Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Internet-based video surveillance systems are now widespread in the modern e-Society, since they can be used to manage multiple physical security problems in a lot of contexts. Moreover, the growing diffusion of portable device, along with the necessity of keeping specific environments and motion events under control, brought out the need for more flexible and proactive systems, which allow the management of such scenarios. However, most of the state of the art video surveillance systems are known to be unscalable, unreliable, insecure, and do not provide adequate guarantees for user awareness when a determined situation of interest occurs. Furthermore, almost all the currently defined systems, lack in operation flexibility: they are designed for a specific context and can not be easily adapted to the different ones.

[1]  Jean Ponce,et al.  Computer Vision: A Modern Approach , 2002 .

[2]  Tieniu Tan,et al.  A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Dorin Comaniciu,et al.  Adaptive Resolution System for Distributed Surveillance , 2002, Real Time Imaging.

[4]  Rita Cucchiara,et al.  A multi‐camera vision system for fall detection and alarm generation , 2007, Expert Syst. J. Knowl. Eng..

[5]  Rita Cucchiara,et al.  Computer vision techniques for PDA accessibility of in-house video surveillance , 2003, IWVS '03.

[6]  Daniel Stutzbach,et al.  Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Andrew J. Kornecki Computing Curricula for the 21st Century , 2008, IEEE Distributed Systems Online.

[8]  Akinori Yonezawa,et al.  Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.

[9]  Rita Cucchiara,et al.  Detecting Moving Objects, Ghosts, and Shadows in Video Streams , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Zehang Sun,et al.  A distributed visual surveillance system , 2003, Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, 2003..

[11]  Alfredo De Santis,et al.  Towards a Lawfully Secure and Privacy Preserving Video Surveillance System , 2010, EC-Web.

[12]  Thomas B. Moeslund,et al.  A Survey of Computer Vision-Based Human Motion Capture , 2001, Comput. Vis. Image Underst..

[13]  Umberto Ferraro Petrillo,et al.  Engineering a secure mobile messaging framework , 2012, Comput. Secur..

[14]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[15]  Mohammed Ghazal,et al.  A Modular Distributed Video Surveillance System Over IP , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[16]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[17]  R. G. J. Wijnhoven,et al.  Flexible surveillance system architecture for prototyping video content analysis algorithms , 2006, Electronic Imaging.

[18]  Mubarak Shah,et al.  KNIGHT/spl trade/: a real time surveillance system for multiple and non-overlapping cameras , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[19]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[20]  Sergio A. Velastin,et al.  Intelligent distributed surveillance systems: a review , 2005 .

[21]  Shaogang Gong,et al.  Visual Surveillance in a Dynamic and Uncertain World , 1995, Artif. Intell..

[22]  Umberto Ferraro Petrillo,et al.  An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[23]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[24]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[25]  Yue-Shan Chang,et al.  An Architecture for Video Surveillance Service Based on P2P and Cloud Computing , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[26]  Blake Ramsdell,et al.  S/MIME Version 3 Message Specification , 1999, RFC.

[27]  Jim R. Parker,et al.  Algorithms for image processing and computer vision , 1996 .

[28]  Xavier Desurmont,et al.  A general-purpose system for distributed surveillance and communication , 2006 .

[29]  Yongdae Kim,et al.  Attacking the Kad network , 2008, SecureComm.

[30]  P. Silva,et al.  Distributed Surveillance System , 2005, 2005 portuguese conference on artificial intelligence.

[31]  Keith W. Ross,et al.  Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.

[32]  Gerald Quirchmayr,et al.  Multidisciplinary Research and Practice for Information Systems , 2012, Lecture Notes in Computer Science.

[33]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[34]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[35]  Yakov Rekhter,et al.  Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.

[36]  A. Hampapur,et al.  Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking , 2005, IEEE Signal Processing Magazine.

[37]  Alfredo De Santis,et al.  Do You Trust Your Phone? , 2009, EC-Web.

[38]  A Min Tjoa,et al.  E-Commerce and Web Technologies , 2002, Lecture Notes in Computer Science.

[39]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.