skip to main content
research-article

AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems

Published: 08 October 2019 Publication History

Abstract

As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. It is challenging to satisfy both (personal) privacy and authenticity of a video simultaneously, since the privacy requires modifications (e.g., partial deletions) of an original video image while the authenticity does not allow any modifications of the original image. This paper proposes a novel method to convert an encryption scheme to support partial decryption with a constant number of keys and construct a privacy-aware authentication scheme by combining with a signature scheme. The security of our proposed scheme is implied by the security of the underlying encryption and signature schemes. Experimental results show that the proposed scheme can handle the UHD video stream with more than 17 fps on a real embedded system, which validates the practicality of the proposed scheme.

References

[1]
Michel Abdalla and Leonid Reyzin. 2000. A new forward-secure digital signature scheme. In ASIACRYPT. 116--129.
[2]
Giuseppe Ateniese, Daniel H. Chou, Breno De Medeiros, and Gene Tsudik. 2005. Sanitizable signatures. In European Symposium on Research in Computer Security. Springer, 159--177.
[3]
Mihir Bellare and Sara K. Miner. 1999. A forward-secure digital signature scheme. In Advances in Cryptology - CRYPTO’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15–19, 1999, Proceedings. 431--448.
[4]
Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. 2012. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. ACM, 326--349.
[5]
Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, and Dominique Schröder. 2010. Redactable signatures for tree-structured data: Definitions and constructions. In ACNS 2010. 87--104.
[6]
Nicola Cutcher. 2010. CCTV and police abuse of power. https://www.theguardian.com/commentisfree/2010/jul/19/gaza-protests-inquiry-police-cctv.
[7]
Gene Itkis and Leonid Reyzin. 2001. Forward-secure signatures with optimal signing and verifying. In Advances in Cryptology - CRYPTO 2001, Santa Barbara, California, USA, August 19–23, 2001, Proceedings. 332--354.
[8]
Rob Johnson, Leif Walsh, and Michael Lamb. 2011. Homomorphic signatures for digital photographs. In Financial Cryptography. Springer, 141--157.
[9]
H. Kalva. 2006. The H.264 video coding standard. IEEE MultiMedia 13, 4 (Oct. 2006), 86--90.
[10]
Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, and Hyunok Oh. 2017. PASS: Privacy aware secure signature scheme for surveillance systems. In Advanced Video and Signal-based Surveillance (AVSS), 2017 IEEE Symposium on. IEEE.
[11]
Jihye Kim and Hyunok Oh. 2017. Forward-secure digital signature schemes with optimal computation and storage of signers. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 523--537.
[12]
C.-Y. Lin and S.-F. Chang. 2000. Semifragile watermarking for authenticating JPEG visual content. In Electronic Imaging. International Society for Optics and Photonics. 140–151.
[13]
Swee-Won Lo, Zhuo Wei, Robert H. Deng, and Xuhua Ding. 2015. On security of content-based video stream authentication. In ESORICS 2015. 366--383.
[14]
Chun-Shien Lu and H-Ym Liao. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Transactions on Multimedia 5, 2 (2003), 161--173.
[15]
Pierre Moulin. 2001. The role of information theory in watermarking and its application to image watermarking. Signal Processing 81, 6 (2001), 1121--1139.
[16]
Assa Naveh and Eran Tromer. 2016. PhotoProof: Cryptographic image authentication for any set of permissible transformations. In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 255--271.
[17]
Christian Rey and Jean-Luc Dugelay. 2002. A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing 2002, 6 (2002), 218932.
[18]
G. J. Sullivan, J. R. Ohm, W. J. Han, and T. Wiegand. 2012. Overview of the high efficiency video coding (HEVC) standard. IEEE Transactions on Circuits and Systems for Video Technology 22, 12 (Dec. 2012), 1649--1668.
[19]
R. Sun, H. Sun, and T. Yao. 2002. A SVD-and quantization based semi-fragile watermarking technique for image authentication. In International Conference on Signal Processing. IEEE, 1592--1595.
[20]
Ramarathnam Venkatesan, S. M. Koon, Mariusz H. Jakubowski, and Pierre Moulin. 2000. Robust image hashing. In Image Processing, 2000, Vol. 3. IEEE, 664--666.

Cited By

View all
  • (2023)An Improved Low-Overhead Secure Image Compression over Wireless Multimedia Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-023-10648-1132:2(1049-1081)Online publication date: 1-Sep-2023
  • (2022)Hiding Privacy Data in Visual Surveillance Video based on Wavelet and Flexible Function2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH)10.1109/SMARTTECH54121.2022.00031(85-90)Online publication date: May-2022
  • (2022)Solving PBQP-based register allocation using deep reinforcement learningProceedings of the 20th IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO53902.2022.9741272(230-241)Online publication date: 2-Apr-2022

Index Terms

  1. AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Embedded Computing Systems
      ACM Transactions on Embedded Computing Systems  Volume 18, Issue 5s
      Special Issue ESWEEK 2019, CASES 2019, CODES+ISSS 2019 and EMSOFT 2019
      October 2019
      1423 pages
      ISSN:1539-9087
      EISSN:1558-3465
      DOI:10.1145/3365919
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 08 October 2019
      Accepted: 01 July 2019
      Revised: 01 June 2019
      Received: 01 April 2019
      Published in TECS Volume 18, Issue 5s

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Privacy
      2. authentication
      3. forward-secure signature
      4. video

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)An Improved Low-Overhead Secure Image Compression over Wireless Multimedia Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-023-10648-1132:2(1049-1081)Online publication date: 1-Sep-2023
      • (2022)Hiding Privacy Data in Visual Surveillance Video based on Wavelet and Flexible Function2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH)10.1109/SMARTTECH54121.2022.00031(85-90)Online publication date: May-2022
      • (2022)Solving PBQP-based register allocation using deep reinforcement learningProceedings of the 20th IEEE/ACM International Symposium on Code Generation and Optimization10.1109/CGO53902.2022.9741272(230-241)Online publication date: 2-Apr-2022

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media