{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:12:38Z","timestamp":1766067158171,"version":"build-2065373602"},"reference-count":65,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["2019-0-00203"],"award-info":[{"award-number":["2019-0-00203"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Closed-circuit television (CCTV) and video surveillance systems (VSSs) are becoming increasingly more common each year to help prevent incidents\/accidents and ensure the security of public places and facilities. The increased presence of VSS is also increasing the number of per capita exposures to CCTV cameras. To help protect the privacy of the exposed objects, attention is being drawn to technologies that utilize intelligent video surveillance systems (IVSSs). IVSSs execute a wide range of surveillance duties\u2014from simple identification of objects in the recorded video data, to understanding and identifying the behavioral patterns of objects and the situations at the incident\/accident scenes, as well as the processing of video information to protect the privacy of the recorded objects against leakage. Besides, the recorded privacy information is encrypted and recorded using blockchain technology to prevent forgery of the image. The technology herein proposed (the \u201cproposed mechanism\u201d) is implemented to a VSS, where the mechanism converts the original visual information recorded on a VSS into a similarly constructed image information, so that the original information can be protected against leakage. The face area extracted from the image information is recorded in a separate database, allowing the creation of a restored image that is in perfect symmetry with the original image for images with virtualized face areas. Specifically, the main section of this study proposes an image modification mechanism that inserts a virtual face image that closely matches a predetermined similarity and uses a blockchain as the storage area.<\/jats:p>","DOI":"10.3390\/sym12060891","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T04:12:09Z","timestamp":1591157529000},"page":"891","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems"],"prefix":"10.3390","volume":"12","author":[{"given":"Jinsu","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Convergence Information Security, Graduate School, Jeju National University, Jeju City  63243, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4434-8933","authenticated-orcid":false,"given":"Namje","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Convergence Information Security, Graduate School, Jeju National University, Jeju City  63243, Korea"},{"name":"Department of Computer Education, Teachers College, Jeju National University, Jeju City  63243, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,6,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1049\/iet-bmt.2018.5008","article-title":"Low-resolution face recognition and the importance of proper alignment","volume":"8","author":"Yuxi","year":"2019","journal-title":"IET Biom."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.image.2018.03.007","article-title":"A saliency prediction model on 360 degree images using color dictionary based sparse representation","volume":"69","author":"Ling","year":"2018","journal-title":"Signal Process. Image Commun."},{"doi-asserted-by":"crossref","unstructured":"Kim, J., Park, N., Kim, G., and Jin, S. (2019). CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia. Electronics, 8.","key":"ref_3","DOI":"10.3390\/electronics8040412"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.micpro.2018.07.008","article-title":"Continuous face authentication scheme for mobile devices with tracking and liveness detection","volume":"63","author":"Creasey","year":"2018","journal-title":"Microprocess. Microsyst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.inffus.2017.09.002","article-title":"Unconstrained Kinect video face database","volume":"44","author":"Chhokra","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_6","first-page":"231","article-title":"Hierarchical image encryption with orthogonality","volume":"17","author":"Kim","year":"2006","journal-title":"J. KJOP"},{"key":"ref_7","first-page":"837","article-title":"The Core Competencies of SEL-based Innovative Creativity Education","volume":"118","author":"Park","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.eswa.2019.06.034","article-title":"Fingertip Detection and Tracking for Recognition of Air-Writing in Videos","volume":"136","author":"Arceda","year":"2019","journal-title":"Exp. Syst. