Martin Dziak, V. Hajduk, D. Levický, J. Gazda, G. Bugár
{"title":"A Novel Reversible Censorship Algorithm","authors":"Martin Dziak, V. Hajduk, D. Levický, J. Gazda, G. Bugár","doi":"10.23919/ELMAR.2018.8534663","DOIUrl":null,"url":null,"abstract":"Image files may contain portions of sensitive or intimate content that should not be visible to everyone. This paper deals with various methods of image processing and coding, to protect privacy through face identification. We proposed an encryption procedure implemented in software that allows face detection and subsequent blurring of selected fragments by DCT image transformation while preserving the details needed for successful reconstruction within the same image. A blind steganographic method was used for information embedding into the source cover image. This protected image is accessible to be viewed for ordinary viewers and a dedicated decoder is required for content restoration. The decoder ensures that only authorized persons are allowed to see the content without censorship. The conclusion of the paper focuses on the quality evaluation of the proposed method based on observed statistical parameters.","PeriodicalId":175742,"journal":{"name":"2018 International Symposium ELMAR","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Symposium ELMAR","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ELMAR.2018.8534663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Image files may contain portions of sensitive or intimate content that should not be visible to everyone. This paper deals with various methods of image processing and coding, to protect privacy through face identification. We proposed an encryption procedure implemented in software that allows face detection and subsequent blurring of selected fragments by DCT image transformation while preserving the details needed for successful reconstruction within the same image. A blind steganographic method was used for information embedding into the source cover image. This protected image is accessible to be viewed for ordinary viewers and a dedicated decoder is required for content restoration. The decoder ensures that only authorized persons are allowed to see the content without censorship. The conclusion of the paper focuses on the quality evaluation of the proposed method based on observed statistical parameters.