A new encryption scheme for surveillance videos

被引:1
作者
Cao, Xiaochun [1 ,2 ]
Ma, Meili [1 ]
Guo, Xiaojie [2 ]
Du, Ling [1 ]
Lin, Dongdai [2 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, SKL Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
surveillance videos; video encryption; background and foreground separation; IMAGE ENCRYPTION;
D O I
10.1007/s11704-015-3362-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel framework to encrypt surveillance videos. Although a few encryption schemes have been proposed in the literature, they are not sufficiently efficient due to the lack of full consideration of the characteristics of surveillance videos, i.e., intensive global redundancy. By taking advantage of such redundancy, we design a novel method for encrypting such videos. We first train a background dictionary based on several frame observations. Then every single frame is parsed into the background and foreground components. Separation is the key to improve the efficiency of the proposed technique, since encryption is only carried out in the foreground, while the background is skillfully recorded by corresponding background recovery coefficients. Experimental results demonstrate that, compared to the state of the art, the proposed method is robust to known cryptanalytic attacks, and enhances the overall security due to the foreground and background separation. Additionally, our encryption method is faster than competing methods, which do not conduct foreground extraction.
引用
收藏
页码:765 / 777
页数:13
相关论文
共 33 条
[1]  
Acharya AK, 2011, P INT C COMM NY US, P577
[2]  
Aes N, 2001, FIPS197
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]  
[Anonymous], 2013, P 21 ACM INT C MULT
[5]  
[Anonymous], 2005, P 3 ACM INT WORKSH V
[6]   MPEG video encryption algorithms [J].
Bhargava, B ;
Shi, CG ;
Wang, SY .
MULTIMEDIA TOOLS AND APPLICATIONS, 2004, 24 (01) :57-79
[7]  
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[8]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[9]   Distributed embedded smart cameras for surveillance applications [J].
Bramberger, M ;
Doblander, A ;
Maier, A ;
Rinner, B ;
Schwabach, H .
COMPUTER, 2006, 39 (02) :68-+
[10]   Robust Principal Component Analysis? [J].
Candes, Emmanuel J. ;
Li, Xiaodong ;
Ma, Yi ;
Wright, John .
JOURNAL OF THE ACM, 2011, 58 (03)