Skip to main content
Log in

A new encryption scheme for surveillance videos

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel framework to encrypt surveillance videos. Although a few encryption schemes have been proposed in the literature, they are not sufficiently efficient due to the lack of full consideration of the characteristics of surveillance videos, i.e., intensive global redundancy. By taking advantage of such redundancy, we design a novel method for encrypting such videos. We first train a background dictionary based on several frame observations. Then every single frame is parsed into the background and foreground components. Separation is the key to improve the efficiency of the proposed technique, since encryption is only carried out in the foreground, while the background is skillfully recorded by corresponding background recovery coefficients. Experimental results demonstrate that, compared to the state of the art, the proposed method is robust to known cryptanalytic attacks, and enhances the overall security due to the foreground and background separation. Additionally, our encryption method is faster than competing methods, which do not conduct foreground extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cucchiara R. Multimedia surveillance systems. In: Proceedings of the 3rd ACM International Workshop on Video Surveillance & Sensor Networks. 2005: 3–10

    Chapter  Google Scholar 

  2. Lee L, Romano R, Stein G. Introduction to the special section on video surveillance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(8): 745–746

    Article  Google Scholar 

  3. Cohen I, Medioni G. Detecting and tracking moving objects for video surveillance. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 1999: 319–325

    Google Scholar 

  4. Bramberger M, Doblander A, Maier A, Rinner B, Schwabach H. Distributed embedded smart cameras for surveillance applications. Computer, 2006, 39(2): 68–75

    Article  Google Scholar 

  5. Kudelski A. Method for scrambling and unscrambling a video signal. US Patent 5375168, 1994

    Google Scholar 

  6. Matias Y, Shamir A. Video scrambling apparatus and method based on space filling curves. US Patent 5058158, 1991

    Google Scholar 

  7. Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118–129

    Article  Google Scholar 

  8. Chang H K C, Liu J L. A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication, 1997, 10(4): 279–290

    Google Scholar 

  9. Cheng H, Li X. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 2000, 48(8): 2439–2451

    Article  Google Scholar 

  10. Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 1995, 20(7): 767–769

    Article  Google Scholar 

  11. Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns. Pattern Recognition, 1992, 25(6): 567–581

    Article  Google Scholar 

  12. Chang C C, Hwang M S, Chen T S. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 2001, 58(2): 83–91

    Article  Google Scholar 

  13. Liu Z, Guo Q, Xu L, Ahmad M A, Liu S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express, 2010, 18(11): 12033–12043

    Article  Google Scholar 

  14. Acharya A K. Image encryption using a new chaos based encryption algorithm. In: Proceedings of the 2011 ACM International Conference on Communication, Computing & Security. 2011: 577–581

    Google Scholar 

  15. Alvarez G, Li S. Some basic cryptographic requirements for chaosbased cryptosystems. International Journal of Bifurcation and Chaos, 2006, 16(08): 2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  16. Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electronic Imaging, 1998, 7(2): 318–325

    Article  Google Scholar 

  17. François M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Processing: Image Communication, 2012, 27(3): 249–259

    Google Scholar 

  18. Qiao L, Nahrstedt K. A new algorithm for MPEG video encryption. In: Proceedings of the 1st International Conference on Imaging Science System and Technology. 1997: 21–29

    Google Scholar 

  19. Tosun A S, Feng W. Lightweight security mechanisms for wireless video transmission. In: Proceedings of the IEEE International Conference Information Technology: Coding and Computing. 2001, 157–161

    Chapter  Google Scholar 

  20. Aes N. Advanced encryption standard. Federal Information Processing Standard, 2001, FIPS-197: 12

    Google Scholar 

  21. Liu Z, Li X. Motion vector encryption in multimedia streaming. In: Proceedings of the 10th IEEE International Conference on Multimedia Modelling. 2004: 64–71

    Google Scholar 

  22. Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118–129

    Article  Google Scholar 

  23. Zeng W, Zhuang X, Lan J. Network friendly media security: rationals, solutions, and open issues. In: Proceedings of the IEEE International Conference on Image Processing. 2004

    Google Scholar 

  24. Wen J, Severa M, Zeng W, Luttrell M H, Jin W. A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology, 2002, 12(6): 545–557

    Article  Google Scholar 

  25. Qiao L, Nahrstedt K. Comparison of MPEG encryption algorithms. Computers & Graphics, 1998, 22(4): 437–448

    Article  Google Scholar 

  26. Bhargava B, Shi C, Wang S Y. MPEG video encryption algorithms. Multimedia Tools and Applications, 2004, 24(1): 57–79

    Article  Google Scholar 

  27. Liu Z, Peng D, Zheng Y, Liu J. Communication protection in IP-based video surveillance systems. In: Proceedings of the IEEE International Symposium on Multimedia. 2005, 8

    Google Scholar 

  28. Ntalianis K S, Kollias S D. Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant Sboxes. In: Proceedings of the IEEE International Conference on Image Processing. IEEE, 2005, 2: II-1110–13

    Google Scholar 

  29. Choo E, Lee J, Lee H, Nam G. SRMT: a lightweight Encryption scheme for secure real-time multimedia Transmission. In: Proceedings of the International Conference on Multimedia and Ubiquitons Engineering. 2007, 60–65

    Google Scholar 

  30. Guo X, Li S, Cao X. Motion matters: a novel framework for compressing surveillance videos. In: Proceedings of the 21st ACM International Conference or Multimedia. 2013, 549–552

    Chapter  Google Scholar 

  31. Candès E J, Li X, Ma Y, Wright J. Robust principal component analysis? Journal of the ACM (JACM), 2011, 58(3): 11

    Article  Google Scholar 

  32. Zhou T, Tao D. Godec: randomized low-rank & sparse matrix decomposition in noisy case. In: Proceedings of the 28th International Conference on Machine Learning. 2011: 33–40

    Google Scholar 

  33. Lin Z, Chen M, Ma Y. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. 2010, arXiv:1009.5055

    Google Scholar 

  34. Bleichenbacher D. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. Lecture Notes in Computer Science, 1998, 1462: 1–12

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaochun Cao.

Additional information

Xiaochun Cao received his BS and MS in computer science from Beihang University, China, in 1999 and 2002, and his PhD in computer science from the University of Central Florida, USA in 2006. He spent around three years at ObjectVideo Inc., Reston, VA, USA, as a research scientist. He is now a professor with the Institute of Information Engineering, Chinese Academy of Sciences. From 2008 to 2012, he was a professor with Tianjin University, China. He has authored and co-authored over 80 journals and conference papers. He was the recipient of the Piero Zamperoni Best Student Paper Award at the International Conference on Pattern Recognition, in 2004 and 2010, respectively, and his PhD dissertation was nominated for the University Level Outstanding Dissertation Award.

Meili Ma is an MS candidate in the School of Computer Science and Technology in Tianjin University, China. She received her BS in computer science and Technology from Hebei University, China in 2012. Her main research interests are multimedia information security and computer vision.

Xiaojie Guo received his BS in software engineering from the School of Computer Science and Technology, Wuhan University of Technology, China, in 2008. He received his MS and PhD in computer science from the School of Computer Science and Technology, Tianjin University, China in 2010 and 2013, respectively. He is currently with the Institute of Information Engineering, Chinese Academy of Sciences as an assistant professor. He was the recipient of the Piero Zamperoni Best Student Paper Award at the International Conference on Pattern Recognition, 2010.

Ling Du is a PhD candidate in the School of Computer Science and Technology in Tianjin University, China. She received her MS and BS both in computer science, from Liaoning University, China. She was a lecturer at Shenyang Aerospace University from 2007 to 2011. Her research interests include multimedia information security and computer vision.

Dongdai Lin received his MS and PhD in fundamental mathematics from the Institute of Systems Science, Chinese Academy of Sciences, China, in 1987 and 1990, respectively. He is currently the director of the National Engineering Research Center for Information Security and deputy director of the State Key Laboratory of Information Security, Institute of Information Engineering of the Chinese Academy of Sciences. He has published more than 150 research papers in journals and conference proceedings. His current research interests include cryptology, security protocols, symbolic computation, software development, multivariate public key cryptography, sequences and stream ciphers, zero knowledge proof, and network-based cryptographic computation.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, X., Ma, M., Guo, X. et al. A new encryption scheme for surveillance videos. Front. Comput. Sci. 9, 765–777 (2015). https://doi.org/10.1007/s11704-015-3362-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-015-3362-4

Keywords

Navigation