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/j.ijleo.2017.11.188","article-title":"GPU accelerated face detection from low resolution surveillance videos using motion and skin color segmentation","volume":"157","author":"Mutneja","year":"2018","journal-title":"Optik"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.neucom.2018.10.041","article-title":"\u201cStream loss\u201d: ConvNet learning for face verification using unlabeled videos in the wild","volume":"329","author":"Rashedi","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2965438","DOI":"10.1155\/2016\/2965438","article-title":"Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)","volume":"12","author":"Park","year":"2016","journal-title":"Int. J. Distrib. Sens. Networks"},{"key":"ref_12","first-page":"178","article-title":"The Information Theoretical Significance of Spatial and Temporal Masking in Video Signals","volume":"1077","author":"Girod","year":"1989","journal-title":"OE\/LASE \u201989"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.csi.2015.06.006","article-title":"An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers","volume":"44","author":"Lee","year":"2016","journal-title":"Comput. Stand. Interfaces"},{"doi-asserted-by":"crossref","unstructured":"Milosavljevi\u0107, A., Ran\u010di\u0107, D., Dimitrijevi\u0107, A., Predi\u0107, B., and Mihajlovi\u0107, V. (2016). Integration of GIS and video surveillance. Int. J. Geogr. Inf. Sci., 1\u201319.","key":"ref_14","DOI":"10.1080\/13658816.2016.1161197"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s10586-014-0367-y","article-title":"Implementation of load management application system using smart grid privacy policy in energy management service environment","volume":"17","author":"Park","year":"2014","journal-title":"Clust. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.imavis.2018.09.008","article-title":"A coupled encoder\u2013decoder network for joint face detection and landmark localization","volume":"87","author":"Wang","year":"2019","journal-title":"Image Vis. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1093\/ips\/olx020","article-title":"Security in the Society of Control: The Politics and Practices of Securing Urban Spaces","volume":"11","author":"Hagmann","year":"2017","journal-title":"Int. Political Sociol."},{"doi-asserted-by":"crossref","unstructured":"Essa, A., and Asari, V.K. (2016, January 25\u201329). Face recognition based on modular histogram of oriented directional features. Proceedings of the 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), Dayton, OH, USA.","key":"ref_18","DOI":"10.1109\/NAECON.2016.7856773"},{"doi-asserted-by":"crossref","unstructured":"Kose, N., and Dugelay, J.L. (2013, January 22\u201326). Countermeasure for the protection of face recognition systems against mask attacks. Proceedings of the 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), Shanghai, China.","key":"ref_19","DOI":"10.1109\/FG.2013.6553761"},{"unstructured":"Kim, H.A. (2004). Data Blurring Method for Dollaborative Filtering. [Ph.D. Thesis, Department of Computer Engineering, The Graduate School of Dongguk University].","key":"ref_20"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Yang, X., and Cheng, K.T. (2018). Accurate face alignment and adaptive patch selection for heart rate estimation from videos under realistic scenarios. PLoS ONE, 13.","key":"ref_21","DOI":"10.1371\/journal.pone.0197275"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13082","DOI":"10.1016\/j.eswa.2011.04.115","article-title":"Pattern Classification and Audiovisual Content Management techniques using Hybrid Expert Systems: A video-assisted Bioacoustics Application in Abdominal Sounds Pattern Analysis","volume":"38","author":"Dimoulas","year":"2011","journal-title":"Exp. Syst. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2008\/792028","article-title":"Joint Wavelet Video Denoising and Motion Activity Detection in multi-modal human activity analysis: Application to video\u2014Assisted bioacoustic\/psycho-physiological monitoring","volume":"2008","author":"Dimoulas","year":"2007","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TBCAS.2007.914481","article-title":"Multimodality Sensor System for Long-Term Sleep Quality Monitoring","volume":"1","author":"Peng","year":"2007","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00779-017-1017-1","article-title":"Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment","volume":"22","author":"Park","year":"2018","journal-title":"Person. Ubiquitous Comput."},{"key":"ref_26","first-page":"1332","article-title":"Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Image","volume":"18","author":"Jeon","year":"2015","journal-title":"J. KMS"},{"key":"ref_27","first-page":"667","article-title":"The research of virtual face based on Deep Convolutional Generative Adversarial Networks using TensorFlow","volume":"521","author":"Liu","year":"2019","journal-title":"J. Phys. A SMA"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1186\/s13673-017-0101-x","article-title":"PLC-based design of monitoring system for ICT-integrated vertical fish farm","volume":"7","author":"Huh","year":"2017","journal-title":"Hum.-Cent. Comput. Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.imavis.2013.12.004","article-title":"Face detection by structural models, Image annotation: Then and now","volume":"32","author":"Yan","year":"2014","journal-title":"Image Vis. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1007\/s12083-018-0637-1","article-title":"De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment","volume":"11","author":"Lee","year":"2018","journal-title":"J. Peer-to-Peer Network. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.imavis.2018.09.017","article-title":"Image annotation: Then and now","volume":"80","author":"Bhagat","year":"2018","journal-title":"Image Vis. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"151","DOI":"10.14419\/ijet.v7i2.33.13873","article-title":"ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment","volume":"7","author":"Lee","year":"2018","journal-title":"J. IJET"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1049\/ip-vis:20041215","article-title":"Computer vision system for in-house video surveillance","volume":"152","author":"Cucchiara","year":"2005","journal-title":"IEE Proc. Vis. Image Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Park, N., and Kang, N. (2016). Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors, 16.","key":"ref_34","DOI":"10.3390\/s16010020"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1049\/iet-ipr.2011.0269","article-title":"Classification of surveillance video objects using chaotic series","volume":"6","author":"Azhar","year":"2012","journal-title":"IET Image Process."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.imavis.2018.03.004","article-title":"Patch-based face recognition using a hierarchical multi-label matcher, Image annotation: Then and now","volume":"73","author":"Zhang","year":"2018","journal-title":"Image Vis. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.imavis.2016.08.007","article-title":"Discriminative transfer learning with sparsity regularization for single-sample face recognition, Image annotation: Then and now","volume":"60","author":"Hu","year":"2017","journal-title":"Image Vis. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1016\/j.patrec.2007.06.007","article-title":"Damascening video databases for evaluation of face tracking and recognition\u2014The DXM2VTS database","volume":"28","author":"Teferi","year":"2007","journal-title":"Pattern Recognit. Lett."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1478","DOI":"10.1016\/j.neucom.2009.11.010","article-title":"Combine image quality fusion and illumination compensation for video-based face recognition","volume":"73","author":"Wang","year":"2010","journal-title":"Neurocomputing"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1049\/iet-spr.2011.0074","article-title":"Unsupervised video anomaly detection using feature clustering","volume":"6","author":"Li","year":"2012","journal-title":"IET Signal Process."},{"key":"ref_41","first-page":"20","article-title":"Modelling periodic scene elements for visual surveillance","volume":"37","author":"Leung","year":"2001","journal-title":"IET Comput. Vis."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1093\/idpl\/ipx018","article-title":"Cape Town as a smart and safe city: Implications for governance and data privacy","volume":"7","author":"Loideain","year":"2017","journal-title":"Int. Data Priv. Law"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1007\/s11227-016-1841-5","article-title":"Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance","volume":"73","author":"Lee","year":"2017","journal-title":"J. Supercomput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1049\/iet-cvi.2015.0321","article-title":"Video analytics revisited","volume":"10","author":"Ayesha","year":"2016","journal-title":"IET Comput. Vis."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1049\/el:20020290","article-title":"Fast motion detection in compressed domain for video surveillance","volume":"38","author":"Pons","year":"2002","journal-title":"Electron. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1002\/sec.1108","article-title":"Mobile middleware platform for secure vessel traffic system in IoT service environment","volume":"9","author":"Park","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_47","first-page":"484","article-title":"Uniform Motion Deblurring using Shock Filter and Convolutional Neural Network","volume":"23","author":"Jeong","year":"2018","journal-title":"J. KSBE"},{"key":"ref_48","first-page":"741","article-title":"WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment, Advanced Web and Network Technologies, and Applications","volume":"3842","author":"Park","year":"2006","journal-title":"LNCS"},{"key":"ref_49","first-page":"7","article-title":"Pixel Recursive Super Resolution","volume":"7","author":"Dahl","year":"2017","journal-title":"J. ICCV"},{"doi-asserted-by":"crossref","unstructured":"Raghavendra, R., and Busch, C. (2014, January 27\u201330). Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack. Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP), Paris, France.","key":"ref_50","DOI":"10.1109\/ICIP.2014.7025064"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/LSP.2011.2146772","article-title":"Complexity Reduced Face Detection Using Probability-Based Face Mask Prefiltering and Pixel-Based Hierarchical-Feature Adaboosting","volume":"18","author":"Guo","year":"2011","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/j.jvcir.2018.07.001","article-title":"Learning an video frame-based face detection system for security fields","volume":"55","author":"Niu","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.jvcir.2019.01.027","article-title":"An efficient privacy protection scheme for data security in video surveillance","volume":"59","author":"Du","year":"2019","journal-title":"Vis. Commun. Image Represent."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.neucom.2016.12.059","article-title":"Surveillance video face recognition with single sample per person based on 3D modeling and blurring","volume":"235","author":"Hu","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jvcir.2018.12.039","article-title":"Video facial emotion recognition based on local enhanced motion history image and CNN-CTSLSTM networks","volume":"59","author":"Hu","year":"2019","journal-title":"Vis. Commun. Image Represent."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.future.2010.11.008","article-title":"Automatic extraction of face contours in images and videos","volume":"28","author":"Hsu","year":"2012","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.optlastec.2017.10.016","article-title":"Face recognition using total loss function on face database with ID photos","volume":"110","author":"Cui","year":"2019","journal-title":"Opt. Laser Technol."},{"doi-asserted-by":"crossref","unstructured":"Huh, J.H., and Seo, K. (2016, January 25\u201328). Smart Grid Test Bed Using OPNET and Power Line Communication. Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan.","key":"ref_58","DOI":"10.1109\/SCIS-ISIS.2016.0161"},{"doi-asserted-by":"crossref","unstructured":"Naveen, S., Fathima, R.S., and Moni, R.S. (2016, January 19\u201320). Face recognition and authentication using LBP and BSIF mask detection and elimination. Proceedings of the 2016 International Conference on Communication Systems and Networks (ComNet), Ahmedabad, India.","key":"ref_59","DOI":"10.1109\/CSN.2016.7823994"},{"doi-asserted-by":"crossref","unstructured":"Cakiroglu, O., Ozer, C., and Gunsel, B. (2019, January 24\u201326). Design of a Deep Face Detector by Mask R-CNN. Proceedings of the 27th Signal Processing and Communications Applications Conference (SIU), Sivas, Turkey.","key":"ref_60","DOI":"10.1109\/SIU.2019.8806447"},{"doi-asserted-by":"crossref","unstructured":"Ramkumar, G., and Logashanmugam, E. (2016, January 15\u201317). An effectual face tracking based on transformed algorithm using composite mask. Proceedings of the 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India.","key":"ref_61","DOI":"10.1109\/ICCIC.2016.7919614"},{"doi-asserted-by":"crossref","unstructured":"Kim, D., and Park, S. (2018, January 3\u20136). A Study on Face Masking Scheme in Video Surveillance System. Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic.","key":"ref_62","DOI":"10.1109\/ICUFN.2018.8436783"},{"doi-asserted-by":"crossref","unstructured":"Uddin, M., Alam, A., Tu, N., Islam, M., and Lee, Y. (2019). SIAT: A Distributed Video Analytics Framework for Intelligent Video Surveillance. Symmetry, 11.","key":"ref_63","DOI":"10.3390\/sym11070911"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.eswa.2017.05.067","article-title":"Protecting the privacy of humans in video sequences using a computer vision-based de-identification pipeline","volume":"87","year":"2017","journal-title":"Exp. Syst. Appl."},{"unstructured":"Gross, R., Sweeney, L., de la Torre, F., and Baker, S. (2006, January 17\u201322). Model-Based Face De-Identification. Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW\u201906), New York, NY, USA.","key":"ref_65"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/6\/891\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:34:28Z","timestamp":1760175268000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/6\/891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":65,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["sym12060891"],"URL":"https:\/\/doi.org\/10.3390\/sym12060891","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2020,6,1]]}}}