Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption

This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image encryption. First, an efficient video summarization method is used to extract the informative frames using the processing capabilities of visual sensors. When an event is detected from keyframes, an alert is sent to the concerned authority autonomously. As the final decision about an event mainly depends on the extracted keyframes, their modification during transmission by attackers can result in severe losses. To tackle this issue, we propose a fast probabilistic and lightweight algorithm for the encryption of keyframes prior to transmission, considering the memory and processing requirements of constrained devices that increase its suitability for IoT systems. Our experimental results verify the effectiveness of the proposed method in terms of robustness, execution time, and security compared to other image encryption algorithms. Furthermore, our framework can reduce the bandwidth, storage, transmission cost, and the time required for analysts to browse large volumes of surveillance data and make decisions about abnormal events, such as suspicious activity detection and fire detection in surveillance applications.

[1]  Rafik Hamza,et al.  A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..

[2]  Jaime Lloret,et al.  A Wireless Sensor Network for Vineyard Monitoring That Uses Image Processing , 2011, Sensors.

[3]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[4]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[5]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[6]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[7]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[8]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[9]  Mohammad Reza Mosavi,et al.  A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process , 2012, Multimedia Tools and Applications.

[10]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[11]  Zhihan Lv,et al.  Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..

[12]  Jaime Lloret,et al.  An Intelligent handover process algorithm in 5G networks: The use case of mobile cameras for environmental surveillance , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[13]  Bin Wang,et al.  Encryption Method Based on a New Secret Key Algorithm for Color Images , 2016 .

[14]  Amit K. Roy-Chowdhury,et al.  Multi-View Surveillance Video Summarization via Joint Embedding and Sparse Optimization , 2017, IEEE Transactions on Multimedia.

[15]  Ming Wang,et al.  Energy-Aware Concurrent Multipath Transfer for Real-Time Video Streaming Over Heterogeneous Wireless Networks , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Sung Wook Baik,et al.  Saliency-directed prioritization of visual data in wireless surveillance networks , 2015, Inf. Fusion.

[17]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[18]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[19]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[20]  Guang Li,et al.  An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.

[21]  Amir Akhavan,et al.  A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..

[22]  Sung Wook Baik,et al.  Sparse Representations-Based Super-Resolution of Key-Frames Extracted from Frames-Sequences Generated by a Visual Sensor Network , 2014, Sensors.

[23]  Xiaoling Huang,et al.  Image encryption algorithm using chaotic Chebyshev generator , 2011, Nonlinear Dynamics.

[24]  J. Lloret,et al.  802.11g WLANs Design for Rural Environments Video-surveillance , 2006, International Conference on Digital Telecommunications (ICDT'06).

[25]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[26]  Abderrahim Saaidi,et al.  A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher , 2015 .

[27]  Sung Wook Baik,et al.  Efficient visual attention driven framework for key frames extraction from hysteroscopy videos , 2017, Biomed. Signal Process. Control..

[28]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[29]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.

[30]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[31]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .