Secure and distributed video surveillance via portable devices

In this work we present a system for distributed video surveillance based on the Client-Server model. The system we present can be accessed via portable devices. In many real-world scenarios is useful, or sometimes necessary, to have portable devices that can receive real-time data from a selected camera, to prevent or to manage anomalous activities. The system provides reliable, high speed, secure and real-time communication among all its components, which are the Repository, the Node and the Portable Device. Both Repository and Node can act as a server. The Repository can provide services to both Nodes and Portable Devices, while the Nodes provide services only to the Portable Device. The portable device can only act as a client, using the services offered by the other two parts. In our system, a portable device is assumed to know only the location of the Repository which permits to get the list of nodes connected with one or more camera(s). When a portable device gets the list, it can choose which node intends to connect to, to get the images of its connected camera(s). The security of the interaction among Node-Repository and Node-Portable Device is guaranteed by using the SSL/TLS protocol. The interaction among nodes and portable devices is secured by using an invisible digital watermarking algorithm on each image, before that image is sent from a node to a portable device. The latter extracts the watermark from the image and verifies the identity of the node.

[1]  Umberto Ferraro Petrillo,et al.  Engineering a secure mobile messaging framework , 2012, Comput. Secur..

[2]  Christian W. Probst,et al.  Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[3]  Sabu Emmanuel,et al.  Intelligent Video Surveillance for Monitoring Elderly in Home Environments , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[4]  Teddy Ko,et al.  A survey on behavior analysis in video surveillance for homeland security applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.

[5]  John R. Smith,et al.  Real-time video surveillance for traffic monitoring using virtual line analysis , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[6]  Suman Srinivasan,et al.  Airborne traffic surveillance systems: video surveillance of highway traffic , 2004, VSSN '04.

[7]  S. Muller-Schneiders,et al.  Performance evaluation of a real time video surveillance system , 2005, 2005 IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance.

[8]  A. Enis Çetin,et al.  Computer vision based method for real-time fire and flame detection , 2006, Pattern Recognit. Lett..

[9]  Alfredo De Santis,et al.  Do You Trust Your Phone? , 2009, EC-Web.

[10]  Umberto Ferraro Petrillo,et al.  An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[11]  Mei-Juan Chen,et al.  Robust image watermark with wavelet transform and spread spectrum techniques , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).

[12]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[13]  Zhizhong Ding,et al.  Spread Spectrum Watermark for Color Image Based on Wavelet Tree Structure , 2008, 2008 International Conference on Computer Science and Software Engineering.

[14]  Frank Bossen,et al.  Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.

[15]  Paulo Cortez,et al.  Prediction of Abnormal Behaviors for Intelligent Video Surveillance Systems , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.

[16]  Gian Luca Foresti,et al.  A distributed sensor network for video surveillance of outdoor environments , 2002, Proceedings. International Conference on Image Processing.

[17]  Wolfgang Straßer,et al.  Towards secure and privacy sensitive surveillance , 2010, ICDSC '10.

[18]  Chao-Ho Chen,et al.  An early fire-detection method based on image processing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[19]  Takeo Kanade,et al.  A System for Video Surveillance and Monitoring , 2000 .

[20]  Jiang Wei Research on the military video surveillance system with conditional access information , 2009 .

[21]  David Murakami Wood,et al.  The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space , 2002 .

[22]  Bruno Carpentieri,et al.  Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[23]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[24]  A. Enis Çetin,et al.  Flame detection in video using hidden Markov models , 2005, IEEE International Conference on Image Processing 2005.

[25]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.

[26]  Thou-Ho Chen,et al.  An intelligent real-time fire-detection method based on video processing , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[27]  Giuseppe Cattaneo,et al.  SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[28]  Yuliang Zheng,et al.  Communication protection in IP-based video surveillance systems , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[29]  Mourad Ouaret,et al.  Privacy enabling technology for video surveillance , 2006, SPIE Defense + Commercial Sensing.

[30]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.