7342

A Co-Prime Blur Scheme for Data Security in Video Surveillance

Christopher Thorpe, Feng Li, Zijia Li, Zhan Yu, David Saunders, Jingyi Yu
University of Delaware, Newark, DE 19716
arXiv:1203.4874v1 [cs.CV] (22 Mar 2012)

@article{2012arXiv1203.4874T,

   author={Thorpe}, C. and {Li}, F. and {Li}, Z. and {Yu}, Z. and {Saunders}, D. and {Yu}, J.},

   title={"{A Co-Prime Blur Scheme for Data Security in Video Surveillance}"},

   journal={ArXiv e-prints},

   archivePrefix={"arXiv"},

   eprint={1203.4874},

   primaryClass={"cs.CV"},

   keywords={Computer Science – Computer Vision and Pattern Recognition},

   year={2012},

   month={mar},

   adsurl={http://adsabs.harvard.edu/abs/2012arXiv1203.4874T},

   adsnote={Provided by the SAO/NASA Astrophysics Data System}

}

Download Download (PDF)   View View   Source Source   

2888

views

This paper presents a novel Coprime Blurred Pair (CBP) model for visual data-hiding for security in camera surveillance. While most previous approaches have focused on completely encrypting the video stream, we introduce a spatial encryption scheme by blurring the image/video contents to create a CBP. Our goal is to obscure detail in public video streams by blurring while allowing behavior to be recognized and to quickly deblur the stream so that details are available if behavior is recognized as suspicious. We create a CBP by blurring the same latent image with two unknown kernels. The two kernels are coprime when mapped to bivariate polynomials in the z domain. To deblur the CBP we first use the coprime constraint to approximate the kernels and sample the bivariate CBP polynomials in one dimension on the unit circle. At each sample point, we factor the 1D polynomial pair and compose the results into a 2D kernel matrix. Finally, we compute the inverse Fast Fourier Transform (FFT) of the kernel matrices to recover the coprime kernels and then the latent video stream. It is therefore only possible to deblur the video stream if a user has access to both streams. To improve the practicability of our algorithm, we implement our algorithm using a graphics processing unit (GPU) to decrypt the blurred video streams in real-time, and extensive experimental results demonstrate that our new scheme can effectively protect sensitive identity information in surveillance videos and faithfully reconstruct the unblurred video stream when two blurred sequences are available.
No votes yet.
Please wait...

* * *

* * *

HGPU group © 2010-2024 hgpu.org

All rights belong to the respective authors

Contact us: