skip to main content
research-article

Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video

Published: 27 January 2022 Publication History

Abstract

In the cloud era, a large amount of data is uploaded to and processed by public clouds. The risk of privacy leakage has become a major concern for cloud users. Cloud-based video surveillance requires motion detection, which may reveal the privacy of people in a surveillance video. Privacy-preserving video surveillance allows motion detection while protecting privacy. The existing scheme [25], designed to detect motion on encrypted and H.264-compressed surveillance videos, does not work well on more advanced video compression schemes such as HEVC.
In this article, we propose the first motion detection method on encrypted and HEVC-compressed videos. It adopts a novel approach that exploits inter-prediction reference relationships among coding blocks to detect motion regions. The partition pattern and the number of coding bits of each detection block used in prior art are also used to help detect motion regions. Spatial and temporal consistency of a moving object and Kalman filtering are applied to segment connected/merged motion regions, remove noise and background motions, and refine trajectories and shapes of detected moving objects. Experimental results indicate that our detection method achieves high detection recall, precision, and F1-score for surveillance videos of both high and low resolutions with various scenes. It has a similarly high detection accuracy on encrypted and HEVC-compressed videos as that of the existing motion detection method [25] on encrypted and H.264-compressed videos. Our proposed method incurs no bit-rate overhead and has a very low computational complexity for both motion detection and encryption of HEVC videos.

References

[1]
X. Ma, B. Zhu, T. Zhang, S. Cao, H. Jin, and D. Zou. 2018. Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance. In Proceedings of the IEEE Conference on Computer Communications Workshops: The 4thth International Workshop on Security and Privacy in Big Data (BigSecurity’18).
[2]
M. Saini, P. K. Atrey, S. Mehrotra, and M. Kankanhalli. 2014. W3-privacy: Understanding what, when, and where inference channels in multi-camera surveillance video. Multim. Tools Applic. 68, 1 (2014), 135–158.
[3]
S. Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access 4 (2016), 2751–2763.
[4]
S. Sagar and C. Keke. 2018. Image disguising for privacy-preserving deep learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2291–2293.
[5]
X. Ma, C. Liu, S. Cao, and B. Zhu. 2018. JPEG decompression in the homomorphic encryption domain. In Proceedings of the ACM Multimedia Conference. 905–913.
[6]
Y. Tang, B. Zhu, X. Ma, P. T. Mathiopoulos, X. Xie, and H. Huang. 2019. Decoding homomorphically encrypted FLAC audio without decryption. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. 675–679.
[7]
M. Barni, G. Droandi, and R. Lazzeretti. 2015. Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Sig. Process. Mag. 32, 5 (2015), 66–76.
[8]
Q. Wang, S. Hu, K. Ren, M. He, M. Du, and Z. Wang. 2015. CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In Proceedings of the European Symposium on Research in Computer Security. 186–205.
[9]
Z. Shao, J. Cai, and Z. Wang. 2018. Smart monitoring cameras driven intelligent processing to big surveillance video data. IEEE Trans. Big Data 4, 1 (2018), 105–116.
[10]
X. Ma, W. Zeng, L. Yang, D. Zou, and H. Jin. 2016. Lossless ROI privacy protection of H.264/AVC compressed surveillance videos. IEEE Trans. Emerg. Topics Comput. 4, 3 (2016), 349–362.
[11]
S. Barra, M. De Marsico, V. Cantoni, and D. Riccio. 2014. Using mutual information for multi-anchor tracking of human beings. In Proceedings of the International Workshop on Biometric Authentication. 28–39.
[12]
Z. Kalal, K. Mikolajczyk, and J. Matas. 2012. Tracking-learning-detection. IEEE Trans. Pattern Anal. Mach. Intell. 34, 7 (2012), 1409–1422.
[13]
C. Poppe, S. De Bruyne, T. Paridaens, P. Lambert, and R. de Walle. 2009. Moving object detection in the H.264/AVC compression domain for video surveillance applications. J. Vis. Commun. Image Represent. 20, 6 (2009), 428–437.
[14]
K. Szczerba, S. Forchhammer, J. Stottrup-Andersen, and P. T. Eybye. 2009. Fast compression domain motion detection in H.264 video streams for video surveillance applications. In Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance. 478–483.
[15]
M. Laumer, P. Amon, A. Hutter, and A. Kaup. 2013. Compression domain moving object detection based on H.264/AVC macroblock types. In Proceedings of the Conference on Computer Vision Imaging and Applications. 219–228.
[16]
M. Laumer, P. Amon, A. Hutter, and A. Kaup. 2015. Compression domain moving object detection by spatio-temporal analysis of H.264/AVC syntax elements. In Proceedings of the Picture Coding Symposium. 282–286.
[17]
H. Li, Y. Zhang, M. Yang, Y. Men, and H. Chao. 2014. A rapid abnormal event detection method for surveillance video based on a novel feature in compression domain of HEVC. In Proceedings of the IEEE Conference on Multimedia and Expo. 1–6.
[18]
Y. Zhang and H. Chao. 2017. Abnormal event detection in surveillance video: A compression domain approach for HEVC. In Proceedings of the Data Compression Conference. 475–475.
[19]
L. Zhao, Z. He, W. Cao, and D. Zhao. 2018. Real-time moving object segmentation and classification from HEVC Compressed surveillance video. IEEE Trans. Circ. Syst. Video Technol. 28, 6 (2018), 1346–1357.
[20]
H. Sohn, K. N. Plataniotis, and Y. M. Ro. 2010. Privacy-preserving watch list screening in video surveillance system. In Proceedings of the Pacific-Rim Conference on Multimedia. 622–632.
[21]
M. Upmanyu, A. Namboodiri, K. Srinathan, and C. Jawahar. 2009. Efficient privacy preserving video surveillance. In Proceedings of the IEEE International Conference on Computer Vision. 1639–1646.
[22]
Y. Chen, C. Chu, J. Hwang, and J. Hoo. 2014. A privacy preserving human tracking scheme in centralized cloud based camera networks. In Proceedings of the IEEE International Conference on Communications. 793–798.
[23]
C. Lin, K. Muchtar, and J. Lin. 2017. Moving object detection in the encrypted domain. Multim. Tools Applic. 76, 2 (2017), 9759–9783.
[24]
K. Chu, Y. Kuo, and W. Hsu. 2013. Real-time privacy-preserving moving object detection on the cloud. In Proceedings of the ACM International Conference on Multimedia. 597–600.
[25]
J. Guo, P. Zheng, and J. Huang. 2017. An efficient motion detection and tracking scheme for encrypted surveillance videos. ACM Trans. Multim. Comput., Commun. Applic. 13, 4 (2017), 1–23.
[26]
J. Guo, P. Zheng, and J. Huang. 2020. Efficient privacy-preserving anomaly detection and localization in bitstream video. IEEE Trans. Circ. Syst. Video Technol. 30, 9 (2020), 3268–3281.
[27]
X. Ma, H. Peng, H. Jin, and B. Zhu. 2018. Privacy-preserving cloud-based video surveillance with adjustable granularity of privacy protection. In Proceedings of the 25th IEEE International Conference on Image Processing (ICIP). 4133–4137.
[28]
V. Sze, M. Budagavi, and G. J. Sullivan. 2014. High Efficiency Video Coding (HEVC): Algorithms and Architectures. Springer Publishing Company Inc., New York, 113–140.
[29]
Z. Shahid and W. Puech. 2013. Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans. Multim. 16, 1 (2013), 24–36.
[30]
H. Sorenson. 1970. Least-squares estimation: From Gauss to Kalman. IEEE Spectrum 7, 7 (1970), 63–68.
[31]
CAVIAR Dataset, the EC Funded CAVIAR project/IST 2001. Retrieved from http://homepages.inf.ed.ac.uk/rbf/CAVIAR/.
[32]
M. Zhang, J. Choi, K. Daniilidis, M. Wolf, and C. Kanan. 2015. VAIS: A dataset for recognizing maritime imagery in the visible and infrared spectrums. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 10–16.
[33]
Kyushu University. LIMU Dataset. Retrieved from http://limu.ait.kyushu-u.ac.jp/dataset/en. (2008).
[34]
S. Oh, A. Hoogs, A. Perera, N. Cuntoor, C. C. Chen, J. T. Lee, S. Mukherjee, J. K. Aggarwal, H. Lee, L. Davis, and E. Swears. 2011. A large-scale benchmark dataset for event recognition in surveillance video. In Proceedings of the IEEE Computer Vision and Pattern Recognition. 3153–3160.
[35]
Joint Collaborative Team on Video Coding (JCT-VC). High Efficiency Video Coding (HEVC) Retrieved from https://hevc.hhi.fraunhofer.de/. (2013).
[36]
N. Goyette, P.-M. Jodoin, F. Porikli, J. Konrad, and P. Ishwar. 2012. changedetection.net: A new change detection benchmark dataset. In Proceedings of the IEEE Workshop on Change Detection (CDW’12) at CVPR’12.
[37]
N. Goyette, P.-M. Jodoin, F. Porikli, J. Konrad, and P. Ishwar. 2012. changedetection.net: A new change detection benchmark dataset. In Proceedings of the Workshop on Change Detection (CDW-2012) at CVPR-2012. IEEE, 1–8.
[38]
P.-M. Jodoin, F. Porikli, J. Konrad, P. Ishwar, and N. Goyette. 2012. IEEE Change Detection Workshop in conjunction with CVPR. Retrieved from http://jacarini.dinf.usherbrooke.ca/cdw2012/.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 1
January 2022
517 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/3505205
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 January 2022
Accepted: 01 June 2021
Revised: 01 May 2021
Received: 01 October 2020
Published in TOMM Volume 18, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Privacy-preserving motion detection
  2. motion detection
  3. privacy protection
  4. video encryption
  5. surveillance videos
  6. HEVC

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Natural Science Foundation of China
  • Fundamental Research Funds for the Central Universities
  • Key-Area Research and Development Program of Guangdong Province
  • Wuhan Applied Foundational Frontier Project

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)105
  • Downloads (Last 6 weeks)5
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media