JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (1): 19-29.doi: 10.6040/j.issn.1671-9352.2.2017.077

Previous Articles     Next Articles

Enhancing privacy for geographic information based on video analysis

KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao   

  1. School of Information Management, Beijing Information Science and Technology University, Beijing 100192, China
  • Received:2017-08-28 Online:2018-01-20 Published:2018-01-19

Abstract: Video resources in social networks contain abundant geography information, which always cause severe security challenge to individual privacy. A method of enhancing privacy for geographic information based on video analysis(EP-VGI)is proposed with the analytical principle of sun shadow positioning and local image artifacts. To extract geographic information, we set up a model of sun shadow by observe the changing shadow in the video. We selected the natural projection shadow area by processing the video image sequence. By using the methods of adaptive mesh, we achieved our purpose to protect the geographic information and privacy protection. Experiments show the method can be successful to mislead the hacker by hiding geographic information, and ensure the videos availability at the same time by actual testing.

Key words: adaptive mesh, sun shadow positioning model, geographic information, privacy protection, least squares approximation

CLC Number: 

  • TP309
[1] HAYS J, EFROS A A. IM2GPS: estimating geographic information from a single image[C] // IEEE Conference on Computer Vision and Pattern Recognition. Anchorage: IEEE, 2008: 1-8.
[2] SUNKAVALLI K, ROMEIRO F, MATUSIK W, et al. What do color changes reveal about an outdoor scene?[C] // IEEE Conference on Computer Vision and Pattern Recognition. Anchorage: IEEE, 2008: 9-16.
[3] 田建东, 王占鹏, 唐延东. 静态阴影检测的研究进展[J]. 信息与控制, 2015, 44(2):215-222. TIAN Jiandong, WANG Zhanpeng, TANG Yandong. Static shadow detection: a survey[J]. Information and Control, 2015, 44(2):215-222.
[4] GUO Ruiqi, DAI Qieyun, HOIEM D. Single-image shadow detection and removal using paired regions[C] // IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2011: 2033-2040.
[5] CUCCHIARA R, GRANA C, PICCARDI M, et al. Detecting moving objects, ghosts, and shadows in video streams[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(10):1337-1342.
[6] 王珦磊, 唐加山. 一种基于YUV颜色空间自适应阴影消除算法[J]. 微型机与应用, 2016, 35(7):44-47. WANG Xianglei, TANG Jiashan. An adaptive shadow elimination algorithm based on YUV color space[J]. Microcomputer & Its Applications, 2016, 35(7):44-47.
[7] 金勇, 吴庆标, 刘利刚. 基于自适应网格变形的图像编辑算法[J]. 软件学报, 2012, 34(5):1325-1334. JIN Yong, WU Qingbiao, LIU Ligang. Image editing algorithms based on adaptive mesh deformation[J]. Journal of Software, 2012, 23(5):1325-1334.
[8] 武琳. 基于太阳阴影轨迹的经纬度估计技术研究[D]. 天津: 天津大学, 2010. WU Lin. Geo-location estimation from two shadow trajectories[D]. Tianjin: TianjinUniversity, 2010.
[9] SHEN Yuping, CAO Xiaochun, LU Fei, et al. Camera Calibration from Two Shadow Trajectories.[C] // International Conference on Pattern Recognition. Hong Kong: IEEE, 2006, 2: 1-4.
[10] 2015高教社杯全国大学生数学建模竞赛A题[EB/OL]. http://www.mcm.edu.cn/html_cn/node/ac8b96613522ef62c019d1cd45a125e3.html
[11] 黄飞. 基于局部不变特征的图像分类研究[D]. 北京: 北京邮电大学, 2013. HUANG Fei. Research on local invariant feature based image classification[D]. Beijing: Beijing University of Posts and Telecommunications, 2013.
[12] 唐志敏. 图像分类中的局部不变特征研究[D]. 长沙: 湖南大学, 2015. TANG Zhimin. Study on local invariant features in image classification[D]. Chang Sha: Hunan University, 2015.
[1] BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84.
[2] . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67.
[3] LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91.
[4] CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97.
[5] CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89.
[6] ZHAO Ze-mao1, LI Lin1, ZHANG Fan1,2, ZHANG Pin1, ZHOU Jian-qin1, WANG Jia-bo1. The location privacy protection method with dispersed sub cloaking region [J]. J4, 2013, 48(7): 56-61.
[7] . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14.
[8] GAO Feng1, HE Jing-sha2. A  privacy protection method based on a trust and information flow model [J]. J4, 2011, 46(5): 39-43.
[9] QIU Tao-rong, WANG Lu, XIONG Shu-jie, BAI Xiao-ming. A granular computing approach for knowledge hiding [J]. J4, 2010, 45(7): 60-64.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!