A NEW COMBINATION METHOD FOR ENCRYPTION OF MOVING OBJECTS DETECTION IN VIDEO
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 1
Abstract
Nowadays surveillance systems have been widely deployed in various places and generate massive amount of video data every day. This raises threats of unauthorized access and potential privacy leakage as the recorded videos usually contain rich identifiable information such as facial biometrics. In order to mitigate the threats, many existing methods perform symmetric encryption on the entire frames in the videos. Unfortunately, these methods could introduce additional computation cost and storage. Moreover, as surveillance systems could be a part of distributed system, the key management is critical and challenging. In this paper, we propose a novel method which incorporates background subtraction technique and RSA encryption algorithm. Rather than encrypting the entire frames of the videos, the proposed detect the regions around moving objects in the frames of video and then perform RSA encryption on the detected regions. And RSA encryption technique has its advantages of key distribution and management. Our experimental results show that the proposed method only involve moderate computation cost and storage.
Authors and Affiliations
Nguyen Trong Nhan, Ye Dengpan
CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD
KDD process includes how data is stored and accessed, how andwhat algorithms can apply to large amount of data efficiently,how results can be interpreted and visualized. KDD is theprocess of identifying valid, interestin...
Performance evaluation of conflict serializability against 2PL in Homogenous Distributed Database
There are many techniques in the recent years that provide the synchronization among the transactions using shared data like 2 phase locking protocol and time stamping in distributed database system. These techniques are...
An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and Improvement
This paper proposes an adaptive and interactive agent based intelligent tutoring system for cognitive ability realization and improvement (ITSCARE - Intelligent Tutoring System for Cognitive Ability Realization and Impro...
A FUZZY BASED APPROACH FOR EARLY REQUIREMENT PRIORITIZATION
The importance of the prioritization in commercial software development has been analyzed by many researchers. The gathered requirements are required to be put into an order of some priority. In other words we can say th...
Representation of cloud ecosystem using engineering methodologies
Cloud Computing has fascinated massive consideration for business in spite of lot of technologies and business models in the market. The operational particulars within the cloud are not coherent enough to customers. Henc...