Skip to main content
Top
Published in: 3D Research 2/2019

01-06-2019 | 3DR Express

Improved Security in Multimedia Video Surveillance Using 2D Discrete Wavelet Transforms and Encryption Framework

Author: S. Velliangiri

Published in: 3D Research | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the rate of the video is increasing on the internet, the security of video data is considered as a critical issue. In case of video surveillance application, the multimedia video streams require the video to be transmitted in a more secure way to its corresponding monitoring site. The multimedia video security is improved in this paper using a compression based encryption module. 2D Discrete Wavelet Transforms method is used for the compression process. The wavelet transform eliminates the low visual information, and it is scrambled and rotated for the encryption process. The encryption is handled using a series of the permutation–diffusion framework that helps in encrypting each video frame for possible secured transmission. The diffusion is carried out using Logistic chaotic maps, and the permutated blocks are encrypted with block-wise encryption. The experimental results show that the proposed video security framework achieves an improved performance against the existing method in terms of PSNR, SSIM, key size, and compression ratio, error rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xu, Z., Hu, C., & Mei, L. (2016). Video structured description technology based intelligence analysis of surveillance videos for public security applications. Multimedia Tools and Applications, 75(19), 12155–12172.CrossRef Xu, Z., Hu, C., & Mei, L. (2016). Video structured description technology based intelligence analysis of surveillance videos for public security applications. Multimedia Tools and Applications, 75(19), 12155–12172.CrossRef
2.
go back to reference Chaaraoui, A. A., Padilla-López, J. R., Ferrández-Pastor, F. J., Nieto-Hidalgo, M., & Flórez-Revuelta, F. (2014). A vision-based system for intelligent monitoring: Human behaviour analysis and privacy by context. Sensors, 14(5), 8895–8925.CrossRef Chaaraoui, A. A., Padilla-López, J. R., Ferrández-Pastor, F. J., Nieto-Hidalgo, M., & Flórez-Revuelta, F. (2014). A vision-based system for intelligent monitoring: Human behaviour analysis and privacy by context. Sensors, 14(5), 8895–8925.CrossRef
3.
go back to reference Thorpe, C., Li, F., Li, Z., Yu, Z., Saunders, D., & Yu, J. (2013). A coprime blur scheme for data security in video surveillance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12), 3066–3072.CrossRef Thorpe, C., Li, F., Li, Z., Yu, Z., Saunders, D., & Yu, J. (2013). A coprime blur scheme for data security in video surveillance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12), 3066–3072.CrossRef
4.
go back to reference Puvvadi, U. L., Di Benedetto, K., Patil, A., Kang, K. D., & Park, Y. (2015). Cost-effective security support in real-time video surveillance. IEEE Transactions on Industrial Informatics, 11(6), 1457–1465.CrossRef Puvvadi, U. L., Di Benedetto, K., Patil, A., Kang, K. D., & Park, Y. (2015). Cost-effective security support in real-time video surveillance. IEEE Transactions on Industrial Informatics, 11(6), 1457–1465.CrossRef
5.
go back to reference Zhang, X., Seo, S. H., & Wang, C. (2018). A lightweight encryption method for privacy protection in surveillance videos. IEEE Access, 6, 18074–18087.CrossRef Zhang, X., Seo, S. H., & Wang, C. (2018). A lightweight encryption method for privacy protection in surveillance videos. IEEE Access, 6, 18074–18087.CrossRef
6.
go back to reference Zeng, H., & Ji, L. (2018). An encryption method for mobile video surveillance system based on ZUC algorithm. Procedia Computer Science, 131, 282–288.CrossRef Zeng, H., & Ji, L. (2018). An encryption method for mobile video surveillance system based on ZUC algorithm. Procedia Computer Science, 131, 282–288.CrossRef
7.
go back to reference Saini, M., Atrey, P. K., Mehrotra, S., & Kankanhalli, M. (2014). W 3-privacy: Understanding what, when, and where inference channels in multi-camera surveillance video. Multimedia Tools and Applications, 68(1), 135–158.CrossRef Saini, M., Atrey, P. K., Mehrotra, S., & Kankanhalli, M. (2014). W 3-privacy: Understanding what, when, and where inference channels in multi-camera surveillance video. Multimedia Tools and Applications, 68(1), 135–158.CrossRef
8.
go back to reference Ma, X., Zeng, W. K., Yang, L. T., Zou, D., & Jin, H. (2016). Lossless ROI privacy protection of H. 264/AVC compressed surveillance videos. IEEE Transactions on Emerging Topics in Computing, 4(3), 349–362.CrossRef Ma, X., Zeng, W. K., Yang, L. T., Zou, D., & Jin, H. (2016). Lossless ROI privacy protection of H. 264/AVC compressed surveillance videos. IEEE Transactions on Emerging Topics in Computing, 4(3), 349–362.CrossRef
9.
go back to reference Ma, X., Yang, L. T., Xiang, Y., Zeng, W. K., Zou, D., & Jin, H. (2017). Fully reversible privacy region protection for cloud video surveillance. IEEE Transactions on Cloud Computing, 5(3), 510–522.CrossRef Ma, X., Yang, L. T., Xiang, Y., Zeng, W. K., Zou, D., & Jin, H. (2017). Fully reversible privacy region protection for cloud video surveillance. IEEE Transactions on Cloud Computing, 5(3), 510–522.CrossRef
10.
go back to reference Alsmirat, M. A., Obaidat, I., Jararweh, Y., & Al-Saleh, M. (2017). A security framework for cloud-based video surveillance system. Multimedia Tools and Applications, 76(21), 22787–22802.CrossRef Alsmirat, M. A., Obaidat, I., Jararweh, Y., & Al-Saleh, M. (2017). A security framework for cloud-based video surveillance system. Multimedia Tools and Applications, 76(21), 22787–22802.CrossRef
11.
go back to reference Nandhini, S. A., & Radha, S. (2017). Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks. Computers and Electrical Engineering, 60, 175–192.CrossRef Nandhini, S. A., & Radha, S. (2017). Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks. Computers and Electrical Engineering, 60, 175–192.CrossRef
12.
go back to reference Lee, K., Yeuk, H., Kim, J., Park, H., & Yim, K. (2016). An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. Computer Standards and Interfaces, 44, 137–143.CrossRef Lee, K., Yeuk, H., Kim, J., Park, H., & Yim, K. (2016). An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers. Computer Standards and Interfaces, 44, 137–143.CrossRef
13.
go back to reference Kerr, M., & van Schyndel, R. (2014). Adapting law enforcement frameworks to address the ethical problems of CCTV product propagation. IEEE Security and Privacy, 12(4), 14–21.CrossRef Kerr, M., & van Schyndel, R. (2014). Adapting law enforcement frameworks to address the ethical problems of CCTV product propagation. IEEE Security and Privacy, 12(4), 14–21.CrossRef
14.
go back to reference Tsakanikas, V., & Dagiuklas, T. (2018). Video surveillance systems-current status and future trends. Computers and Electrical Engineering, 70, 736–753.CrossRef Tsakanikas, V., & Dagiuklas, T. (2018). Video surveillance systems-current status and future trends. Computers and Electrical Engineering, 70, 736–753.CrossRef
15.
go back to reference Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83–91.CrossRef Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83–91.CrossRef
16.
go back to reference Li, X., Knipe, J., & Cheng, H. (1997). Image compression and encryption using tree structures. Pattern Recognition Letters, 18(11–13), 1253–1259.CrossRef Li, X., Knipe, J., & Cheng, H. (1997). Image compression and encryption using tree structures. Pattern Recognition Letters, 18(11–13), 1253–1259.CrossRef
17.
go back to reference Wang, C., Ni, J., & Huang, Q. (2015). A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Processing: Image Communication, 39, 141–150. Wang, C., Ni, J., & Huang, Q. (2015). A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Processing: Image Communication, 39, 141–150.
18.
go back to reference Abdmouleh, M. K., Amri, H., Khalfallah, A., & Bouhlel, M. S. (2016). A fast JPEG2000 based crypto-compression algorithm: Application to the security for transmission of medical images. In International workshop soft computing applications (pp. 164–175). Cham: Springer. Abdmouleh, M. K., Amri, H., Khalfallah, A., & Bouhlel, M. S. (2016). A fast JPEG2000 based crypto-compression algorithm: Application to the security for transmission of medical images. In International workshop soft computing applications (pp. 164–175). Cham: Springer.
19.
go back to reference Boliek, M. (2000). Jpeg 2000 part i final committee draft version 1.0. ISO/IEC JTC1/SC29/WG1, N1646R. Boliek, M. (2000). Jpeg 2000 part i final committee draft version 1.0. ISO/IEC JTC1/SC29/WG1, N1646R.
20.
go back to reference El-Semary, A. M., Azim, M. M. A., & Diab, H. (2017). SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map. KSII Transactions on Internet and Information Systems, 11(7), 83–91. El-Semary, A. M., Azim, M. M. A., & Diab, H. (2017). SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map. KSII Transactions on Internet and Information Systems, 11(7), 83–91.
Metadata
Title
Improved Security in Multimedia Video Surveillance Using 2D Discrete Wavelet Transforms and Encryption Framework
Author
S. Velliangiri
Publication date
01-06-2019
Publisher
3D Display Research Center
Published in
3D Research / Issue 2/2019
Electronic ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-019-0228-9

Other articles of this Issue 2/2019

3D Research 2/2019 Go to the issue

Premium Partner