A NEW COMBINATION METHOD FOR ENCRYPTION OF MOVING OBJECTS DETECTION IN VIDEO
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 1
Abstract
Nowadays surveillance systems have been widely deployed in various places and generate massive amount of video data every day. This raises threats of unauthorized access and potential privacy leakage as the recorded videos usually contain rich identifiable information such as facial biometrics. In order to mitigate the threats, many existing methods perform symmetric encryption on the entire frames in the videos. Unfortunately, these methods could introduce additional computation cost and storage. Moreover, as surveillance systems could be a part of distributed system, the key management is critical and challenging. In this paper, we propose a novel method which incorporates background subtraction technique and RSA encryption algorithm. Rather than encrypting the entire frames of the videos, the proposed detect the regions around moving objects in the frames of video and then perform RSA encryption on the detected regions. And RSA encryption technique has its advantages of key distribution and management. Our experimental results show that the proposed method only involve moderate computation cost and storage.
Authors and Affiliations
Nguyen Trong Nhan, Ye Dengpan
Computer-Aided Diagnosis of Speech Disorder Signal in Parkinson’s Disease
Computer-aided diagnosis (CAD) can be used as a decision support system by physicians in the diagnosis and treatmentof disordered speech especially those who specialize in neurophysiology diseases. Parkinson's disease (P...
Reduction of Transmission Losses based on Optimal Power Flow using Genetic Algorithm
This paper presents the application of GeneticAlgorithm (GA) for solving optimal power flow problems. It is animportant tool for performance analysis of many power systemsproblems. Optimal power flow (OPF) is of very muc...
Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips
Modular inversion with large integers and modulus is a fundamental operation in many public-key cryptosystems. Extended Euclidean algorithm (XGCD) is an extension of Euclidean algorithm (GCD) used to compute the modular...
Cloud Computing Environment: A Review
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...
A New Similarity Measure for User-based Collaborative Filtering in Recommender Systems
Collaborative filtering is a popular approach in recommender Systems that helps users in identifying the items they may like in a wagon of items. Finding similarity among users with the available item ratings so as to pr...