, testing the effectiveness of automatic FR and layered scrambling using various experimental conditions. In addition, we investigate whether agreement exists between the judgments of 32 human observers and the output of automatic FR. Our experimental results demonstrate that human observers are not able to successfully recognize face images when simultaneously visualizing scrambled luma and non-scrambled chroma information. However, when an adversary has access to the coded bit stream structure, the presence of non-scrambled chroma information may significantly contribute to privacy leakage. By additionally applying layered scrambling to chroma information, our experimental results show that the amount of privacy leakage can be substantially decreased at the cost of an increase in bit rate overhead, and with the increase in bit rate overhead dependent on the number of scalability layers used.
منابع مشابه
An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR
An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR Hosik Sohn, Dohyoung Lee, Wesley De Neve, Konstantinos N. Plataniotis, and Yong Man Ro Image and Video Systems Lab, Department of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Yuseong-gu, Daejeon, 305-701, Korea Multimedia La...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملThe Relationship Between Patients’ Perceived Health Status and Trust Propensity With Privacy Calculus
Background: Patients need peace of mind to disclose their information to medical staff and with the lack of trust or in specific health status, they may avoid providing sensitive information for their care or might change the information. This research aims to examine the impact of perceived health status and trust propensity on privacy calculus. Methods: This research was analytical-study. 3 ...
متن کاملرعایت «حریم بیماران» توسط تیم درمان و ارتباط آن با رضایتمندی بیماران در بخش اورژانس بیمارستان
Background & Objective: Privacy is a basic humanity principle. Protecting patients;apos privacy is a necessity in health care organizations and along with the patients;apos satisfaction, is one of the main indicators of quality of care. The objective of this study was to assess patients;apos privacy protecting by medical staff and its relation to patients;apos satisfaction.Methods & Materials: ...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کامل