A Secure Distributed Video Surveillance System Based on Portable Devices

  • Pietro Albano
  • Andrea Bruno
  • Bruno Carpentieri
  • Aniello Castiglione
  • Arcangelo Castiglione
  • Francesco Palmieri
  • Raffaele Pizzolante
  • Ilsun You
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7465)

Abstract

In this work a distributed video surveillance system based on a Client-Server architecture is presented. The proposed system is accessible from portable devices such as tablets, smartphones, etc. In a typical real-world scenario, for example in homeland security, it is useful to have portable devices that can receive in real-time a frame or a sequence of frames coming from a selected camera to prevent or to detect attacks (i.e. terrorist attacks, etc.). In the proposed system, a portable device knows only the address of the server (repository), and the repository sends to the portable device the list of the clients (nodes) which are connected with one or more cameras. When the portable device obtains the list of the nodes, it connects directly to a specific node and requests the images of its connected cameras. The whole system provides secure communication channel between all its components. The security of both the node-repository and the repository-portable devices communications is guaranteed by using a secure connection. The security of the node-portable devices interconnection is provided by a digital invisible watermarking algorithm that affects each image before sending it from the node to the portable devices. Each portable device can extract the watermark and verify the identity of the node.

Keywords

Video Surveillance Remote Video Surveillance Remote Personal Security Mobile Video Surveillance Remote Homeland Security 

References

  1. 1.
    Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F.: Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds.) EC-Web 2010. LNBIP, vol. 61, pp. 73–84. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Castiglione, A., De Santis, A., Palmieri, F.: Ensuring privacy and confidentiality in digital video surveillance systems. In: Yee, G.O.M. (ed.) Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp. 245–267. IGI Global (2012)Google Scholar
  3. 3.
    Fleck, S., Straßer, W.: Towards secure and privacy sensitive surveillance. In: Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2010, pp. 126–132. ACM, New York (2010)CrossRefGoogle Scholar
  4. 4.
    Hunker, J., Probst, C.W.: Insiders and insider threats - an overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 2(1), 4–27 (2011)Google Scholar
  5. 5.
    Liang, Q., Ding, Z.: Spread spectrum watermark for color image based on wavelet tree structure. In: 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 692–695 (December 2008)Google Scholar
  6. 6.
    Wang, Y.P., Chen, M.J., Cheng, P.Y.: Robust image watermark with wavelet transform and spread spectrum techniques. In: Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (October 29-November 1), vol. 2, pp. 1846–1850 (2000)Google Scholar
  7. 7.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3.4), 313–336 (1996)CrossRefGoogle Scholar
  8. 8.
    Kutter, M., Jordan, F.D., Bossen, F.: Digital watermarking of color images using amplitude modulation. Journal of Electronic Imaging 7, 326–332 (1998)CrossRefGoogle Scholar
  9. 9.
    Pizzolante, R., Carpentieri, B.: Copyright protection for images on mobile devices. In: Proceedings of IMIS 2012 (2012)Google Scholar
  10. 10.
    Langelaar, G.C., van der Lubbe, J., Biemond, J.: Copy protection for multimedia data based on labeling techniques. In: 17th Symposium on Information Theory in the Benelux (1996)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Pietro Albano
    • 1
  • Andrea Bruno
    • 1
  • Bruno Carpentieri
    • 1
  • Aniello Castiglione
    • 1
  • Arcangelo Castiglione
    • 1
  • Francesco Palmieri
    • 2
  • Raffaele Pizzolante
    • 1
  • Ilsun You
    • 3
  1. 1.Dipartimento di Informatica “R.M. Capocelli”Università degli Studi di SalernoFiscianoItaly
  2. 2.Dipartimento di Ingegneria dell’InformazioneSeconda Università degli Studi di NapoliAversaItaly
  3. 3.Korean Bible UniversitySeoulRepublic of Korea

Personalised recommendations