A new encryption scheme for surveillance videos

In this paper, we propose a novel framework to encrypt surveillance videos. Although a few encryption schemes have been proposed in the literature, they are not sufficiently efficient due to the lack of full consideration of the characteristics of surveillance videos, i.e., intensive global redundancy. By taking advantage of such redundancy, we design a novel method for encrypting such videos. We first train a background dictionary based on several frame observations. Then every single frame is parsed into the background and foreground components. Separation is the key to improve the efficiency of the proposed technique, since encryption is only carried out in the foreground, while the background is skillfully recorded by corresponding background recovery coefficients. Experimental results demonstrate that, compared to the state of the art, the proposed method is robust to known cryptanalytic attacks, and enhances the overall security due to the foreground and background separation. Additionally, our encryption method is faster than competing methods, which do not conduct foreground extraction.

[1]  Dacheng Tao,et al.  GoDec: Randomized Lowrank & Sparse Matrix Decomposition in Noisy Case , 2011, ICML.

[2]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[3]  Xiaochun Cao,et al.  Motion matters: a novel framework for compressing surveillance videos , 2013, ACM Multimedia.

[4]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[5]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[6]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[7]  Heejo Lee,et al.  SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[8]  Steve McLaughlin,et al.  Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[10]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[11]  Yi Ma,et al.  The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.

[12]  Anuja Kumar Acharya,et al.  Image encryption using a new chaos based encryption algorithm , 2011, ICCCS '11.

[13]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[14]  Yuliang Zheng,et al.  Communication protection in IP-based video surveillance systems , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[15]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[16]  Takeo Kanade,et al.  Introduction to the Special Section on Video Surveillance , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Wu-chi Feng,et al.  Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[18]  Dominique Barchiesi,et al.  A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..

[19]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[20]  Bernhard Rinner,et al.  Distributed embedded smart cameras for surveillance applications , 2006, Computer.

[21]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[22]  G. Sapiro,et al.  A collaborative framework for 3D alignment and classification of heterogeneous subvolumes in cryo-electron tomography. , 2013, Journal of structural biology.

[23]  Peter A. Flach,et al.  Proceedings of the 28th International Conference on Machine Learning , 2011 .

[24]  R. Cucchiara Multimedia surveillance systems , 2005, VSSN@MM.

[25]  Bharat K. Bhargava,et al.  MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.

[26]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[27]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[28]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[29]  Stefanos D. Kollias,et al.  Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes , 2005, IEEE International Conference on Image Processing 2005.

[30]  Xinhua Zhuang,et al.  Network friendly media security: rationales, solutions, and open issues , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[31]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[32]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[33]  Xue Li,et al.  Motion vector encryption in multimedia streaming , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[34]  Gérard G. Medioni,et al.  Detecting and tracking moving objects for video surveillance , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[35]  Daniel Bleichenbacher,et al.  Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.

[36]  Lily Lee,et al.  Monitoring Activities from Multiple Video Streams: Establishing a Common Coordinate Frame , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[37]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .