Skip to main content

Partial Encryption of Digital Contents Using Face Detection Algorithm

  • Conference paper
PRICAI 2006: Trends in Artificial Intelligence (PRICAI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4099))

Included in the following conference series:

Abstract

Recently, a great number of people can share the same digital contents, because it is possible to copy and to transmit of the digital contents easy and fast. These properties of the digital contents are causes of that reduce the will to creation of makers and that hamper industrial development. Therefore recent studies focus on the protection of digital contents. However it is not efficient that traditional encryption algorithms apply to the digital image/video contents, because of the long encryption time. To solve this problem, recent studies use the partial encryption algorithm that encrypts some parts of the image or the video frame. However there are still problems which features do not have the semantic information, because previous studies extract the features for reducing the encryption time. In this paper, we proposed the partial encryption method using the face region as the feature because the face has the semantic information and is the most important part in the digital content, especially the video contents. As shown by experimental results, the proposed method can reduce the encryption time and can improve the protection strength using the traditional encryption algorithms for the digital contents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 239.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cheng, L., Li, X.: Partial Encryption of Compressed Images and Video. IEEE Transactions on Signal Processing 48(8), 2439–2451 (2000)

    Article  MathSciNet  Google Scholar 

  2. Van Droogenbroeck, M., Benedett, R.: Techniques for a Selective Encryption of Uncompressed and Compressed Images. In: ACIVS, Ghent, Belgium, pp. 90–97 (2002)

    Google Scholar 

  3. Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: IEEE Benelux Signal Processing, Hilvarenbeek, Netherlands, pp. 11–15 (2004)

    Google Scholar 

  4. Suchindran, S.M., Nikolaos, G.B.: SCAN based lossless image compression and encry-ption. In: IEEE Int. Conference on Information Intelligence and Systems, pp. 490–499 (1999)

    Google Scholar 

  5. Pommer, A., Uhl, A.: Wavelet packet methods for multimedia compression and encryption. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, pp. 1–4 (2001)

    Google Scholar 

  6. Keechul, J.: Neural Network-based Text Localization in Color Images. Pattern Recognition Letter 22(14), 1503–1515 (2001)

    Article  MATH  Google Scholar 

  7. Keechul, J., JungHyun, H.: Hybrid Approach to Efficient Text Extraction in Complex Color Images. Pattern Recognition Letter 25(6), 679–699 (2004)

    Article  Google Scholar 

  8. Zarit, B.D., Super, B.J., Quek, F.K.H.: Comparison of Five Color Models in Skin Pixel Classification. In: International Workshop on Recognition, Analysis and Tracking of Face and Gestures in Real-Time System, pp. 58–63 (1999)

    Google Scholar 

  9. Ehrsam, et al.: Product Block Cipher System for Data Security. U.S. Patent 3, 539–962 (1975)

    Google Scholar 

  10. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the advanced encryption standard. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  11. Jain, A.K., Karu, K.: Learning Texture Discrimination Masks. IEEE Transactions on Pattern Analysis and Machine Intelligence 18(2), 195–205 (1996)

    Article  Google Scholar 

  12. Pfarrhofer, P., Uhl, A.: Selective Image Encryption Using JBIG. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol. 3677, pp. 98–107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, K., Jung, K. (2006). Partial Encryption of Digital Contents Using Face Detection Algorithm. In: Yang, Q., Webb, G. (eds) PRICAI 2006: Trends in Artificial Intelligence. PRICAI 2006. Lecture Notes in Computer Science(), vol 4099. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-36668-3_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-36668-3_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36667-6

  • Online ISBN: 978-3-540-36668-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics