ArticlePDF Available

Cost-Effective Security Support in Real-Time Video Surveillance

Authors:

Abstract

Visual surveillance has numerous applications. It can support public safety, traffic monitoring, and facility protection to name just a few. Networked digital surveillance devices are revolutionizing the surveillance industry by supporting high quality images, remote monitoring, and advanced image processing. However, they also raise serious privacy/security concerns. To address the issue, the surveillance industry has recently begun to provide basic support for secure communications. In this paper, we present a new protocol to significantly enhance the security and performance compared with the state-of-the-art baseline method widely taken in the video surveillance industry. Through extensive experiments for performance evaluation, our approach is shown to substantially reduce the delay to execute cryptographic mechanisms and increase the supported bit rate compared with the baseline, while providing desirable security features.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 1
Cost-Effective Security Support in Real-Time
Video Surveillance
Udaya L. N. Puvvadi, Kevin Di Benedetto, Aditya Patil, Kyoung-Don Kang Member, IEEE,
Youngjoon Park
Abstract—Visual surveillance has numerous applications. It can support, for example, public safety, traffic monitoring, and facility
protection to name just a few. Networked digital surveillance devices are revolutionizing the surveillance industry by supporting
high quality images, remote monitoring, and advanced image processing. However, they also raise serious privacy/security
concerns. To address the issue, the surveillance industry has recently begun to provide basic support for secure communications.
In this paper, we present a new protocol to significantly enhance the security and performance compared to the state-of-the-art
baseline method widely taken in the video surveillance industry. Through extensive experiments for performance evaluation, our
approach is shown to substantially reduce the delay to execute cryptographic mechanisms and increase the supported bit rate
compared to the baseline, while providing desirable security features.
Index Terms—Digital Video Surveillance, Data Confidentiality, Integrity, and Freshness, Delay for Cryptographic Processing, Bit
Rate
1 INTRODUCTION
Visual surveillance systems are increasingly deployed
in many places, such as buildings, streets, indus-
trial facilities, schools, shopping centers, airports, and
homes, to support, for example, public safety, traffic
monitoring, and infrastructure protection. The recent
availability of digital HD (High Definition) cameras
and network surveillance devices that support the IP
(Internet Protocol) greatly enhances the effectiveness
of visual surveillance by supporting high quality im-
ages, remote monitoring, and advanced image pro-
cessing. For example, it is envisioned that a suspicious
behavior in a crowd can be detected in real-time
by analyzing HD images using advanced computer
vision techniques before it becomes a problem [1]. In
2012, approximately 8 million security/surveillance
devices worldwide were connected to the Internet
and the number is expected to grow to 170 million
in 2021 [2]. This is a sea change in the surveillance
industry that traditionally relied on analog cameras
with limited processing capabilities and closed, iso-
lated surveillance networks.
On the other hand, networked visual surveillance
systems raise privacy concerns. As more IP cam-
eras and other surveillance/recording devices are
deployed and networked, the fear of always be-
ing watched and recorded is increasing. An attacker
may eavesdrop plaintext images transmitted across
U. L. N. Puvvadi, K. Di Benedetto, A. Patil, and K. D. Kang
are with the Department of Computer Science, State University
of New York at Binghamton, U.S.A. Y. Park is with Hanwha
Techwin Corp., Korea. (K. D. Kang is the corresponding author.)
E-mail: {upuvvad1,kdibene1,apatil10,kang}@binghamton.edu and
yj71.park@hanwha.com
computer networks. One can also see or modify
stored images, if they already have or get legiti-
mate/illegitimate access to the networked storage de-
vice that is required to retain the surveillance images
for 30 - 180 days depending on the security require-
ment of the specific organization being monitored [3].
A fundamental approach to alleviate privacy concerns
is encrypting surveillance images using cryptographic
techniques. However, the overall performance of real-
time visual surveillance can be degraded, because
cryptographic techniques are computationally heavy.
As a result, an important event, e.g., a crime scene,
could be detected late. Although lightweight tech-
niques, e.g., weaker encryption algorithms, selective
encryption of image frames, and image scrambling,
may decrease the computational resource consump-
tion, they are more vulnerable to certain attacks, e.g.,
statistical analysis to extract the original unencrypted
images [4]–[6].1
In addition to passive eavesdropping, it is relatively
easy to launch active attacks against video surveil-
lance. Even simple active attacks, which replay previ-
ously captured images, could be devastating, because
visual surveillance data often have substantial redun-
dancy. For example, the same background image can
be captured and transmitted by the cameras for most
of the time in a high security area usually empty due
to the strong physical security enforcement. Therefore,
an attacker can launch a replay attack with relative
ease by intercepting a few of those images transmitted
across the network, even if he does not have the
1. Our approach is not tied to any specific encryption algo-
rithm, but generally applicable to support the data confidentiality,
integrity, and freshness for video surveillance in a cost-effective
manner.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2
cryptographic key needed to encrypt/decrypt images.
He/she can launch a replay attack that will continue
for a certain time interval before attempting to enter a
high security area under surveillance without detec-
tion.
In a video surveillance system, digital IP cam-
eras typically transmit images to an NVR (Network
Video Recorder), which can store the transmitted
images, forward them to the CMS (Central Man-
agement System), and optionally display them (as a
video). The CMS stores and displays the images for-
warded from the NVR. Recently, visual surveillance
systems have begun to support basic confidentiality
by instrumenting each digital IP camera to encrypt a
surveillance image before transmitting it to an NVR.
Most of them support a tunneling protocol using
the OpenSSL library [7], similar to SSL/TLS (Secure
Socket Layer/Transport Layer Security). In the tun-
neling protocol, the receiver, e.g., an NVR or CMS,
immediately decrypts the received packet. In general,
this is acceptable in SSL/TLS underlying HTTPS for
secure web transactions. However, it is agnostic to
the needs of visual surveillance and subject to serious
performance and security disadvantages. First, an
NVR has to re-encrypt the decrypted image data to
securely store them locally or forward them to the
CMS. The decryption and re-encryption of the surveil-
lance images originally encrypted and transmitted
by the IP cameras incur considerable computational
overheads. At the same time, surveillance images
decrypted upon arrival can be inadvertently exposed
to attackers or unprivileged users, compromising the
confidentiality. Furthermore, relatively little attention
has been paid to avoid active attacks, e.g., packet re-
play, modification, or injection attacks, and to support
key management critical for supporting cryptographic
security.
To address these problems, we design, implement,
and evaluate a new protocol, called SVS (Secure Video
Surveillance). A key observation for SVS’s design is
that it is unnecessary for an NVR to decrypt and then
re-encrypt an image received from a digital camera to
store locally or forward it to the CMS securely in terms
of confidentiality. Instead, it is better for the NVR to
simply store the received encrypted image locally or
forward it to the CMS as is, without decrypting it
and then re-encrypting it, in terms of both security
and performance. Similarly, in the CMS, the encrypted
image received from the NVR is stored withoug being
decrypted and re-encrypted. It is only decrypted, if
necessary, to be played back in the surveillance dis-
play in a physically secured area, such as the security
control center in a modern building. (After being
displayed, the decrypted images are discarded.) Com-
pared to the tunneling protocols based on OpenSSL,
SVS consumes much less computational resources by
avoiding unnecessary decryption and re-encryption
to securely store or forward real-time surveillance
images, while enhancing the data confidentiality by
avoiding any inadverdent exposure of surveillance
images to attackers or unprivileged users. Therefore, it
is more cost-effective than the state-of-the-art tunneling
approaches for secure real-time video surveillance.
Moreover, it supports the other important security
features not supported by the tunneling schemes that
only consider data confidentiality as follows:
For each packet, the data integrity as well as
the authenticity of the source and destination
addresses are supported, via message authentica-
tion based on secure one-way hashing, to detect
packet modification or injection attacks.
The verification of each packet’s freshness is sup-
ported to avoid replay attacks.
A secure key management scheme is supported.
Notably, in SVS, these desirable features are sup-
ported not only for real-time surveillance data trans-
mitted from a camera to another device, e.g., an NVR
or CMS, but also for stored and forwarded data. To
support these desirable security features in a cost-
effective manner, we apply cryptographic encryption
and one-way hashing techniques using symmetric
keys that are several orders of magnitude faster than
alternative methods based on a public key system,
e.g., RSA, are [8] as much as possible. Moreover, in
SVS, no additional processing of the surveillance data
already stored in an NVR or CMS in a secure manner,
via the aforementioned techniques, is needed due to
a cryptographic key renewal required for enhanced
security.
For performance evaluation, we have implemented
our protocol and the baseline tunneling approach that
represents the current state-of-the-art in the video
surveillance industry. In our performance evaluation
using a Samsung IP camera (SND-6084R) and two
workstations modeling an NVR and CMS, SVS de-
creases the total delay to process the cryptographic
mechanisms by more than 80%, while providing en-
hanced data confidentiality, integrity, and freshness
support. Furthermore, compared to the baseline, our
approach decreases the corresponding delay and in-
creases the throughput (bit rate) for an increasing
number of video streams, which model real-time
surveillance image streams in our computer science
department network, by 28% 47% and 39.08%
89.01%, respectively. In addition to the fact that SVS
enhances security via the protocol design, these exper-
imental results empirically verify that SVS is consider-
ably more cost-effective compared to tunneling-based
protocols.
The rest of the paper is organized as follows. Re-
lated work is discussed in Section 2. In Section 3, an
overview of the proposed system architecture is given.
A formal description of the SVS protocol is given in
Section 4. The performance of SVS is compared to
the baseline tunneling protocol in Section 5. Finally,
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 3
Section 6 concludes the paper and discusses future
work.
2 RELATED WORK
Smart, automated, and intelligent surveillance sys-
tems [9]–[11] are developed to support more intelli-
gent surveillance capabilities, e.g., moving object de-
tection, object classification [12], human motion anal-
ysis, activity interpretation [13], traffic control [14],
health care, and military data collection, requiring less
human involvement. However, the security/privacy
concerns are increasingly raised as more surveillance
systems are deployed and smarter functionalities are
supported. Further, video surveillance is subject to
real-time performance constraints [11], [15]. To sup-
port secure surveillance efficiently, our protocol, SVS,
improves upon the baseline approach to secure com-
munication that is a de facto standard in the surveil-
lance industry, in terms of the time taken to process
cryptographic mechanisms by utilizing them only
when needed, simultaneously enhancing the support
for data confidentiality, (source/destination) authen-
ticity, integrity, and freshness. By doing this, SVS
alleviates security/privacy concerns in a cost-effective
manner.
As more digital IP cameras are deployed, fun-
damental security support, such as encryption, is
adopted in surveillance networks. However, other
crucial security requirements are often overlooked.
For example, most OpenSSL-based approaches com-
monly used in state-of-the-art surveillance systems
do not consider data integrity and freshness issues.
Also, they are subject to redundant decryption and
re-encryption, incurring performance penalties. As
another example, Wang et. al. [16] utilize the Diffie-
Hellman key exchange algorithm that suffers from
man-in-the-middle attacks, which may largely com-
promise the confidentiality and integrity. SVS circum-
vents this issue by supporting secure key exchanges
based on RSA that is free of man-in-the-middle at-
tacks [8], while decreasing the frequency of shared
key renewals and supporting the data integrity and
freshness.
It is known that a field-programmable gate array
(FPGA) [17] can be utilized to accelerate encryption.
In this paper, we focus on enhancing the security
and performance of real-time visual surveillance by
designing a new protocol, without using any addi-
tional special-purpose hardware accelerator that may
increase the monetary cost of a surveillance system.
In the future, SVS can be combined with an FPGA to
further improve performance. Thus, it is complimen-
tary to [17].
3 ANOVERVIEW OF SVS
In this paper, we assume that appropriate user au-
thentication and physical security are enforced. Also,
image capture
video coding
encryption
packetization
MAC
transmission
if more data
Fig. 1. Control Flow in a Network Camera
we assume that guaranteed and ordered packet de-
liveries between two communicating parties are sup-
ported by the underlying network stack. Under the
assumptions, an overview of SVS is given in this
section.
3.1 Security Support in a Data Source
In SVS, a digital IP camera is a source or producer
of surveillance image data. It periodically performs
the following steps illustrated in Figure 1 to support
secure real-time surveillance:
1) Periodically capture an image where the period
is the inverse of the specified frame rate, e.g., 60
fps (frames per second).
2) Compress the captured image using a codec,
such as H.264.
3) Encrypt the compressed image to support data
confidentiality using a well established encryp-
tion algorithm, e.g., the AES (Advanced Encryp-
tion Standard) algorithm.
4) Packetize the encrypted data and compute
the MAC (Message Authentication Code) upon
the source/destination addresses, payload, and
counter incremented for each successful packet
transmission. Append the computed MAC to the
packet.
5) Transmit the packet to the destination, e.g., an
NVR or CMS.
6) If the image needs to be delivered using multiple
packets, repeat Steps 4 and 5 until the entire
image is transmitted to the destination.
3.2 Security Support in a Destination
In a visual surveillance system, monitoring images are
usually transmitted to an NVR or CMS that records,
analyzes, and displays them. Received images can
also be forwarded to the other specified surveillance
devices. Therefore, it is important to support security
in not only the source but also the destination.
In Figure 2, the control flow diagram for security
support in the destination, e.g., an NVR or CMS, is
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 4
Is MAC valid? Discard
No
Change source/destination
addresses, recompute MAC,
and transmit
Decrypt
Decode & display
Yes
Store Forward Display
Packet arrival
Fig. 2. Control Flow in an NVR or CMS
depicted.2As shown in Figure 2, the destination, e.g.,
an NVR or CMS, in SVS verifies the MAC of each
received packet. If the verification is unsuccessful, the
packet is discarded. Conversely, if it is successful,
1) the authenticity of the source and destination are
verified; that is, the source actually sent this packet to
the destination, 2) the packet is not modified in transit,
and 3) the packet is fresh (not replayed), because it
is computationally infeasible for an attacker, which
does not have the cryptographic key used to compute
the MAC, to modify the message or replace it with a
different message without detection [8]. Subsequently,
the destination node performs one of the following
operations:
If the required operation is ’store’, simply
store the encrypted payload together with the
source/destination addresses, counter, and MAC
to support the confidentiality, authenticity, and
integrity of the stored data. Thus, unlike tun-
neling protocols broadly adopted in the video
surveillance industry, SVS does not decrypt and
re-encrypt the received data to store them, avoid-
ing potential data leaks and computational over-
heads as discussed before.
If the operation is ’forward’, create a new mes-
sage that consists of the new source and des-
tination addresses, the original encrypted data
received from the source IP camera, and the
newly computed MAC. Transmit the constructed
message to the destination, e.g., a CMS. Note
that, unlike tunneling protocols, SVS only needs
to change the source and destination addresses
and recompute the MAC without doing any de-
cryption and re-encryption of the image data for
message forwarding. Although recomputing the
MAC is clearly not free in terms of computation,
it is unavoidable to verify the entire message’s in-
tegrity and the authenticity of the source and des-
tination addresses. Hence, we claim the overhead
of SVS is minimal and much smaller than that of
2. A single diagram is used to show the control flow in both the
NVR and CMS, as their functionalities are similar.
a tunneling alternative that requires to decrypt
and re-encrypt all received messages regardless
of application needs.
If the operation is ’display’, decrypt and display
the image. In SVS, this is the only case where the
received encrypted data should be decrypted.
In SVS, data are decrypted only if necessary and,
therefore, unnecessary decryption and re-encryption
for secure storage and forwarding of surveillance
images are eliminated. This is different from the state-
of-the-art tunneling protocol for secure visual surveil-
lance that first decrypts all incoming images and
re-encrypts them for secure storage or forwarding,
incurring considerable overheads and potential data
leak as discussed before.
In a video surveillance system, users may want to
display or forward stored data later. In such a case,
SVS first verifies the authenticity and integrity based
on the stored source/destination addresses, encrypted
data, and MAC. After a successful verification, the
retrieved data is securely forwarded to another device
or decrypted and displayed in SVS. Thus, in the rest
of this paper, we focus on secure transmission and
storage of real-time surveillance data.
4 SVS: SECURE VIDEO SURVEILLANCE
PROTOCOL
In this section, a more formal description of SVS is
given. The symbols used in this section are summa-
rized in Table 1.
Symbol Meaning
A, B, C Data producer, intermediary, and con-
sumer
KU,A,KU,B ,KU,C Public keys of A,B, and C
KA,B Symmetric encryption key shared be-
tween Aand B
K
A,B Message authentication key shared be-
tween Aand B
E(KA,B , data)Data encrypted using KA,B
MAC(K
A,B, data)Secure 1-way hash of the data computed
using K
A,B
TABLE 1
Symbols used to describe SVS
4.1 Key Management
4.1.1 Verification of Public Keys
In SVS, a public key system (PKS), e.g., RSA [8], is ap-
plied to initially establish a secure connection between
two networked surveillance devices. Each device has
a pair of a private key and a public key digitally
signed by a trusted third party. To initiate secure
communications, an arbitrary pair of a producer and
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 5
a consumer, Aand B, check each other’s certificate to
verify the validity of the opponent’s public key:
Averifies KU,B and Bverifies KU,A (1)
where KU,A and KU,B are the public keys of A and
B, respectively. If the mutual verification fails in Aor
B, all the other steps are aborted.
4.1.2 Shared Symmetric Key Exchanges
If the verification in Step 1 is successful, Agener-
ates a pair of random symmetric keys to encrypt
and authenticate each message for video surveillance,
{KAB, K
AB }, encrypts them using B’s public key
KU,B, and transmits them to B:
AB:E(KU,B, KA B ||K
AB )(2)
where || is a concatenation.3Note that only Bcan
decrypt this message using its private key to extract
shared symmetric keys, KA,B and K
AB , used to en-
crypt and authenticate messages between Aand B.
In SVS, symmetric keys are used to actually encrypt
and authenticate messages, because a cryptographic
algorithm using the shared key, e.g., AES, is orders of
magnitude faster than an asymmetric algorithm using
a pair of a public and private key, e.g., RSA [8]. Thus,
a shared symmetric key system is more efficient to
encrypt and authenticate real-time surveillance data.
4.1.3 Key Management for Stored Data
Usually, surveillance data have to be stored for an
extended period of time [3]. As the encrypted data
and MAC are stored together with the data, the
secret encryption and MAC keys, e.g., KAB and K
AB ,
should be securely stored to decrypt and verify the
integrity of the stored data in B. In SVS, KAB and
K
AB are encrypted using B’s public key. When the
stored data need to be decrypted and authenticated,
the encrypted KAB and K
AB are decrypted using
B’s private key. Thus, in SVS, the confidentiality
and integrity of the transmitted and stored data are
supported as long as B’s private key is kept securely.
For example, a private key can be encrypted by a
master key and saved in a separate read-only storage
medium such as CD-ROM. In SVS, a similar approach
is taken when data is securely forwarded from Bto
Cthat may store, forward, or (decrypt and) display
the data.
4.1.4 A Renewal of a Public-Private Key Pair
In a PKS, a certificate digitally signed by a trusted
third party includes the expiration date [18]. A public-
private key pair has to be renewed only when the
expiration period is over, unless there is a relatively
rare security incident involving the certificate author-
ity before the certificate expiration. A device performs
3. Alternatively, Bcan generate a pair of symmetric keys and
share them with A.
the following tasks to efficiently maintain the confi-
dentiality and integrity of the stored surveillance data
even after a renewal of the public-private key pair:
1) Using the previous private key, decrypt the
symmetric keys, e.g., KAB and K
AB , shared
between Aand Bto encrypt and authenticate
surveillance images.
2) Re-encrypt the symmetric encryption and MAC
keys using the new public key.
3) Declare the expiration of the previous public key
to the other nodes on the surveillance network.
4) Destroy the old public-private key pair.
5) Distribute the new public key to the nodes in
the surveillance network.
Notably, this approach requires the minimal com-
putation to only decrypt and re-encrypt the symmetric
keys used for encryption and message authentica-
tion. It requires no further processing of the already
stored surveillance data, such as decryption and re-
encryption of the data stored in an NVR or CMS,
when the public-private key pair is renewed. Thus,
the renewal procedure of SVS is cost-effective in terms
of security and computational efficiency. Moreover, it
is executed only when a public-private key pair is
actually renewed, which is relatively infrequent (e.g.,
once a year).
4.2 Secure Data Transmission and Storage
Generally, in a video surveillance network, an IP
camera is a data producer and an NVR or CMS is
a consumer. Furthermore, a consumer can work as an
intermediary that securely forwards the surveillance
images to another consumer. Thus, a node can be
a consumer and a producer at the same time, if it
forwards surveillance images received from a pro-
ducer to another consumer as an intermediary. In this
section, we first describe how a pair of a producer
and consumer in SVS communicate and later discuss
how a consumer works as an intermediary to securely
relay data between a producer and consumer that is
not directly communicating with the producer.
4.2.1 Data Confidentiality, Authenticity, Integrity, and
Freshness Support
In SVS, a producer Aperiodically sends a message
to a consumer/intermediary Bthat consists of the
encrypted data followed by the corresponding MAC:
AB:E(KAB , D)||M AC(K
AB , A, B, E(KAB , D), ctrA)
(3)
where data Dis encrypted using the shared symmet-
ric key KAB to support the data confidentiality.
In SVS, to support the data authenticity,integrity,
and freshness, the MAC is computed using the sym-
metric key, K
AB , and a cryptographic one-way hash
function, e.g., MD5, SHA-1, or SHA-2 [8], based on
the producer’s and consumer’s IP addresses (Aand
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 6
B), encrypted image data, and counter value ctrA
incremented by Aafter successfully sending a mes-
sage to Bas described in Step 3 above. When B
receives a packet, it recomputes the MAC based on
the received packet’s source/destination addresses,
encrypted data, and counter:
Brecomputes MAC(K
AB , A, B, E(KAB , D), ctrA))
(4)
Bcompares the M AC received from A(Step 3) and
MAC(Step 4). If MAC =MAC, the message is not
modified in transit and it is actually sent by Ato B. As
the message authenticity and integrity are confirmed
formally, Bsends an ACK (acknowledgment) to A. If
Areceives an ACK from B, it increments its counter,
ctrA, which is initially 0. Otherwise, it resends Bthe
packet formed in Step 3. (If the transmission fails for
more than a prespecified re-transmission threshold,
the packet is dropped.)
In this paper, we mainly consider the TCP/IP as
the underlying communication protocol to reliably
transmit surveillance images. However, it is possible
to extend SVS to support the UDP. To do this, after
Atransmits a packet, it can simply increment the
counter without waiting for an ACK. However, the
UDP is a connectionless protocol; therefore it may
result in many packet losses, reducing the quality
of visual surveillance. A thorough investigation of
the trade-off between the less bandwidth usage and
quality degradation that could be provided by the
UDP is reserved for future work.
Data freshness is supported by including the
counter to compute and verify the MAC in Steps 3
and 4. To support real-time video surveillance, Agen-
erates a message as described in Step 3 and transmits
it to Bat every transmission period PA= 1/rAwhere
rAis the prespecified frame rate supported by A. For
example, suppose that an IP camera Asends an empty
background image to Bat time tand transmits the
same image to Btaken at time t+PA. Even in such
a case, the M AC computed in Step 3 at time t+PA
will be different from the previous one computed at
time t, since the counter value is incremented for the
second message at t+PA. Without the key, K
AB , used
to compute the MAC, it is infeasible for an attacker
to compute the correct MAC, even if he has the same
data, the exact counter value, and the secure 1-way
hash function, which may be known to the public.
Thus, an adversary cannot launch a replay attack
without detection.
When the counter rolls over, a new pair of symmet-
ric encryption and MAC keys needs to be generated
and exchanged between the producer and consumer
to avoid cryptanalysis and packet replay/injection
attacks. In both RTP (Real-Time Transport Protocol)
and SRTP (Secure Real-Time Transport Protocol) used
for video streaming, a 16 bit sequence number is
used [19]. However, this is not sufficient to avoid
replay attacks in video surveillance. If one image (e.g.,
an H.264 frame) fits into a single packet, the 16 bit
counter rolls over approximately every 36 minutes
when images are streamed at 30 fps. An eavesdrop-
ping adversary can simply record, for example, the
initial 10 minute-worth packets and begin to replay
them when the 16 bit counter rolls over. To launch
such an attack, an adversary does not have to know
any secret, such as the cryptographic keys for en-
cryption and message authentication. One way of
avoiding it is renewing the key used to compute
the MAC; however, it requires frequent key renewals
and exchanges between the communicating parties.
To address this issue, in SVS, a 48 bit counter is used to
compute the MAC in Step 3. The key renewal period
for the 48 bit counter is longer than the lifetime of
surveillance devices by orders of magnitude. Thus,
KAB and K
AB can be renewed only when there is a
security incident/concern or periodically, e.g., every
six month, as a precaution. When KAB and K
AB
need to be renewed in SVS, Aand Bverify each
other’s public key, Aderives new symmetric keys for
encryption and message authentication, and Ashares
the new keys with Bas described in Subsections 4.1.1
and 4.1.2.
4.2.2 Securely Storing and Forwarding Received
Data
After a successful verification of the MAC, B(e.g., an
NVR) stores, forwards, or displays the received data.
Depending on the specific surveillance requirements,
Bneeds to perform all or a subset of the three op-
erations concurrently. In SVS, Bstores the encrypted
data and MAC received from source Aas follows:
Bstores E(KAB, D )||MAC(K
AB , A, B, E(KAB , D), ctrA)
(5)
When it retrieves the stored data later, Brecomputes
the MAC, similar to Step 4, and verifies whether the
stored MAC matches the recomputed MAC or not. If
the verification succeeds, it returns the retrieved data.
Otherwise, it drops it. In this way, the confidentiality
and integrity of the stored data are supported in SVS
too.
If Bworks as an intermediary between the pro-
ducer Aand another consumer Cthat is not directly
connected to A,Bforwards the data received from
Ato C. To do this, Band Cneed to share KAB and
K
AB . In SVS, this approach is taken rather than using
a different pair of keys for encryption and message
authentication between Band C, because it requires
Bto decrypt and re-encrypt every message, further
complicating key management.
Initially, Band Cneed to verify their public keys
with each other. If the verification is successful, B
encrypts KAB and K
AB using C’s public key, KU,C ,
and transmits the encrypted keys to Cas follows.
BC:E(KU,C , KAB||K
AB )(6)
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 7
Only Ccan decrypt this message to extract KAB and
K
AB using its private key.
After sharing the encryption and MAC keys with
C,Bperiodically forwards the surveillance data it
receives from Ato C:
BC:E(KAB , D)||M AC(K
AB , B, C, E(KAB , D), ctrA)
(7)
Note that, in Step 7, Bonly has to recompute the
MAC using the new source and destination addresses,
i.e., Band C, whereas it simply forwards the en-
crypted data E(KAB , D)without first decrypting and
subsequently re-encrypting it. When Creceives the
message, Cverifies the MAC, similar to Step 4:
Crecomputes MAC(K
AB , B, C, E(KAB , D), ctrA)
(8)
If MAC =MAC,Cstores the encrypted data and
MAC received in Step 7, forwards them to another
node using the technique similar to Steps 6 and 7,
and/or displays the received data according to the
requirements of the specific surveillance application.
Thus, in SVS, the confidentiality, integrity, and fresh-
ness are supported for forwarded data too.
5 PERFORMANCE EVALUATION
For performance evaluation purposes, we have com-
pared SVS to OpenSSL, which is the baseline tunnel-
ing protocol commonly used in the surveillance in-
dustry. The OpenSSL library [7] and TCP/IP protocol
were use to ensure the reliable, ordered delivery, of
surveillance data. The baseline always decrypts and
re-encrypts a received message, to store it locally or
forward it to another networked surveillance device
as discussed before. On the other hand, both the
baseline and SVS support the fundamental integrity
and data freshness features described in Section 4 to
avoid data modification, false data injection, or replay
attacks.
We have done extensive performance evaluation
consisting of two sets of experiments. In the first
set, we have used a Samsung SND-6084R digital IP
camera with the Cortex A8 800 MHz CPU and 256 MB
DDR3 memory. A single port is used to supply power
to the camera and wire it to the Ethernet based on
the PoE (Power over the Ethernet) technology. Also,
two workstations are used to model an NVR and a
CMS, respectively. (For brevity, they are referred to
as the NVR and CMS in the rest of this paper.) Each
workstation has an Intel Core i7-4790 quad core CPU
running at 3.6 GHz, 16 GB memory, and a 1 TB hard
disk. Also, every machine runs Ubuntu 14.04 LTS.
In the second set, we use three workstations. One
of them is used to generate an increasing number of
simulated surveillance image streams for performance
evaluation, while the other two are used as the NVR
and CMS. All four cores and eight hardware threads
of the CPU are used in each machine. In all our
0
0.2
0.4
0.6
0.8
1
1.2
1.4
SVS Baseline
Security Delay (seconds)
Communication Protocol
NVR Module Performance
Fig. 3. Security Delay in the NVR
0
0.2
0.4
0.6
0.8
1
1.2
SVS Baseline
Security Delay (seconds)
Communication Protocol
CMS Module Performance
Fig. 4. Security Delay in the CMS
experiments, the 1 Gbps Ethernet available in the
Department of Computer Science at the Binghamton
University is used to transmit data.
5.1 Experimental Set 1
In this set of the experiments, 1,000 images are trans-
mitted at 30 fps from the Samsung IP camera to
the NVR. It locally stores and forwards the received
encrypted images to another workstation used to
model a CMS that locally stores encrypted images.
In addition, the received images are decrypted and
displayed in the CMS. This experiment is run 10
times to report the average performance with 95%
confidence intervals.
In order to illustrate the speedup achieved with SVS
when compared to the state-of-the-art baseline, we
define a term, security delay, which refers to the total
delay to process the cryptographic mechanisms. In
the NVR, as shown in Figure 3, the baseline and SVS
yield the average security delay of 1.125 ±0.284sand
0.144 ±0.002s, respectively. Thus, SVS decreases the
average security delay by approximately 87%. Also,
the confidence interval of SVS is significantly smaller
than that of the baseline, indicating that SVS has much
smaller security delay variations.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 8
0
5
10
15
20
25
30
0 10 20 30 40 50 60 70
Security Delay (seconds)
Number of Streams
NVR Module Performance
SVS
Baseline
Fig. 5. Security Delay in the NVR
0
5
10
15
20
0 10 20 30 40 50 60 70
Security Delay (seconds)
Number of Streams
CMS Module Performance
SVS
Baseline
Fig. 6. Security Delay in the CMS
In the CMS, as plotted in Figure 4, the baseline
and SVS show the security delay of 0.857 ±0.142s
and 0.143 ±0.002s, respectively. Thus, SVS decreases
the security delay by approximately 83% in the CMS.
In this experiment, the average security delay of the
baseline is slightly decreased, because the CMS does
not have to forward the received data. Therefore, the
baseline has no need to decrypt and re-encrypt the
received encrypted data for forwarding. The average
security delay of SVS is similar to the value observed
in the NVR, because unnecessary decryption and re-
encryption for data storage and forwarding subject
to the performance penalty and confidentiality vul-
nerability is eliminated in the SVS design phase. In
summary, by forgoing unnecessary decryption and re-
encryption, SVS decreases the security delay by 87%
in the NVR, and by 83% in the CMS, when compared
with the baseline approach.
5.2 Experimental Set 2
In this set of experiments, one workstation is used to
generate 10 60 image streams, increased by 10, to
evaluate the performance of the baseline and SVS for
increasingly intense workloads. We take this approach
to generate realistic workloads, since only one IP
camera is provided to us by Samsung. Neither are we
allowed access to any actual visual surveillance net-
work for security/privacy reasons. More specifically,
we consider a scenario of one terminal of a highly
secured airport equipped with up to 60 cameras for
surveillance. To implement this scenario, we mimic
the behavior of one camera by one thread; each thread
transmits a stream of 1,000 images extracted from a
video of a flight of an airplane with a considerable
amount of motions [20] to model a relatively high,
real-world workload to stress the system at 60 fps,
which is the maximum frame rate supported by most
of the security cameras on the market. For 60 video
streams, with each transmitting 60 of 4 KB frames per
second, the total bitrate is 115.2 Mbps. The maximum
bitrate supported by our experimental machines is
125 Mbps. Beyond 60 streams, the entire system stops
working, since the upper bound of the Linux buffer
space is exceeded given a large amount of video data
streamed in real-time.4
In the NVR, as shown in Figure 5, the baseline
and SVS support the security delays of 3.433sand
2.199sfor 10 streams, respectively. For 60 streams, the
baseline and SVS provide the security delay of 24.683s
and 13.059s, respectively. As depicted in Figure 5, the
difference between the baseline and SVS increases for
the increasing number of the streams. Thus, SVS is
more scalable than the baseline is as the number of the
streams increases. SVS decreases the security delay by
35% 47% as shown in Figure 5.
In the CMS, as shown in Figure 6, the baseline and
SVS support the security delays of 3.284sand 2.24sfor
10 streams, respectively. For 60 streams, the baseline
and SVS provide the security delays of 18.041sand
12.971s, respectively. Thus, SVS decreases the security
delay by 28.1% 31.7%. As shown in the figure, the
difference between the baseline and SVS increases for
the increasing number of the streams, similar to the
case of the NVR. Hence, we observe that SVS is more
scalable. In the CMS, the speedup of SVS against the
baseline is smaller than it is in the NVR, similar to
the results in Section 5.1. This is because the CMS is
not required to forward the received data to any other
surveillance device.
Figure 7 plots the throughput (bit rate) of SVS
normalized to that of the baseline in the NVR. As
shown in the figure, SVS increases the throughput by
56.08%89.01% as the number of streams is increased
from 10 to 60. Specifically, SVS supports 46.8 Mbps
and 47.3 Mbps in the NVR for 10 and 60 streams,
respectively. Under the baseline approach, 29.9 Mbps
and 25 Mbps are supported in the NVR for 10 and 60
streams, respectively.
4. More data can be transmitted in real-time, if the buffering lim-
itations of the systems used for our experiments can be mitigated.
In such settings, the magnitude of SVS’s performance improvement
in comparisons to the tunneling baseline might increase, since SVS
can eliminate unnecessary encryption and re-encryption for more
data. A thorough investigation is reserved for future work.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 9
0
0.5
1
1.5
2
10 20 30 40 50 60
Throughput
Number of Streams
NVR Module Throughput
Baseline
SVS
Fig. 7. Normalized Throughput in the NVR
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
10 20 30 40 50 60
Throughput
Number of Streams
CMS Module Throughput
Baseline
SVS
Fig. 8. Normalized Throughput in the CMS
In the CMS, as shown in Figure 8, the throughput
of SVS is higher than that of the baseline by 39.08%
46.59%. More specifically, SVS supports 45.9 Mbps
and 47.6 Mbps for 10 and 60 streams, respectively.
The baseline supports only 31.3 Mbps and 34.2 Mbps
for 10 and 60 streams, respectively.
Overall, our experimental results demonstrate that
our protocol reduces the security delay by 28% 87%
(depending on the system settings and workloads)
and increases the throughput by 39.08% 89.01%
compared to the baseline. At the same time, data
confidentiality is enhanced by avoiding unnecessary
decryption and re-encryption subject to unintended
data leaks and computational overheads. Further, data
integrity, data freshness, and source/destination au-
thenticity are supported to avoid packet modifica-
tion, replay, and injection attacks that could lead to
devastating results in video surveillance. Thus, it is
significantly more cost-effective than the state-of-the-
art baseline relying on tunneling.
6 CONCLUSIONS AND FUTURE WORK
Networked surveillance devices are revolutionizing
the surveillance industry by supporting high quality
images, remote monitoring, and advanced image pro-
cessing. However, they raise serious security/privacy
issues too. To address the issues, we present a new
protocol, called SVS (Secure Video Surveillance), to
securely transmit and store surveillance images, im-
proving not only the performance but also the security
in terms of the data confidentiality, integrity, and
freshness to alleviate eavesdropping, packet modifi-
cation, injection, and replay threats. For performance
evaluation, we have implemented our protocol to
compare its performance to a state-of-the-art baseline
widely adopted in the surveillance industry. Our ex-
perimental results demonstrate that SVS substantially
decreases the total delay to process the cryptographic
mechanisms and increases the throughput. Thus, the
results empirically verify the cost-effectiveness of SVS.
Being that an increasing number of wireless and
hand-held surveillance systems are becoming avail-
able, novel research opportunities accompany them.
As a result of this growth, privacy/security concerns
could be further escalated. Our approach can be
applied to mitigate these concerns, while enhancing
the performance in terms of the security delay and
throughput. A thorough investigation is reserved as
a future work where we intend to investigate more
cost-effective approaches to further enhance the per-
formance and security of surveillance.
ACKNOWLEDGMENT
This work was supported, in part, by Samsung Tech-
win (Agreement #: 13052059).
REFERENCES
[1] J. Wang and Z. Xu, “Crowd Anomaly Detection for Automated
Video Surveillance,” in International Conference on Imaging for
Crime Detection and Prevention, 2015.
[2] “What to expect from security and surveillance
monitoring solutions in an IoT world.” [Online]. Available:
http://blog.bosch-si.com/categories/technology/2013/07/
what-to-expect-from-security- and-surveillance-monitoring-
solutions-in-an-iot-world/ [Last visited on 06/12/2015]
[3] N. Goud, “How long a surveillance video should be stored?”
[Online]. Available: http://blog.dnfcorp.com/?p=2078 [Last
visited on 06/12/2015]
[4] Z. Li, X. Wang, Y. Lin, and C. Cheng, “RDEA: A Novel Video
Encryption Algorithm,” Advanced Multimedia and Ubiquitous
Engineering, Lecture Notes in Electrical Engineering, vol. 352, pp.
183–189, 2015.
[5] S. Li, C. Li, K.-T. Lo, and G. Chen, “Cryptanalysis of an
Image Scrambling Scheme Without Bandwidth Expansion,”
IEEE Trans. Circuits Syst. Video Techn., vol. 18, no. 3, pp. 338–
349, 2008.
[6] B. Furht and D. Kirovski, Eds., Multimedia Security Handbook.
CRC Press, 2014.
[7] “OpenSSL: The Open Source Toolkit for SSL/TLS.”
[Online]. Available: https://www.openssl.org/ [Last visited
on 06/12/2015]
[8] W. Stallings, Cryptography and Network Security: Principles and
Practice, 6th ed. Pearson, 2013.
[9] W. Gao, Y. Tian, T. Huang, S. Ma, and X. Zhang, “The
IEEE 1857 Standard: Empowering Smart Video Surveillance
Systems,” IEEE Intelligent Systems, vol. 29, Sept 2014.
[10] L. Meinel, M. Findeisen, M. Hes, A. Apitzsch, and G. Hirtz,
“Automated Real-Time Surveillance for Ambient Assisted Liv-
ing Using an Omnidirectional Camera,” in IEEE International
Conference on Consumer Electronics, Jan 2014.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 10
[11] H. Liu, S. Chen, and N. Kubota, “Intelligent Video Systems
and Analytics: A Survey,” IEEE Transactions on Industrial Infor-
matics, vol. 9, no. 3, pp. 1222–1233, Aug 2013.
[12] T. Zhang, S. Liu, C. Xu, and H. Lu, “Mining Semantic Con-
text Information for Intelligent Video Surveillance of Traffic
Scenes,” IEEE Transactions on Industrial Informatics, Feb 2013.
[13] D. Bruckner, C. Picus, R. Velik, W. Herzner, and G. Zucker,
“Hierarchical Semantic Processing Architecture for Smart Sen-
sors in Surveillance Networks,” IEEE Transactions on Industrial
Informatics, May 2012.
[14] A. Mahendran, S. Smith, M. Hebert, , and X.-F. Xie, “Bus
Detection for Adaptive Traffic Signal Control,” CMU-Penn T-
SET – A U.S. DOT University Transportation Center, Tech.
Rep., 2014.
[15] C. Poppe, G. Martens, P. De Potter, and R. Van de Walle,
“Semantic web technologies for video surveillance metadata,”
Multimedia Tools and Applications, vol. 56, no. 3, pp. 439–467,
2012.
[16] T.-C. Wang, C.-H. Wang, R.-I. Chang, and J.-M. Ho, “Ubiq-
uitous video surveillance service with secure forwarding
agents,” in Asia-Pacific Conference on Communications, 2008.
[17] Y. Akman and T. Yerlikaya, “Encryption Time Comparison of
AES on FPGA and Computer,” in Advances in Computational
Science, Engineering and Information Technology, 2013, vol. 225,
pp. 317–324.
[18] E. Barker, M. Smid, D. Branstad, and S. Chockhani, “A
Framework for Designing Cryptographic Key Management
Systems,” National Institute of Standards and Technology,
Tech. Rep. NIST Special Publication 800-130, 2013.
[19] “RTP: A Transport Protocol for Real-Time Applications.” [On-
line]. Available: http://www.rfc-editor.org/rfc/rfc3550.txt
[Last visited on 08/05/2015]
[20] “Surreal Flight Over Binghamton, NY.” [Online]. Available:
http://www.youtube.com/watch?v=P9MqHfXFuLk [Last
visited on 08/26/2015]
Udaya L. N. Puvvadi received his MS de-
gree in Computer Science from the State
University of New York at Binghamton, and
is currently pursuing a Ph.D. degree in the
same department. His research interests in-
clude energy efficient systems and real-time
video streaming.
Kevin Di Benedetto received both his BS
degree and MS degree in Computer Science
from the State University of New York at Bing-
hamton. His research interests include real-
time data services, m-Health, and medical
cyber physical systems.
Aditya Patil received his MS degree in Com-
puter Science from the State University of
New York at Binghamton. He is a software
engineer at Intel Corp. His research interests
include computer architecture and real-time
video streaming.
Kyoung-Don Kang is an Associate Profes-
sor in the Department of Computer Science
at the State University of New York at Bing-
hamton. He received his Ph.D. degree in
Computer Science from the University of Vir-
ginia in 2003. His research areas include
real-time data services, cyber physical sys-
tems, and Internet of Things.
Youngjoon Park is a principal research en-
gineer in the Security Solution Division at
Hanwha Techwin Corp., Korea. He gradu-
ated as Master of Science in the field of
automation design engineering from KAIST
(Korea Advanced Institute of Science and
Technology). He has developed expertise in
video security and storage products in the
domain of surveillance and delivered well
known world class IP Security products and
solutions on behalf of Techwin.
... Because they carry out the monitoring, sensors, cameras, and other appropriate devices are essential to the monitoring process. With the aid of technology, it is possible to observe someone from a distance using electronic devices or to steal electronically transmitted information using straightforward, useful technology techniques [1][2][3][4]. ...
... Counting on Equation (1) that we ended up with in our proposal, we can determine an algorithm that implements Equation (1). Another term that we combine with our Equation (1) to achieve the proposed algorithm is TW, which represents the value of the Time Window. ...
... Specifically, Algorithm 2 represents the whole procedure implemented by our proposed Equation (1), consisting of our study on previous works [6,10,11,66,73]. As a result, in Algorithm 2, we compare the data from the First Time Window to the functions that depict the change in the value of each component of Equation (1). The suggested algorithm "calls" the value of the Packet Loss Rate, Round Trip Time, Signal to Interface, and Noise Ratio of each loop in a limited number of loops while the time is "paused", all from the client that transmits and/or analyzes the video/image. ...
Article
Full-text available
The Internet of Things (IoT) was introduced as a recently developed technology in the telecommunications field. It is a network made up of real-world objects, things, and gadgets that are enabled by sensors and software that can communicate data with one another. Systems for monitoring gather, exchange, and process video and image data captured by sensors and cameras across a network. Furthermore, the novel concept of Digital Twin offers new opportunities so that new proposed systems can work virtually, but without differing in operation from a “real” system. This paper is a meticulous survey of the IoT and monitoring systems to illustrate how their combination will improve certain types of the Monitoring systems of Healthcare–IoT in the Cloud. To achieve this goal, we discuss the characteristics of the IoT that improve the use of the types of monitoring systems over a Multimedia Transmission System in the Cloud. The paper also discusses some technical challenges of Multimedia in IoT, based on Healthcare data. Finally, it shows how the Mobile Cloud Computing (MCC) technology, settled as base technology, enhances the functionality of the IoT and has an impact on various types of monitoring technology, and also it proposes an algorithm approach to transmitting and processing video/image data through a Cloud-based Monitoring system. To gather pertinent data about the validity of our proposal in a more safe and useful way, we have implemented our proposal in a Digital Twin scenario of a Smart Healthcare system. The operation of the suggested scenario as a Digital Twin scenario offers a more sustainable and energy-efficient system and experimental findings ultimately demonstrate that the proposed system is more reliable and secure. Experimental results show the impact of our proposed model depicts the efficiency of the usage of a Cloud Management System operated over a Digital Twin scenario, using real-time large-scale data produced from the connected IoT system. Through these scenarios, we can observe that our proposal remains the best choice regardless of the time difference or energy load.
... Yushu Zhang et al. [47] separated each image into a small quantity of sensitive data and a large amount of harmless data, securely storing them in private and public clouds, respectively. Udaya L. N. Puvvadi et al. [48] enhanced the sustained bit rate and reduced the time required for cryptographic operations. Phap Duong-in described a revolutionary post-quantum cryptosystem with a significant reduction in encryption and decryption time, and decryption requiring desiccated feedback [49]. ...
Article
Full-text available
Uses of video surveillance (VS) have exponentially increased using the internet as a platform. Therefore, security issues in such real time videos need to be addressed. Video may have multiple moving objects in a frame and different features in video lengths. Hence, designing content-based video encryption standards and lightweight crypto-encryption standards are needed to serve the real-time requirement for securing surveillance videos. This paper presents a survey and case study of various encryption standards of VS, which secures video data and used for object tracking (OT). In the first part, a fast and secure modified AES method is proposed. The performance is compared using NCPR and UACI measures with state-of-the-art encryption standards. Modified AES is lightweight and offers nearly 99% NCPR value and offers the fastest elapsed time. In the second part, the paper has proposed an entropy adaptive object learning model for only securing frames containing moving objects in the scene. Percentage frame adaption is achieved by the entropy threshold. The proposed entropy learning model based on content adaptive security standards has proven to save memory requirements by encrypting the desired frames only. In third part, weight average background subtraction (BS) approaches are used for evaluation which performs better for multi OT. The paper has designed learning and adapting the best RGB space to apply tracking. The qualitative expected outcomes are presented for real-time captured videos with different object motions. The performance comparison of the entropy and crypto weights is compared for selected light weight ciphers under the consideration of multiple object motion of various real time videos. The paper finally addresses various challenges, open issues and future scopes of VS systems. Graphical abstract
... Video surveillance is becoming now a days increasingly important in the fight against crime and the protection of public safety. It is also being used for a variety of other purposes, such as security monitoring, fraud detection, compliance, flood-survey during natural calamities, coal mining surveillance and many more applications [1][2]. In the older times, only static CCTV or any static devices were used for surveillance applications. ...
Article
: It has been observed that the circularly polarized antenna always play an important role in modern wireless communication applications. One of such applications is Video surveillance system. Such system interfaced with circularly polarized antenna during natural calamities, which plays a crucial and important role in rescuing the survivors. The weather conditions make it hard to achieve effective communication between the surveillance equipment and the controller. The applications of rescuing vehicle/boat movement during flood-affected areas required an uninterrupted wireless connectivity, for which polarized antennas are very much required. The present paper investigates this problem by designing an efficient circularly polarised antenna on metasurface material consisting of split ring resonator. The designed antenna is designed to operate in the frequency range of 7.1-7.23 GHz. FR4 glass epoxy material is used as an antenna substrate with dielectric constant 4 and thickness of 1.6mm. An array of split ring resonators etched microstrip antenna was fabricated on FR4 glass epoxy substrate. The result obtained with such a microwave antenna produces an excellent gain of 7.4 dB and return loss of 17.7dB with a bandwidth of 1.2 GHz. Future studies are still in progress.
Article
The Facial Recognition Attendance System is a sophisticated software solution that employs OpenCV and Python to automate the process of attendance tracking in real-time. Designed to replace outdated manual methods, this system utilizes state-of-the-art facial recognition technology to accurately identify individuals as they enter a monitored space. Upon detection and verification, the system records the individual's attendance by logging their arrival time, thereby streamlining the attendance process. This method significantly enhances efficiency, reduces potential for error, and ensures a secure and contactless check-in experience. With its user-friendly interface and quick setup, the system is an ideal application for educational institutions, corporate offices, and public events that require reliable attendance management
Article
Uses of video surveillance (VS) have exponentially increased using the internet as a platform. Security concerns related to the transmission of videos must be addressed. Even though the majority of current encryption standards are effective, it is computationally demanding and unsuitable for real-time VS applications. Lightweight crypto-encryption standards are necessary to meet real-time needs. This paper provides a thorough analysis of various encryption standards to protect video data and evaluates vulnerability under various attacks. A Lightweight Fast Security Standard (LFSS) is proposed to meet real-time requirements by adopting dual key fusion (KF) approach. Entropy and crypto weights are quantitatively compared with proposed and chosen lightweight ciphers for surveillance videos based on NCPR, UACI and attacks into account. The proposed LFSS method offers a good NCPR of 99.5806 and offers only 40% and 3% average execution time over Secure Internet of things (SIT) and Secure Force (SF) security standards, respectively.
Article
Full-text available
ABSTRAK Saat ini sistem kamera pengawas mengandalkan manusia dalam melakukan penerjemahan pada rekaman gambar yang terjadi. Perkembangan computer vision, machine learning, dan pengolahan citra dapat dimanfaatkan untuk membantu peran manusia dalam melakukan pengawasan. Penelitian ini merancang sistem kerja kamera yang terdiri dari tiga modul yaitu deteksi objek, pengenalan wajah, dan perilaku anomali. Deteksi objek memakai HOG-SVM, pengenalan wajah menggunakan CNN dengan arsitektur VGG-16 memanfaatkan transfer learning, dan perilaku anomali memakai spatiotemporal autoencoder berdasarkan threshold. Ketiga modul tersebut diuji menggunakan metrik akurasi, presisi, recall, dan f1-score. Ketiga modul diintegrasikan dengan state machine menjadi satu kesatuan sistem. Kinerja modul memiliki akurasi 88% untuk deteksi objek, 98% untuk pengenalan wajah, dan 78% untuk perilaku anomali. Hasil tampilan riil dapat diakses secara sederhana dan nirkabel melalui web. Kata kunci: HOG-SVM, CNN, VGG-16, spatiotemporal autoencoder, state machine ABSTRACT Nowadays, the surveillance camera system relies on human to interpret the recorded images. Computer vision, machine learning, and image processing can be utilized to assist the human role in supervising. This study designed a camera work system consisting of three main modules, namely object detection, face recognition, and anomaly behavior. Object detection used the HOG-SVM combination. Facial recognition used CNN with the VGG-16 architecture that utilized transfer learning. Anomalous behavior used spatiotemporal autoencoder based on threshold. Modules are tested using the metrics of accuracy, precision, recall, and f1-score. The three modules are integrated using a state machine into one system. The performance of the module had 88% accuracy for object detection, 98% for facial recognition, and 78% for anomalous behavior. Real time video recording can be accessed wireless via web-based. Keywords: HOG-SVM, CNN, VGG-16, spatiotemporal autoencoder, state machine
Chapter
Full-text available
This study creates a new and simplified method for selecting the suitable site for building wind turbines, using standard power factor and power curves. The electrical energy generated from wind energy be influenced by on the physical characters of the wind site and the factors of the wind turbine; thus, the matching of the turbine with the site depends on determining the parameters of the optimum speed of the turbine, which is estimated from the performance index (PI) curve. This indicator is a new rating parameter, obtained from the highest value of the standard power and capacitance curves. The relationship between the three indices is plotted against the rated wind speed of a specific value of the Weibull shape parameter of the location. Thus, a more skillful method was used for Weibull parameters evaluation which is called equivalent energy method (EEM).KeywordsWeibull distribution functionCapacity factorNormalized powerPerformance index
Chapter
Haptic Internet can distinguish inventiveness through versatile edge figuring and information move to 5G organizations, hence incorporating more innovations. All the more as of late, numerous strategies dependent on convolutional neural networks (CNNs) intended for front line innovation have been utilized to find a fire some place with the right exactness and season of activity. Nonetheless, these strategies cannot identify a fire in an unsure zone of Internet of things (IoT) with smoke, mist, and day off. Furthermore, in confined hardware, it is a test to get great precision while shortening the working time and lessening the model size. Hence, in this article, we propose a CNN-based compelling fire identification framework for recordings taken in dubious checking circumstances. Our technique utilizes a profound non-hefty neural organization without completely packed layers, which makes its computation costs low. Tests were performed on a bunch of fire information, and the outcomes showed that our strategy worked better contrasted with the most recent innovation. We trust it is the opportune individual to distinguish fire discovery in established and inserted vision applications during reconnaissance in an unsure IoT environment.KeywordsNeural networksProfound non-hefty neural organizationCNNIoTFire discovery
Article
Full-text available
The IEEE 1857 Standard for Advanced Audio and Video Coding was released as IEEE 1857-2013 in June 2013. Despite consisting of several different groups, the most significant feature of IEEE 1857-2013 is its Surveillance Groups, which can not only achieve at least twice the coding efficiency on surveillance videos as H.264/AVC High Profile, but it's the most analysis-friendly video coding standard. This article presents an overview of IEEE 1857 Surveillance Groups, highlighting background model-based coding technology and analysis-friendly functionalities. IEEE 1857-2013 will present new opportunities and drive research in smart video surveillance communities and industries.
Conference Paper
Video-based crowd behaviour detection aims at tackling challenging problems such as automating and identifying changing crowd behaviours under complex real life situations. In this paper, real-time crowd anomaly detection algorithms have been investigated. Based on the spatio-temporal video volume concept, an innovative spatio-temporal texture model has been proposed in this research for its rich crowd pattern characteristics. Through extracting and integrating those crowd textures from surveillance recordings, a redundancy wavelet transformation-based feature space can be deployed for behavioural template matching. Experiment shows that the abnormality appearing in crowd scenes can be identified in a real-time fashion by the devised method. This new approach is envisaged to facilitate a wide spectrum of crowd analysis applications through automating current Closed-Circuit Television (CCTV)-based surveillance systems.
Article
More and more video encryption algorithms have been proposed with the popularity of multimedia applications and the necessity of content protection. Selective encryption algorithms are widely used because they can improve encryption efficiency meanwhile preserve the level of security. Visual degradation, security, encryption efficiency, compression friendliness, format compliance and codec compliance are used to evaluate a selective encryption algorithm. In this paper a novel video encryption algorithm called Random Data Encryption Algorithm (RDEA) is proposed. RDEA takes advantage of the fact that I-blocks are more important than P- and B-blocks, and selects data in Iblocks of I-, P- and B-frames to encrypt. The data is selected according to a pseudo-random sequence generated by a random sequence generator using a key as seed. The encryption ratio of RDEA is about 20%-35%, while it is almost as safe as naive encryption algorithm when it comes to ciphertext-only attack and known-plaintext attack. Also, RDEA keeps format compliant and has no impact on compression efficiency.
Chapter
Advanced Encryption Standard (AES), which is approved and published by Federal Information Processing Standard (FIPS), is a cryptographic algorithm that can be used to protect electronic data. The AES algorithm can be programmed in software or hardware. This paper presents an encryption time comparison of the AES algorithm on FPGA and computer. In the study, Verilog HDL and C programming language are used on the FPGA and computer, respectively. The AES algorithm with 128-bit input and key length 128-bit (AES-128) was simulated on Xilinx ISE Design Suite 13.3. It was observed that the AES algorithm runs on the FPGA faster than on a computer. We measured the time of encryption on FPGA and computer. Encryption time is 390ns of AES on FPGA and 11 μs of AES on a computer. With this study, the speed comparison of the computer with FPGA was made. We are proved that the hardware implementation of the AES-128 cryptographic algorithm is much (28,2 times) faster than the software.
Conference Paper
In this paper an automated video based real-time surveillance system is presented. This system is based on an omnidirectional camera and a multiple object tracking technique for applications in the field of AAL (Ambient Assisted Living). This system is able to monitor a complete room with a single camera and, in addition, to track the people entering and leaving this room. The software was implemented for an embedded platform which acts as a smart sensor.
Article
Recent technology and market trends have demanded the significant need for feasible solutions to video/camera systems and analytics. This paper provides a comprehensive account on theory and application of intelligent video systems and analytics. It highlights the video system architectures, tasks, and related analytic methods. It clearly demonstrates that the importance of the role that intelligent video systems and analytics play can be found in a variety of domains such as transportation and surveillance. Research directions are outlined with a focus on what is essential to achieve the goals of intelligent video systems and analytics.
Article
Automated visual surveillance systems are attracting extensive interest due to public security. In this paper, we attempt to mine semantic context information including object-specific context information and scene-specific context information (learned from object-specific context information) to build an intelligent system with robust object detection, tracking, and classification and abnormal event detection. By means of object-specific context information, a cotrained classifier, which takes advantage of the multiview information of objects and reduces the number of labeling training samples, is learned to classify objects into pedestrians or vehicles with high object classification performance. For each kind of object, we learn its corresponding semantic scene-specific context information: motion pattern, width distribution, paths, and entry/exist points. Based on this information, it is efficient to improve object detection and tracking and abnormal event detection. Experimental results demonstrate the effectiveness of our semantic context features for multiple real-world traffic scenes.