A new encryption scheme for surveillance videos

被引:1
|
作者
Cao, Xiaochun [1 ,2 ]
Ma, Meili [1 ]
Guo, Xiaojie [2 ]
Du, Ling [1 ]
Lin, Dongdai [2 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, SKL Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
surveillance videos; video encryption; background and foreground separation; IMAGE ENCRYPTION;
D O I
10.1007/s11704-015-3362-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel framework to encrypt surveillance videos. Although a few encryption schemes have been proposed in the literature, they are not sufficiently efficient due to the lack of full consideration of the characteristics of surveillance videos, i.e., intensive global redundancy. By taking advantage of such redundancy, we design a novel method for encrypting such videos. We first train a background dictionary based on several frame observations. Then every single frame is parsed into the background and foreground components. Separation is the key to improve the efficiency of the proposed technique, since encryption is only carried out in the foreground, while the background is skillfully recorded by corresponding background recovery coefficients. Experimental results demonstrate that, compared to the state of the art, the proposed method is robust to known cryptanalytic attacks, and enhances the overall security due to the foreground and background separation. Additionally, our encryption method is faster than competing methods, which do not conduct foreground extraction.
引用
收藏
页码:765 / 777
页数:13
相关论文
共 50 条
  • [31] An Efficient Coding Scheme for Surveillance Videos Based on High Efficiency Video Coding
    Wang, Jianfu
    Dong, Lanfang
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 899 - 904
  • [32] A New PVSS Scheme with a Simple Encryption Function
    Ben Shil, Assia
    Blibech, Kaouther
    Robbana, Riadh
    Neji, Wafa
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (122): : 11 - 22
  • [33] Improvement of Feistel method and the new encryption scheme
    JarJar, Abdellatif
    OPTIK, 2018, 157 : 1319 - 1324
  • [34] A new lossless digital image encryption scheme
    Pareek, Narendra K.
    Patidar, Vinod
    Sud, Krishan K.
    2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
  • [35] A new encryption scheme for multivariate quadratic systems
    Chen, Jiahui
    Ning, Jianting
    Ling, Jie
    Lau, Terry Shue Chien
    Wang, Yacheng
    THEORETICAL COMPUTER SCIENCE, 2020, 809 : 372 - 383
  • [36] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [37] A New Encryption Scheme based on Hybrid Problems
    Sahu, Hemlal
    Sharma, B. K.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 524 - 527
  • [38] A New Fair Identity Based Encryption Scheme
    Dugardin, Margaux
    Facon, Adrien
    Guilley, Sylvain
    Xuan-Thuy Ngo
    Lorvellec, Karine
    PROCEEDINGS OF 2019 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SIGNAL PROCESSING, TELECOMMUNICATIONS & COMPUTING (SIGTELCOM 2019), 2019, : 85 - 89
  • [39] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +