Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems

Both private and public organizations are considering the implementation of video surveillance technology for the purposes of general Law Enforcement and Public Safety programs. In several situations, such solutions, often characterized by high-speed network connections, plenty of storage capacity, and a high computational power, may be suitable in protecting public safety, detection or deterring, as well as assisting in the investigating of criminal activity. In this scenario, privacy protection, lawful evidence enforcement (through incontrovertible documentary proof), and content confidentiality are the most challenging security topics relating to several information society sectors (Finance, Homeland Security, Healthcare, etc.) that require interdisciplinary input from legal experts, technicians, privacy advocates, as well as security consultants. Starting from these ideas and concepts, this chapter aims at presenting an innovative network-based digital video surveillance solution that meets all the aforementioned security and privacy requirements ensuring that the recorded data will be only accessible to a subset of authorities, trusting each other under precisely defined policies, agreements, and circumstances. This would aid the surveillance activities, when needed, without disrupting the privacy of individuals.

[1]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Gustavus J. Simmons,et al.  Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.

[4]  David Murakami Wood,et al.  The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space , 2002 .

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[7]  Xiaodong Cai,et al.  MPEG4 over local area mobile surveillance system , 2003 .

[8]  Mansour Moniri,et al.  Classification of smart video surveillance systems for commercial applications , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..

[9]  Nicholas Carriero,et al.  Adaptive Parallelism and Piranha , 1995, Computer.

[10]  Joseph Bonneau,et al.  Cache-Collision Timing Attacks Against AES , 2006, CHES.

[11]  Polychronis Koutsakis,et al.  Integrated wireless access for videoconference from MPEG-4 and H.263 video coders with voice, E-mail, and web traffic , 2005, IEEE Transactions on Vehicular Technology.

[12]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[13]  Clifton L. Smith,et al.  The understanding of security technology and its applications , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[14]  A. Al Hasib,et al.  A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[15]  Bernhard Rinner,et al.  Distributed embedded smart cameras for surveillance applications , 2006, Computer.

[16]  P. Venkat Rangan,et al.  Multimedia Storage Servers: A Tutorial , 1995, Computer.

[17]  Anja Becker,et al.  Assessing privacy criteria for drm using eu privacy legislation , 2008, DRM '08.

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Wayne H. Wolf,et al.  Smart Cameras as Embedded Systems , 2002, Computer.