Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.2.417

A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance  

Lee, Donghyeok (Elementary Education Research Institute, Jeju National University)
Park, Namje (Teachers College, Jeju National University)
Abstract
The intelligent video surveillance environment is a system that extracts various information about a video object and enables automated processing through the analysis of video data collected in CCTV. However, since the privacy exposure problem may occur in the process of intelligent video surveillance, it is necessary to take a security measure. Especially, video metadata has high vulnerability because it can include various personal information analyzed based on big data. In this paper, we propose a COP-Transformation scheme to protect video metadata. The proposed scheme is advantageous in that it greatly enhances the security and efficiency in processing the video metadata.
Keywords
Video Surveillance; Privacy Protection; COP-Transformation; CCTV Video Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Namje Park, Marie Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment", Cluster Computing, 17(3), pp. 653-664, Sep. 2014.   DOI
2 Donghyeok Lee, Namje Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance", The Journal of Supercomputing, pp.1-16, 2016.
3 Namje Park, Hongxin Hu, Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, 2016, 2016.
4 F. Dufaux, T. Ebrahimi, "Scrambling for Privacy Protection in Video Surveillance Systems," IEEE Trans. on Circuits and Systems for Video Technology, 18(8), pp. 1168-1174, 2008.   DOI
5 P. Agrawal, P.J. Narayanan, "Person De-identification in Videos," IEEE Trans. on Circuits and Systems for Video Technology. 21(3), pp. 299-310, 2011.   DOI
6 F. Dufaux, T. Ebrahimi, "A Framework for the Validation of Privacy Protection Solutions in Video Surveillance," IEEE International Conference on Multimedia and Expo (ICME), pp. 66-71, 2010.
7 E. M. Newton, et. al., "Preserving Privacy by De-identifyuing Face Images," IEEE Trans. on Knowledge and Data Engineering, 17(2), pp. 232-243, 2005.   DOI
8 Cha Gun Sang, Shin Yong Tae, "Personal Video Privacy Issue to Increasing CCTV Installation," Journal of Computing Science and Engineering, 27(12), 2009.
9 F. Peng, X. Zhu, M. Long, "A ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos," P. Agrawal, P.J. Narayanan, IEEE Trans. on Information Forensics and Security, 8(10), pp.1688-1699, 2013.   DOI
10 D. A. Rodriguez-Silva, L. Adkinson-Orellana, F. J. Gonzalez-Castano, I. Armino-Franco, "Video surveillance based on cloud storage", 2012 IEEE Fifth International Conference on Cloud Computing, pp. 991-992, 2012.
11 Lee D, Park N, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", Personal and Ubiquitous Computing, DOI 101007/s00779-017-1017-1, 2017.
12 Donghyeok Lee, Namje Park, "A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud", Journal of the Korea Institute of Information Security & Cryptology, 26(4), pp. 929-940, Aug. 2016.   DOI
13 Donghyeok Lee, Namje Park, "A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud", Journal of the Korea Institute of Information Security & Cryptology, 26(4), pp. 929-940, Aug. 2016.   DOI
14 Namje Park and Namhi Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Sensors, 16(1), pp. 1-16, Dec. 2015.   DOI
15 Agrawal, Rakesh, et al. "Order preserv- ing encryption for numeric data." Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004.
16 Dongkook Kim, Hyeok Lee, "Personal Information De-Idenification Trends based on Big Data", Review of Korean Society for Internet Information, 16(2), pp.15-22, Dec. 2015.
17 Donghyeok Lee, Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection",Korea Institute of Information Security and Cryptology, 26(6), pp.1593-1603, Dec. 2016.   DOI
18 Aiden A. Bruen and Mario A. Forcinito, "Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century", John Wiley & Sons, Inc., 2005