access icon free Image privacy protection with secure JPEG transmorphing

Thanks to advancements in smart mobile devices and social media platforms, sharing photos and experiences has significantly bridged the authors’ lives, allowing them to stay connected despite distance and other barriers. Most approaches to protect image visual privacy focus on encrypting or permuting image data, which generate unreadable image or highly distorted visual effect and therefore may not be in users best interest from both usage and perception perspectives. In this study, the authors propose secure JPEG transmorphing, a framework for protecting image visual privacy in a secure, reversible, and highly flexible and personalised manner. Secure JPEG transmorphing allows one to apply arbitrary regional visual manipulation on image regions of interests (ROIs), while secretly preserving the information about the original ROIs in application segments (APPn markers) of the visually obfuscated JPEG image. Objective and subjective experiments have been performed and results indicate that the proposed protection scheme provides near lossless image reconstruction, controllable level of file size expansion, good degree of privacy protection and especially better subjective pleasantness.

Inspec keywords: smart phones; data privacy; image coding; image reconstruction; cryptography; social networking (online)

Other keywords: image data permutation; smart mobile devices; arbitrary regional visual manipulation; image data encryption; image ROI; image regions-of-interests; file size expansion controllable level; near lossless image reconstruction; image visual privacy protection; highly distorted visual effect generation; secure JPEG transmorphing; APPn markers; application segments; social media platforms; unreadable image generation

Subjects: Computer vision and image processing techniques; Data security; Image and video coding; Cryptography

References

    1. 1)
      • 3. Dufaux, F., Ebrahimi, T.: ‘Video surveillance using JPEG 2000’. Proc. of the SPIE, 2004, vol. 5588, pp. 268275.
    2. 2)
      • 22. Zhang, N., Paluri, M., Taigman, Y., et al: ‘Beyond frontal faces: improving person recognition using multiple cues’. 2015 IEEE Conf. Computer Vision and Pattern Recognition (CVPR), June 2015, pp. 48044813.
    3. 3)
      • 15. Yuan, L., Korshunov, P., Ebrahimi, T.: ‘Secure JPEG scrambling enabling privacy in photo sharing’. Workshop on De-Identification for Privacy Protection in Multimedia, 2015.
    4. 4)
      • 6. Cutillo, L.A., Molva, R., Önen, M.: ‘Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks’. 5th ACM Workshop on Social Network Systems, SNS 2012, Bern, Switzerland, April 2012.
    5. 5)
      • 18. He, K., Bidan, C., Le Guelvouit, G.: ‘Robust and secure image encryption schemes during JPEG compression process’. 2016 IS&T Int. Symp. Electronic Imaging (EI 2016), CA, United States, February 2016.
    6. 6)
      • 7. Klemperer, P., Liang, Y., Mazurek, M., et al: ‘Tag, you can see it!: using tags for access control in photo sharing’. Proc. of the SIGCHI Conf. Human Factors in Computing Systems, CHI ‘12, New York, NY, USA, 2012 pp. 377386.
    7. 7)
      • 24. Oh, S.J., Benenson, R., Fritz, M., et al: ‘Faceless person recognition: privacy implications in social Media’ (Springer International Publishing, Cham, 2016), pp. 1935.
    8. 8)
      • 4. Korshunov, P., Ebrahimi, T.: ‘Using warping for privacy protection in video surveillance’. 18th Int. Conf. on Digital Signal Processing (DSP), 2013.
    9. 9)
      • 2. Park, S., Trivedi, M.M.: ‘A track-based human movement analysis and privacy protection system adaptive to environmental contexts’. AVSS, IEEE Computer Society, 2005, pp. 171176.
    10. 10)
      • 23. Wang, Z., Bovik, A.C., Sheikh, H.R., et al: ‘Image quality assessment: from error visibility to structural similarity’, IEEE Trans. Image Process., 2004, 13, pp. 600612.
    11. 11)
      • 5. Korshunov, P., Ebrahimi, T.: ‘Using face morphing to protect privacy’. IEEE Int. Conf. on Advanced Video and Signal-Based Surveillance (AVSS), 2013.
    12. 12)
      • 8. Mazurek, M.L., Liang, Y., Melicher, W., et al: ‘Toward strong, usable access control for shared distributed data’. Proc. of the 12th USENIX Conf. File and Storage Technologies (FAST 14), 2014, Santa Clara, CA, pp. 89103.
    13. 13)
      • 9. Baden, R., Bender, A., Spring, N., et al: ‘Persona: an online social network with user-defined privacy’, SIGCOMM Comput. Commun. Rev., 2009, 39, pp. 135146.
    14. 14)
      • 1. Schiff, J., Meingast, M., Mulligan, D. K., et al: ‘Respectful cameras: detecting visual markers in real-time to address privacy concerns’. IROS, 2007, pp. 971978.
    15. 15)
      • 19. Sun, W., Zhou, J., Lyu, R., et al: ‘Processing-aware privacy-preserving photo sharing over online social networks’. Proc. of the 2016 ACM on Multimedia Conf., MM ‘16, NY, USA, 2016, pp. 581585.
    16. 16)
      • 25. Bradley, M.M., Lang, P.J.: ‘Measuring emotion: the self-assessment manikin and the semantic differential’, J. Behav. Therapy Exper. Psychiatry, 1994, 25, (1), pp. 4959.
    17. 17)
      • 13. Tierney, M., Spiro, I., Bregler, C., et al: ‘Cryptagram: photo privacy for online social media’ (Association for Computing Machinery, 2013), pp. 7587.
    18. 18)
      • 21. Moon, J.W., Lee, J.S., Cho, N.I.: ‘A requantization algorithm for the transcoding of JPEG images’, Signal Process., Image Commun., 2006, 21, (1), pp. 1321.
    19. 19)
      • 17. He, J., Liu, B., Kong, D., et al: ‘PUPPIES: transformation-supported personalized privacy preserving partial image sharing’. 2016 46th Annual IEEE/IFIP Int. Conf. Dependable Systems and Networks (DSN), June 2016, pp. 359370.
    20. 20)
      • 12. Ra, M.-R., Govindan, R., Ortega, A.: ‘P3: toward privacy-preserving photo sharing’. Presented as part of the 10th USENIX Symp. Networked Systems Design and Implementation, Berkeley, CA, 2013, pp. 515528.
    21. 21)
      • 16. Yuan, L., Korshunov, P., Ebrahimi, T.: ‘Privacy-preserving photo sharing based on a secure JPEG’. 2015 IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), April 2015, pp. 185190.
    22. 22)
      • 11. Poller, A., Steinebach, M., Liu, H.: ‘Robust image obfuscation for privacy protection in Web 2.0 applications’, Proceedings of SPIE Volume 8303, Media Watermarking, Security, and Forensics 2012, 2012, 830304, doi: 10.1117/12.908587.
    23. 23)
      • 14. Sun, J., Liao, X., Chen, X., et al: ‘Privacy-aware image encryption based on logistic map and data hiding’, Int. J. Bifurcation Chaos, 2017, 27, (05), p. 1750073.
    24. 24)
      • 10. Yuan, L., Theytaz, J.R., Ebrahimi, T.: ‘Context-dependent privacy-aware photo sharing based on machine learning’. Proc. of 32nd Int. Conf. ICT Systems Security and Privacy Protection (IFIP SEC 2017), 2017.
    25. 25)
      • 20. Daemen, J., Rijmen, V.: ‘The design of Rijndael’ (Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2002).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-spr.2016.0756
Loading

Related content

content/journals/10.1049/iet-spr.2016.0756
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading