MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos

Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy protected, sometimes along with the locations of the surveillance and other sensitive information. Within the Surveillance System, these videos are processed and stored on a variety of devices. The processing and storage heterogeneity of those devices, together with their network requirements, make real-time surveillance systems complex and challenging. This paper proposes a surveillance system, named as Multi-Level Video Security (MuLViS) for privacy-protected cameras. Firstly, a Smart Surveillance Security Ontology (SSSO) is integrated within the MuLViS, with the aim of autonomously selecting the privacy level matching the operating device’s hardware specifications and network capabilities. Overall, along with its device-specific security, the system leads to relatively fast indexing and retrieval of surveillance video. Secondly, information within the videos are protected at the times of capturing, streaming, and storage by means of differing encryption levels. An extensive evaluation of the system, through visual inspection and statistical analysis of experimental video results, such as by the Encryption Space Ratio (ESR), has demonstrated the aptness of the security level assignments. The system is suitable for surveillance footage protection, which can be made General Data Protection Regulation (GDPR) compliant, ensuring that lawful data access respects individuals’ privacy rights.

[1]  Fei Peng,et al.  Separable reversible data hiding and encryption for HEVC video , 2017, Journal of Real-Time Image Processing.

[2]  Changda Wang,et al.  A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.

[3]  Abdul Razzaq,et al.  Ontology based application level intrusion detection system by using Bayesian filter , 2009, 2009 2nd International Conference on Computer, Control and Communication.

[4]  Zafar Shahid,et al.  Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Céline Hudelot,et al.  Building and using fuzzy multimedia ontologies for semantic image annotation , 2014, Multimedia Tools and Applications.

[6]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[7]  Zafar Shahid,et al.  Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.

[8]  Martin Fleury,et al.  Ontology-Based Intelligent Security Framework for Smart Video Surveillance , 2018 .

[9]  Jan Sher Khan,et al.  Chaos based efficient selective image encryption , 2018, Multidimensional Systems and Signal Processing.

[10]  Bob Zhang,et al.  Background modeling methods in video analysis: A review and comparative evaluation , 2016, CAAI Trans. Intell. Technol..

[11]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[12]  Haoxiang Wang,et al.  Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings , 2017, Future Gener. Comput. Syst..

[13]  David J. Fleet,et al.  Performance of optical flow techniques , 1994, International Journal of Computer Vision.

[14]  Neil Robinson,et al.  Public preferences for internet surveillance, data retention and privacy enhancing services: Evidence from a pan-European study , 2017, Comput. Hum. Behav..

[15]  Antonio Sánchez-Esguevillas,et al.  A Semantic Autonomous Video Surveillance System for Dense Camera Networks in Smart Cities , 2012, Sensors.

[16]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[17]  N. F. Noy,et al.  Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .

[18]  Atta Badii,et al.  Skin-based privacy filter for surveillance systems , 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP).

[19]  Zhou Wang,et al.  Video quality assessment based on structural distortion measurement , 2004, Signal Process. Image Commun..

[20]  Hugo Jair Escalante,et al.  Towards a Generic Ontology for Video Surveillance , 2017 .

[21]  Guillaume-Alexandre Bilodeau,et al.  Urban Tracker: Multiple object tracking in urban mixed traffic , 2014, IEEE Winter Conference on Applications of Computer Vision.

[22]  Mohammed Ghanbari,et al.  Standard Codecs: Image Compression to Advanced Video Coding , 2003 .

[23]  Russ Housley,et al.  Guidelines for Cryptographic Key Management , 2005, RFC.

[24]  Máire O'Neill,et al.  Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead , 2015, Signal Process. Image Commun..

[25]  Abbas Javed,et al.  An Intelligent Real-Time Occupancy Monitoring System with Enhanced Encryption and Privacy , 2018, 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).

[26]  Shreyas Sen,et al.  Self-Optimizing IoT Wireless Video Sensor Node With In-Situ Data Analytics and Context-Driven Energy-Aware Real-Time Adaptation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[27]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[28]  David Sánchez,et al.  Semantic adaptive microaggregation of categorical microdata , 2012, Comput. Secur..

[29]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[30]  Senem Velipasalar,et al.  Cooperative Object Tracking and Composite Event Detection With Wireless Embedded Smart Cameras , 2010, IEEE Transactions on Image Processing.

[31]  Giovanni Pau,et al.  A fuzzy-based approach for energy-efficient Wi-Fi communications in dense wireless multimedia sensor networks , 2018, Comput. Networks.

[32]  Wolfgang Straßer,et al.  Smart Camera Based Monitoring System and Its Application to Assisted Living , 2008, Proceedings of the IEEE.

[33]  Z. Zivkovic Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.

[34]  Darko Kirovski,et al.  Multimedia encryption and authentication - techniques and applications , 2006 .

[35]  Zhengyou Zhang,et al.  A Survey of Recent Advances in Face Detection , 2010 .

[36]  Shih-Chia Huang,et al.  An Advanced Motion Detection Algorithm With Video Quality Analysis for Video Surveillance Systems , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[37]  Mohammed Ghanbari,et al.  Sufficient encryption based on entropy coding syntax elements of H.264/SVC , 2015, Multimedia Tools and Applications.

[38]  Santanu Chaudhury,et al.  An Ontology-based Context-aware IoT Framework for Smart Surveillance , 2018 .

[39]  Jitendra Madarkar,et al.  Compute-Extensive Background Subtraction for Efficient Ghost Suppression , 2019, IEEE Access.

[40]  Jean Meunier,et al.  Comparative study of motion detection methods for video surveillance systems , 2017, J. Electronic Imaging.

[41]  Adel Alti,et al.  Autonomic Semantic-Based Context-Aware Platform for Mobile Applications in Pervasive Environments , 2016, Future Internet.

[42]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[43]  Martin Fleury,et al.  Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes , 2017, J. Vis. Commun. Image Represent..

[44]  Cordelia Schmid,et al.  Human Detection Using Oriented Histograms of Flow and Appearance , 2006, ECCV.

[45]  Saqlain Mirza,et al.  AES algorithm using advance key implementation in MATLAB , 2016 .

[46]  Helge Janicke,et al.  Semantics-aware detection of targeted attacks: a survey , 2017, Journal of Computer Virology and Hacking Techniques.

[47]  Vincenzo Loia,et al.  Towards an Ontology Design Pattern for UAV Video Content Analysis , 2019, IEEE Access.

[48]  Ferdinand van der Heijden,et al.  Efficient adaptive density estimation per image pixel for the task of background subtraction , 2006, Pattern Recognit. Lett..

[49]  John S. Garofolo,et al.  PERFORMANCE EVALUATION PROTOCOL FOR FACE, PERSON AND VEHICLE DETECTION & TRACKING IN VIDEO ANALYSIS AND CONTENT EXTRACTION (VACE-II) CLEAR - CLASSIFICATION OF EVENTS, ACTIVITIES AND RELATIONSHIPS , 2006 .

[50]  Mehran Yazdi,et al.  New trends on moving object detection in video images captured by a moving camera: A survey , 2018, Comput. Sci. Rev..

[51]  Kalpana Goyal,et al.  Review of background subtraction methods using Gaussian mixture model for video surveillance systems , 2017, Artificial Intelligence Review.

[52]  Martin Fleury,et al.  Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics , 2019, Sensors.

[53]  Alan C. Bovik,et al.  The Essential Guide to Video Processing , 2009, J. Electronic Imaging.

[54]  Ioan Marius Bilasco,et al.  OVIS: ontology video surveillance indexing and retrieval system , 2017, International Journal of Multimedia Information Retrieval.

[55]  Stefanos Zafeiriou,et al.  A survey on face detection in the wild: Past, present and future , 2015, Comput. Vis. Image Underst..

[56]  Wanqing Li,et al.  Human detection from images and videos: A survey , 2016, Pattern Recognit..

[57]  Fernando De la Torre,et al.  Spatio-temporal Matching for Human Detection in Video , 2014, ECCV.

[58]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[59]  Hai Jin,et al.  Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos , 2016, IEEE Transactions on Emerging Topics in Computing.

[60]  Hai Jin,et al.  Fully Reversible Privacy Region Protection for Cloud Video Surveillance , 2017, IEEE Transactions on Cloud Computing.

[61]  Khan A. Wahid,et al.  IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management , 2019, IEEE Access.

[62]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[63]  Shengcai Liao,et al.  A Fast and Accurate Unconstrained Face Detector , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[64]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[65]  Antonio F. Gómez-Skarmeta,et al.  SAFIR: Secure access framework for IoT-enabled services on smart buildings , 2015, J. Comput. Syst. Sci..

[66]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[67]  Martin Fleury,et al.  Visual Surveillance Within the EU General Data Protection Regulation: A Technology Perspective , 2019, IEEE Access.

[68]  Aakanksha Chowdhery,et al.  The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.

[69]  Touradj Ebrahimi,et al.  A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.

[70]  Frédéric Dufaux,et al.  Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[71]  J. Ferryman,et al.  PETS2009: Dataset and challenge , 2009, 2009 Twelfth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance.

[72]  Martin Fleury,et al.  Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).

[73]  Alzubair Hassan,et al.  An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment , 2019, Complex..

[74]  Shengcai Liao,et al.  Face Detection Based on Multi-Block LBP Representation , 2007, ICB.

[75]  Mirko Čubrilo,et al.  Ontology in Information Security , 2015 .

[76]  Daniela Moctezuma,et al.  HoGG: Gabor and HoG-based human detection for surveillance in non-controlled environments , 2013, Neurocomputing.

[77]  Mohammad Ghanbari,et al.  An Efficient Security System for CABAC Bin-Strings of H.264/SVC , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[78]  Hironobu Fujiyoshi,et al.  Moving target classification and tracking from real-time video , 1998, Proceedings Fourth IEEE Workshop on Applications of Computer Vision. WACV'98 (Cat. No.98EX201).

[79]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[80]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[81]  P. Siano,et al.  Iot-based smart cities: A survey , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).