Downloads: 105 | Views: 117
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 8, August 2015
Face Obfuscation Based Reversible Watermarking For Lossless Image Compression
Vivek Jaladi  | Suhasini Andurey
Abstract: De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials. This work presents a novel Reversible De-Identification method that can be used in conjunction with any obfuscation process. The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme. The proposed method ensures an overall single-pass embedding capacity of 1.25 bpp, where 99.8 % of the images considered required less than 0.8 bpp while none of them required more than 1.1 bpp. Experimental results further demonstrate that the proposed method managed to recover and authenticate all images considered. It is also possible to obfuscate the image with video it creates ample opportunities for the sharing of video sequences. In order to protect the privacy of subjects visible in the scene, automated methods to de-identify the images, particularly the face region are necessary.
Keywords: Obfuscation, Watermarking, Forward Reversible De-Identification, Inverse Reversible De-Identification
Edition: Volume 4 Issue 8, August 2015,
Pages: 1188 - 1192
Similar Articles with Keyword 'Watermarking'
Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014Pages: 1067 - 1069
A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V | M. D. Patil
Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016Pages: 1054 - 1061
Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade | Dimple Chaudhari