Browse > Article
http://dx.doi.org/10.9717/kmms.2019.22.10.1199

Dynamic / Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information  

Kim, Jinsu (Major in Computer Education, Faculty of Science Education, Graduate School, Jeju National University)
Park, Namje (Department of Computer Education, Teachers College, Jeju National University)
Publication Information
Abstract
Video surveillance data, which is used for preemptive or post-emptive action against any event or accident, is required for monitoring the location, but is reducing the capacity of the image data by removing intervals for cost reduction and system persistence. Such a video surveillance system is fixed in a certain position and monitors the area only within a limited angle, or monitors only the fixed area without changing the angle. At this time, the video surveillance system that is monitored only within a limited angle shows that the variation object such as the floating population shows different status in the image, and the background of the image maintains a generally constant appearance. The static objects in the image do not need to be stored in all the images, unlike the dynamic objects that must be continuously shot, and occupy a storage space other than the necessary ones. In this paper, we propose a mechanism to analyze the image, store only the small size image for the fixed background, and store it as image data only for variable objects.
Keywords
Video Surveillance Data; Removing Intervals; Variation Object; Background; Variation Object;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 N. Park and M. Kim, "Implementation of Load Management Application System Using Smart Grid Privacy Policy in Energy Management Service Environment," Cluster Computing, Vol. 17, Issue 3, pp. 653-664, 2014.   DOI
2 D. Lee and N. Park, "Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment," Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 3-10, 2018.   DOI
3 J.S. Park and S.U. Shin, "Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storag", Korea Multimedia Society, Vol. 21, No. 8, pp. 909-916, 2018.
4 S. Kang, A. Sur, and S. Jeong, "Stop Object Method within Intersection with Using Adaptive Background Image," Journal of Korea Academia-industrial Cooperation Society, Vol. 14, No. 5, pp.2430-2436, 2013.   DOI
5 Y. Kim, “An Improved Adaptive Background Mixture Model for Real-time Object Tracking Based on Background Subtraction,” Journal of Korean Society of Computer and Information, Vol. 10, No. 6, pp. 187-194, 2005.
6 S. Lee, "Offline Object Tracking for Private Information Masking in CCTV Data," Journal of Korea Institute of Information and Communication Engineering, Vol. 18, No. 12, pp. 2,961 - 2,967, 2014.   DOI
7 S. Ahn and C. Jang, A High Quality CCTV Image System Using Separated Storage of Object Area and Adaptive Background Image, 1020 180108779, Korea, 2018.
8 S. Lee, CCTV Monitoring System Using Event Image Overlayed Background Image, 102014 0191920, Korea, 2014.
9 S. Lee, CCTV Camera Video Management System With Virtualization And Deduplication, 1020120111798, Korea, 2014.
10 N. Park, Y. Song, and K. Park, “Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid,” International Journal of Contents, Vol. 10, No. 9, pp. 57-67, 2010.
11 D. Lee and N. Park, "ROI-based Efficient Video Data Processing for Large Scale Cloud Storage Environment," Proceeding of Conference of Korean Institute of Next Generation Computting, Vol. 13, No. 3, pp. 74-75, 2017.
12 D. Lee and N. Park, "Multi-object Recognition Access Control Based on CCTV Video Learning," Proceeding of Conference of Korean Institute of Information Scientists Engineers 2018, pp. 1115-1116, 2018.
13 D. Lee and N. Park, "ROI-based Efficient Video Data Processing for Large-scale Cloud Storage in Intelligent CCTV Environment," International Journal of Engineering and Technology, Vol. 7, No. 2.33, pp. 151-154, 2018.
14 K. Kang and N. Park, "Efficient Technique to Send Image Information for Mass Cloud Storage Environment," Proceeding of International Conference on Communication Technology, pp. 391-392, 2017.
15 D. Lee and N. Park, "AES-GCTR Mode That Has Improved The Existing AES-CTR Operation Mode," Proceeding of International Conference on Convergence Technology, pp. 389-390, 2017.
16 N. Park and N. Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle," Journal of Sensors, Vol. 16, No. 1, pp. 1-16, 2015.   DOI
17 N. Park, J. Park, and H. Kim, “Inter-authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment,” Journal of International Information Institute, Vol. 18, No. 1, pp. 261-266, 2015.
18 D. Lee and N. Park, "Protecting Privacy Using Metadata De-identification in CCTV Surveillance Systems Based on Openstack Cloud," Proceeding of the Fall Conference of International Conference on EV, Smart-grid and IT 2018, pp. 139-141, 2018.
19 D. Lee and N. Park, "Improvement of Object Privacy through Deduplication of CCTV Video Data," Proceeding of the Fall Conference of Multimedia Information System, pp. 132, 2018.
20 D. Lee and N. Park, "CCTV Video Data Security Scheme for Open Distributed Cloud Environment," Proceeding of the Fall Conference of Korean Society for Internet Information, pp. 113-114, 2018.
21 S. Jang, Y. Choi, and H. Kim, “Improved Visual Cryptography Using Cover Images,” Journal of Digital Contents Society, Vol. 13, No. 4, pp. 531-538, 2012.   DOI
22 M. Kim and J. Park, "A Human Identification Scheme Using Visual Cryptography," Journal of Information and Communications, Vol. 23, No. 6, pp. 1,546-1,553, 1998.
23 N. Park and M. Kim, "Implementation of Load Management Application System Using Smart Grid Privacy Policy in Energy Management Service Environment," Proceeding of IEEE International Conference on Cluster Computing, Vol. 17, No. 3, pp. 653-664, 2014.
24 N.J. Park, B.G. Kim, and J.S. Kim, "A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission," Proceeding of Electronics, Vol. 8, No. 7, pp. 735, 2019.
25 D. Lee and N. Park, "Geocasting-based Synchronization of Almanac on the Maritime Cloud for Distributed Smart Surveillance," Proceeding of Supercomputing, pp. 1-16, 2016.
26 J. Kim, N. Park, G. Kim, and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-transformation in the Emerging Multimedia," Proceeding of Electronics, Vol. 8, No. 4, pp. 412, 2019.
27 D. Lee, N. Park, G.W. Kim, and S.H. Jin, "Deidentification of Metering Data for Smart Grid Personal Security in Intelligent CCTV-based P2P Cloud Computing Environment," Proceeding of Peer-to-peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, 2018.
28 N.J. Park, H.X. Hu, and Q. Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things(IoT)" Proceeding of Distributed Sensor Networks, Vol. 2016, pp. 1-3, 2016.
29 N.J. Park, J.K. Wak, S.J. Kim, D.H. Won, and H.W. Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment," Advanced Web and Network Technologies and Applications, Lecture Notes in Computer Science, Vol. 3842, pp. 741-748, 2006.