Cost-Effective Security Support in Real-Time Video Surveillance

Visual surveillance has numerous applications. It can support public safety, traffic monitoring, and facility protection to name just a few. Networked digital surveillance devices are revolutionizing the surveillance industry by supporting high quality images, remote monitoring, and advanced image processing. However, they also raise serious privacy/security concerns. To address the issue, the surveillance industry has recently begun to provide basic support for secure communications. In this paper, we present a new protocol to significantly enhance the security and performance compared with the state-of-the-art baseline method widely taken in the video surveillance industry. Through extensive experiments for performance evaluation, our approach is shown to substantially reduce the delay to execute cryptographic mechanisms and increase the supported bit rate compared with the baseline, while providing desirable security features.

[1]  R.-I. Chang,et al.  Ubiquitous video surveillance service with secure forwarding agents , 2008, 2008 14th Asia-Pacific Conference on Communications.

[2]  Yasin Akman,et al.  Encryption Time Comparison of AES on FPGA and Computer , 2013 .

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  Elaine B. Barker,et al.  A Framework for Designing Cryptographic Key Management Systems , 2014 .

[5]  Jing Wang,et al.  Crowd anomaly detection for automated video surveillance , 2015, ICDP.

[6]  Aravindh Mahendran,et al.  Bus Detection for Adaptive Traffic Signal Control , 2014 .

[7]  Pieterjan De Potter,et al.  Semantic web technologies for video surveillance metadata , 2010, Multimedia Tools and Applications.

[8]  Gangolf Hirtz,et al.  Automated real-time surveillance for ambient assisted living using an omnidirectional camera , 2014, 2014 IEEE International Conference on Consumer Electronics (ICCE).

[9]  Changsheng Xu,et al.  Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes , 2013, IEEE Transactions on Industrial Informatics.

[10]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[11]  Xianguo Zhang,et al.  The IEEE 1857 Standard: Empowering Smart Video Surveillance Systems , 2014, IEEE Intelligent Systems.

[12]  Xingjun Wang,et al.  RDEA: A Novel Video Encryption Algorithm , 2015 .

[13]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[14]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[15]  Guanrong Chen,et al.  Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Honghai Liu,et al.  Intelligent Video Systems and Analytics: A Survey , 2013, IEEE Transactions on Industrial Informatics.

[17]  Dietmar Bruckner,et al.  Hierarchical Semantic Processing Architecture for Smart Sensors in Surveillance Networks , 2012, IEEE Transactions on Industrial Informatics.