Skip to main content

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System

  • Conference paper
Book cover E-Commerce and Web Technologies (EC-Web 2010)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 61))

Included in the following conference series:

Abstract

Privacy protection and content confidentiality in video surveillance are new challenging security issues where the basic requirements are still under discussion. They are truly interdisciplinary topics pertaining several sectors of the information society (Finance, Homeland Security, Healthcare, etc) that require inputs from legal experts, technologists, privacy advocates and general public. This work presents a novel video surveillance system that provides content confidentiality and distributed trust by using a hybrid cryptosystem based on a threshold multi-party key-sharing scheme. Due to the flexibility of the underlying video content access-control scheme, such approach can handle the problem of users loosing their private shares as well as dynamically adding new users that can participate to content reconstruction. The system can be efficiently implemented on low-cost special purpose devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stinson, D.R.: Cryptography: Theory and Practice, 1st edn. Chapman & Hall, New York (1995)

    Google Scholar 

  2. Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the 4th ACM International Conference on Multimedia, Boston, Mass, USA, November 1996, pp. 219–229 (1996)

    Google Scholar 

  3. Agi, I., Long, L.: An Empirical Study of Secure MPEG Video Transmissions. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, February 1996, pp. 137–144 (1996)

    Google Scholar 

  4. Qiao, L., Nahrstedt, K.: Comparison of MPEG Encryption Algorithms. Computers and Graphics 22(4), 437–448 (1998)

    Article  Google Scholar 

  5. Shi, C., Bhargava, B.K.: A Fast MPEG Video Encryption Algorithm. In: Proceedings of the 6th ACM International Conference on Multimedia, Bristol, England, September 1998, pp. 81–88 (1998)

    Google Scholar 

  6. Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)

    Article  Google Scholar 

  7. IETF NTP WG: The Network Time Protocol (March 2010), http://datatracker.ietf.org/wg/ntp/

  8. Qiao, L., Nahrstedt, K.: A New Algorithm for MPEG Video Encryption. In: Proceedings of The First International Conference on Imaging Science, Systems, and Technology (CISST’97), Las Vegas, Nevada, July 1997, pp. 21–29 (1997)

    Google Scholar 

  9. Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    Google Scholar 

  10. Schimek, M.H.: Video for Linux Two API Specification (2008), http://www.linuxtv.org/downloads/video4linux/API/V4L2_API/

  11. de Goede, H.: Video4Linux v4l-utils and libv4l (March 2010), http://freshmeat.net/projects/libv4l/

  12. The GTK+ Team, The GTK+ Project (September 2009), http://www.gtk.org/

  13. Dalì, A.: Multimedia Software Library (June 1999), http://www.cs.cornell.edu/dali/

  14. The OpenSSL Core and Development Team: The OpenSSL Project (March 2010), http://www.openssl.org/

  15. Poettering, B.: Shamir’s Secret Sharing Scheme (September 2006), http://point-at-infinity.org/ssss/

  16. Podesser, M., Schmidt, H., Uhl, A.: Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway (2002)

    Google Scholar 

  17. Bernstein, D.J.: Cache-Timing Attacks on AES (2005), http://cr.yp.to/antiforgery/cachetiming-20050414.pdf

  18. Bonneau, J., Mironov, I.: Cache-Collision Timing Attacks Against AES (2005), http://research.microsoft.com/users/mironov/papers/aestiming.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F. (2010). Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds) E-Commerce and Web Technologies. EC-Web 2010. Lecture Notes in Business Information Processing, vol 61. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15208-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15208-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15207-8

  • Online ISBN: 978-3-642-15208-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics