scispace - formally typeset
Open AccessBook ChapterDOI

Security and Privacy in Video Surveillance: Requirements and Challenges

Reads0
Chats0
TLDR
A general model of video surveillance systems is presented that will help identify the major security and privacy requirements for a video surveillance system and a gap is shown between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain.
Abstract
Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Lightweight Encryption Method for Privacy Protection in Surveillance Videos

TL;DR: A lightweight encryption approach is devised based on layered cellular automata (LCA) that encrypts limited privacy-sensitive areas to encrypting the entire video because of the resource-tightened Internet of Things devices.
Journal ArticleDOI

Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption

TL;DR: A proposed cancelable face and fingerprint recognition algorithm based on the 3D jigsaw transform and optical encryption that has good encryption and cancelability that reveal good performance is presented.
Journal ArticleDOI

Fall detection based on the gravity vector using a wide-angle camera

TL;DR: This paper proposes a low cost fall detection system based on a single wide-angle camera used to reduce the number of cameras required for monitoring large areas and is 97% accurate for fall detection.
Journal ArticleDOI

Support vector machine approach to fall recognition based on simplified expression of human skeleton action and fast detection of start key frame using torso angle

TL;DR: A fall detection method for indoor environments based on the Kinect sensor and analysis of three-dimensional skeleton joints information is proposed and can be used in real-time video surveillance because of its time efficiency and robustness.
Journal ArticleDOI

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment

TL;DR: The proposed framework is fast and ensures secure and efficient real-time processing by minimizing the transmission cost and storage and performs an efficient image encryption algorithm by employing a discrete fractional random transform (DFRT).
References
More filters
Journal ArticleDOI

Region filling and object removal by exemplar-based image inpainting

TL;DR: The simultaneous propagation of texture and structure information is achieved by a single, efficient algorithm that combines the advantages of two approaches: exemplar-based texture synthesis and block-based sampling process.
Journal ArticleDOI

W/sup 4/: real-time surveillance of people and their activities

TL;DR: W/sup 4/ employs a combination of shape analysis and tracking to locate people and their parts and to create models of people's appearance so that they can be tracked through interactions such as occlusions.
Proceedings ArticleDOI

Object removal by exemplar-based inpainting

TL;DR: A best-first algorithm in which the confidence in the synthesized pixel values is propagated in a manner similar to the propagation of information in inpainting, which demonstrates the effectiveness of the algorithm in removing large occluding objects as well as thin scratches.
Book

Digital Video: An introduction to MPEG-2

TL;DR: This book offers comprehensive coverage of the MPEG-2 audio / visual digital compression standard, including the specifics needed to implement an MPEG-1 Decoder, and outlines the fundamentals of encoder design and algorithm optimization.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.