Skip to main content
Log in

Secure and distributed video surveillance via portable devices

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In this work we present a system for distributed video surveillance based on the Client-Server model. The system we present can be accessed via portable devices. In many real-world scenarios is useful, or sometimes necessary, to have portable devices that can receive real-time data from a selected camera, to prevent or to manage anomalous activities. The system provides reliable, high speed, secure and real-time communication among all its components, which are the Repository, the Node and the Portable Device. Both Repository and Node can act as a server. The Repository can provide services to both Nodes and Portable Devices, while the Nodes provide services only to the Portable Device. The portable device can only act as a client, using the services offered by the other two parts. In our system, a portable device is assumed to know only the location of the Repository which permits to get the list of nodes connected with one or more camera(s). When a portable device gets the list, it can choose which node intends to connect to, to get the images of its connected camera(s). The security of the interaction among Node-Repository and Node-Portable Device is guaranteed by using the SSL/TLS protocol. The interaction among nodes and portable devices is secured by using an invisible digital watermarking algorithm on each image, before that image is sent from a node to a portable device. The latter extracts the watermark from the image and verifies the identity of the node.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Albano P, Bruno A, Carpentieri B, Castiglione A, Castiglione A, Palmieri F, Pizzolante R, You I (2012) A secure distributed video surveillance system based on portable devices. In: CD-ARES, LNCS 7465, pp 403–415

  • Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst. J. 35(3–4):313 –336 (ISSN: 0018-8670)

  • Castiglione A, De Prisco R, De Santis A (2009) Do you trust your phone. In: Noia T, Buccafurri F (eds) E-commerce and web technologies. Lecture notes in computer science, vol 5692. Springer, Berlin, Heidelberg, pp 50–61 (ISBN: 978-3-642-03963-8). doi:10.1007/978-3-642-03964-5_6

  • Castiglione A, Cattaneo G, De Maio G, Petagna F (2011) Secure end-to-end communication over 3G telecommunication networks. In: Proceedings of 5th international conference on innovative mobile and internet services in ubiquitous computing (IMIS) pp 520–526. doi:10.1109/IMIS.2011.65

  • Castiglione A, Cattaneo G, Cembalo M, De Santis A, Faruolo P, Petagna F, Petrillo UF (2012) Engineering a secure mobile messaging framework. Comput Secur 31(6):771–781 (ISSN: 0167-4048). doi:10.1016/j.cose.2012.06.004

    Google Scholar 

  • Chen TH, Kao CL, Chang SM (2003) An intelligent real-time fire-detection method based on video processing. In: Proceedings of IEEE 37th annual 2003 international Carnahan conference on security technology, pp 104–111

  • Chen TH, Wu PH, Chiou YC (2004) An early fire-detection method based on image processing. In: Proceedings of IEEE ICIP’04, international conference on image processing, 2004, vol 3, pp 1707–1710

  • Collins RT, Lipton A, Kanade T, Fujiyoshi H, Duggins D, Tsin Y, Tolliver D, Enomoto N, Hasegawa O, Burt P, et al (2000) A system for video surveillance and monitoring, vol 102. The Robotics Institute, Carnegie Mellon University, Pittsburgh

  • De Santis A, Castiglione A, Cattaneo G, Cembalo M, Petagna F, Petrillo UF (2010) An extensible framework for efficient secure SMS. In: Proceedings of CISIS, 4th international conference on complex, intelligent and software intensive iystems, Krakow, Poland, pp 843–850. doi:10.1109/CISIS.2010.81

  • Dufaux F, Ouaret M, Abdeljaoued Y, Navarro A, Vergnenègre F, Ebrahimi T et al (2006) Privacy enabling technology for video surveillance. Proc SPIE 6250:205–216

    Google Scholar 

  • Duque D, Santos H, Cortez P (2007) Prediction of abnormal behaviors for intelligent video surveillance systems. In: Proceedings of IEEE symposium on computational intelligence and data mining, CIDM 2007, pp 362–367

  • Fleck S, Straßer W (2010) Towards secure and privacy sensitive surveillance. In: Proceedings of the 4th ACM/IEEE international conference on distributed smart cameras, ICDSC ’10, ACM 2010, New York, NY, USA, pp 126–132 (ISBN: 978-1-4503-0317-0). doi:10.1145/1865987.1866008.

  • Foresti GL, Snidaro L (2002) A distributed sensor network for video surveillance of outdoor environments. In: Proceedings of IEEE 2002 international conference on image processing 2002, vol 1, pp 1–525

  • Huang Z, Ren S, Chen Y, Jiang W (2009) Research on the military video surveillance system with conditional access information. Inf Technol Manage 10:028

    Google Scholar 

  • Hunker J., Probst CW (2011) Insiders and insider threats—an overview of definitions and mitigation techniques. J Wirel Mob Netw Ubiquitous Comput Dependable Appl (JoWUA) 2(1):4–27

    Google Scholar 

  • Ko T (2008) A survey on behavior analysis in video surveillance for homeland security applications. In: Proceedings of IEEE 37th IEEE workshop on applied imagery pattern recognition, AIPR’08, pp 1–8

  • Kutter M, Jordan FD, Bossen F (1998) Digital watermarking of color images using amplitude modulation. J Electr Imag 7:326–332. doi:10.1117/1.482648

    Google Scholar 

  • Langelaar GC, van der Lubbe JCA, Biemond J (1996) Copy protection for multimedia data based on labeling techniques. In: Proceedings of 17th symposium on information theory in the Benelux

  • Liang Q, Ding Z (2008) Spread spectrum watermark for color image based on wavelet tree structure. In: Proceedings of international conference on computer science and software engineering, vol 3, pp 692–695. doi:10.1109/CSSE.2008.958

  • Liu Z, Peng D, Zheng Y, Liu J (2005) Communication protection in IP-based video surveillance systems. In: Proceedings of 7th IEEE international symposium on multimedia, December 2005, Irvine, Calif, USA, pp 69–78

  • Muller-Schneiders S, Jager T, Loos HS, Niem W (2005) Performance evaluation of a real time video surveillance system. In: Proceedings of 2nd Joint IEEE International Workshop on visual surveillance and performance evaluation of tracking and surveillance, pp 137–143

  • Nasution AH, Emmanuel S (2007) Intelligent video surveillance for monitoring elderly in home environments. In: Proceedings of IEEE 9th workshop on multimedia signal processing, MMSP 2007, pp 203–206

  • Nieto M (1997) Public video surveillance: is it an effective crime prevention tool? California Research Bureau, California State Library Sacramento, CA

  • Norris C, McCahill M, Wood D (2002) The growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveill Soc 2(2/3):110–135

    Google Scholar 

  • Pizzolante R, Carpentieri B (2012) Copyright protection for images on mobile devices. In: Proceedings of 6th international conference on innovative mobile and internet services in ubiquitous computing (IMIS), pp 585–590. doi:10.1109/IMIS.2012.73

  • Srinivasan S, Latchman H, Shea J, Wong T, McNair J (2004) Airborne traffic surveillance systems: video surveillance of highway traffic. In: Proceedings of the ACM 2nd international workshop on video surveillance and sensor networks, VSSN ’04, ACM, New York, NY, USA, pp 131–135. (ISBN 1-58113-934-9) doi:10.1145/1026799.1026821

  • Töreyin BU, Dedeoglu Y, Cetin AE (2005) Flame detection in video using hidden markov models. In: Proceedings of IEEE international conference on image processing, ICIP 2005, vol 2, pp 1230–1233

  • Töreyin BUT, Dedeoglu Y, Güdükbay UCetin AE (2006) Computer vision based method for real-time fire and flame detection. Pattern Recogn Lett 27(1):49–58

  • Tseng BL, Lin CY, Smith JR (2002) Real-time video surveillance for traffic monitoring using virtual line analysis. In: Proceedings of IEEE international conference on multimedia and expo, ICME’02, vol 2, pp 541–544

  • Wang YP, Chen MJ, Cheng PY (2000) Robust image watermark with wavelet transform and spread spectrum techniques. In: Proceedings of conference record of the 34th Asilomar conference on signals, systems and computers, vol 2, 29 Nov 2000, pp 1846–1850. doi:10.1109/ACSSC.2000.911307

  • Zhang W, Cheung SC, Chen M (2005) Hiding privacy information in video surveillance system. In: Proceedings of the 12th IEEE international conference on image processing, pp 868–871

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raffaele Pizzolante.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Albano, P., Bruno, A., Carpentieri, B. et al. Secure and distributed video surveillance via portable devices. J Ambient Intell Human Comput 5, 205–213 (2014). https://doi.org/10.1007/s12652-013-0181-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-013-0181-z

Keywords

Navigation