Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2015, Vol. 9 Issue (5) : 765-777    https://doi.org/10.1007/s11704-015-3362-4
RESEARCH ARTICLE
A new encryption scheme for surveillance videos
Xiaochun CAO1,2,*(),Meili MA1(),Xiaojie GUO2(),Ling DU1,Dongdai LIN2
1. School of Computer Science and Technology, Tianjin University, Tianjin 300072, China
2. SKL Of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
 Download: PDF(1166 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

In this paper, we propose a novel framework to encrypt surveillance videos. Although a few encryption schemes have been proposed in the literature, they are not sufficiently efficient due to the lack of full consideration of the characteristics of surveillance videos, i.e., intensive global redundancy. By taking advantage of such redundancy, we design a novel method for encrypting such videos. We first train a background dictionary based on several frame observations. Then every single frame is parsed into the background and foreground components. Separation is the key to improve the efficiency of the proposed technique, since encryption is only carried out in the foreground,while the background is skillfully recorded by corresponding background recovery coefficients. Experimental results demonstrate that, compared to the state of the art, the proposed method is robust to known cryptanalytic attacks, and enhances the overall security due to the foreground and background separation. Additionally, our encryption method is faster than competing methods, which do not conduct foreground extraction.

Keywords surveillance videos      video encryption      background and foreground separation     
Corresponding Author(s): Xiaochun CAO   
Just Accepted Date: 31 December 2014   Issue Date: 24 September 2015
 Cite this article:   
Xiaochun CAO,Meili MA,Xiaojie GUO, et al. A new encryption scheme for surveillance videos[J]. Front. Comput. Sci., 2015, 9(5): 765-777.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-015-3362-4
https://academic.hep.com.cn/fcs/EN/Y2015/V9/I5/765
1 Cucchiara R. Multimedia surveillance systems. In: Proceedings of the 3rd ACM International Workshop on Video Surveillance &Sensor Networks. 2005: 3―10
https://doi.org/10.1145/1099396.1099399
2 Lee L, Romano R, Stein G. Introduction to the special section on video surveillance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(8): 745―746
https://doi.org/10.1109/TPAMI.2000.868676
3 Cohen I, Medioni G. Detecting and tracking moving objects for video surveillance. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 1999, 319―325
https://doi.org/10.1109/cvpr.1999.784651
4 Bramberger M, Doblander A, Maier A, Rinner B, Schwabach H. Distributed embedded smart cameras for surveillance applications. Computer, 2006, 39(2): 68―75
https://doi.org/10.1109/MC.2006.55
5 Kudelski A. Method for scrambling and unscrambling a video signal. US Patent 5375168, 1994
6 Matias Y, Shamir A. Video scrambling apparatus and method based on space filling curves. US Patent 5058158, 1991
7 Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118―129
https://doi.org/10.1109/TMM.2003.808817
8 Chang H K C, Liu J L. A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication, 1997, 10(4): 279―290
https://doi.org/10.1016/S0923-5965(96)00025-2
9 Cheng H, Li X. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 2000, 48(8): 2439―2451
https://doi.org/10.1109/78.852023
10 Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 1995, 20(7): 767―769
https://doi.org/10.1364/OL.20.000767
11 Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns. Pattern Recognition, 1992, 25(6): 567―581
https://doi.org/10.1016/0031-3203(92)90074-S
12 Chang C C, Hwang M S, Chen T S. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 2001, 58(2): 83―91
https://doi.org/10.1016/S0164-1212(01)00029-2
13 Liu Z, Guo Q, Xu L, Ahmad M A, Liu S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express, 2010, 18(11): 12033―12043
https://doi.org/10.1364/OE.18.012033
14 Acharya A K. Image encryption using a new chaos based encryption algorithm. In: Proceedings of the 2011 ACM International Conference on Communication, Computing & Security. 2011: 577―581
https://doi.org/10.1145/1947940.1948060
15 Alvarez G, Li S. Some basic cryptographic requirements for chaosbased cryptosystems. International Journal of Bifurcation and Chaos, 2006, 16(08): 2129―2151
https://doi.org/10.1142/S0218127406015970
16 Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electronic Imaging, 1998, 7(2): 318―325
https://doi.org/10.1117/1.482647
17 Fran?ois M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Processing: Image Communication, 2012, 27(3): 249―259
https://doi.org/10.1016/j.image.2011.11.003
18 Qiao L, Nahrstedt K. A new algorithm for MPEG video encryption. In: Proceedings of the 1st International Conference on Imaging Science System and Technology. 1997: 21―29
19 Tosun A S, Feng W. Lightweight security mechanisms for wireless video transmission. In: Proceedings of the IEEE International Conference Information Technology: Coding and Computing. 2001, 157―161
https://doi.org/10.1109/ITCC.2001.918783
20 Aes N. Advanced encryption standard. Federal Information Processing Standard, 2001, FIPS-197: 12
21 Liu Z, Li X. Motion vector encryption in multimedia streaming. In: Proceedings of the 10th IEEE International Conference on Multimedia Modelling. 2004: 64―71
22 Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118―129
https://doi.org/10.1109/TMM.2003.808817
23 Zeng W, Zhuang X, Lan J. Network friendly media security: rationals, solutions, and open issues. In: Proceedings of the IEEE International Conference on Image Processing. 2004
24 Wen J, Severa M, Zeng W, Luttrell M H, Jin W. A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology, 2002, 12(6): 545―557
https://doi.org/10.1109/TCSVT.2002.800321
25 Qiao L, Nahrstedt K. Comparison of MPEG encryption algorithms. Computers & Graphics, 1998, 22(4): 437―448
https://doi.org/10.1016/S0097-8493(98)00033-8
26 Bhargava B, Shi C, Wang S Y. MPEG video encryption algorithms. Multimedia Tools and Applications, 2004, 24(1): 57―79
https://doi.org/10.1023/B:MTAP.0000033983.62130.00
27 Liu Z, Peng D, Zheng Y, Liu J. Communication protection in IP-based video surveillance systems. In: Proceedings of the IEEE International Symposium on Multimedia. 2005, 8
28 Ntalianis K S, Kollias S D. Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant Sboxes. In: Proceedings of the IEEE International Conference on Image Processing. 2005, 2: II-1110-13
29 Choo E, Lee J, Lee H, Nam G. SRMT: a lightweight Encryption scheme for secure real-time multimedia Transmission. In: Proceedings of the International Conference on Multimedia and Ubiquitons Engineering. 2007, 60―65
https://doi.org/10.1109/mue.2007.194
30 Guo X, Li S, Cao X. Motion matters: a novel framework for compressing surveillance videos. In: Proceedings of the 21st ACM International Conference or Multimedia. 2013, 549―552
https://doi.org/10.1145/2502081.2502145
31 Candès E J, Li X, Ma Y, Wright J. Robust principal component analysis? Journal of the ACM (JACM), 2011, 58(3): 11
https://doi.org/10.1145/1970392.1970395
32 Zhou T, Tao D. Godec: randomized low-rank & sparse matrix decomposition in noisy case. In: Proceedings of the 28th International Conference on Machine Learning. 2011: 33―40
33 Lin Z, Chen M, Ma Y. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. 2010, arXiv:1009.5055
34 Bleichenbacher D. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. Lecture Notes in Computer Science, 1998, 1462: 1―12
https://doi.org/10.1007/BFb0055716
[1] Supplementary Material-Highlights in 3-page ppt
Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed