Visible to the public Biblio

Filters: Keyword is video recording  [Clear All Filters]
2023-02-17
Chandra, I., L, Mohana Sundari, Ashok Kumar, N., Singh, Ngangbam Phalguni, Arockia Dhanraj, Joshuva.  2022.  A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme. 2022 International Conference on Electronics and Renewable Systems (ICEARS). :823–828.
Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.
2021-08-02
Bezzine, Ismail, Khan, Zohaib Amjad, Beghdadi, Azeddine, Al-Maadeed, Noor, Kaaniche, Mounir, Al-Maadeed, Somaya, Bouridane, Ahmed, Cheikh, Faouzi Alaya.  2020.  Video Quality Assessment Dataset for Smart Public Security Systems. 2020 IEEE 23rd International Multitopic Conference (INMIC). :1—5.
Security and monitoring systems are more and more demanding in terms of quality, reliability and flexibility especially those dedicated to video surveillance. The quality of the acquired video signal strongly affects the performance of the high level tasks such as visual tracking, face detection and recognition. The design of a video quality assessment metric dedicated to this particular application requires a preliminary study on the common distortions encountered in video surveillance. To this end, we present in this paper a dataset dedicated to video quality assessment in the context of video surveillance. This database consists of a set of common distortions at different levels of annoyance. The subjective tests are performed using a classical pair comparison protocol with some new configurations. The subjective results obtained through the psycho-visual tests are analyzed and compared to some objective video quality assessment metrics. The preliminary results are encouraging and open a new framework for building smart video surveillance based security systems.
2021-07-07
Beghdadi, Azeddine, Bezzine, Ismail, Qureshi, Muhammad Ali.  2020.  A Perceptual Quality-driven Video Surveillance System. 2020 IEEE 23rd International Multitopic Conference (INMIC). :1–6.
Video-based surveillance systems often suffer from poor-quality video in an uncontrolled environment. This may strongly affect the performance of high-level tasks such as visual tracking, abnormal event detection or more generally scene understanding and interpretation. This work aims to demonstrate the impact and the importance of video quality in video surveillance systems. Here, we focus on the most important challenges and difficulties related to the perceptual quality of the acquired or transmitted images/videos in uncontrolled environments. In this paper, we propose an architecture of a smart surveillance system that incorporates the perceptual quality of acquired scenes. We study the behaviour of some state-of-the-art video quality metrics on some original and distorted sequences from a dedicated surveillance dataset. Through this study, it has been shown that some of the state-of-the-art image/video quality metrics do not work in the context of video-surveillance. This study opens a new research direction to develop the video quality metrics in the context of video surveillance and also to propose a new quality-driven framework of video surveillance system.
Kanwal, Nadia, Asghar, Mamoona Naveed, Samar Ansari, Mohammad, Lee, Brian, Fleury, Martin, Herbst, Marco, Qiao, Yuansong.  2020.  Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing. 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). :257–264.
Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly, surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. This paper presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos using steganography and hashing. The method conforms to the data protection regulations which are increasingly adopted by governments, and is applicable to network edge storage. Security credentials are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored within video frames themselves, independently of the content. The proposed method has turned out to not only preserve the integrity of the stored video data but also results in very limited degradation of the video data due to steganography. Despite the presence of steganographic information, video frames are still available for common image processing tasks such as tracking and classification.
2021-02-15
Rabieh, K., Mercan, S., Akkaya, K., Baboolal, V., Aygun, R. S..  2020.  Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption. 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI). :45–52.
Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream videos. One interesting application is the Intelligent Transportation Systems (ITS) and public safety applications where drones record videos and send them to a control center for further analysis. These videos are shared by various clients such as law enforcement or emergency personnel. In such cases, the recording might include faces of civilians or other sensitive information that might pose privacy concerns. While the video can be encrypted and stored in the cloud that way, it can still be accessed once the keys are exposed to third parties which is completely insecure. To prevent such insecurity, in this paper, we propose proxy re-encryption based sharing scheme to enable third parties to access only limited videos without having the original encryption key. The costly pairing operations in proxy re-encryption are not used to allow rapid access and delivery of the surveillance videos to third parties. The key management is handled by a trusted control center, which acts as the proxy to re-encrypt the data. We implemented and tested the approach in a realistic simulation environment using different resolutions under ns-3. The implementation results and comparisons indicate that there is an acceptable overhead while it can still preserve the privacy of drivers and passengers.
2020-02-10
Alia, Mohammad A., Maria, Khulood Abu, Alsarayreh, Maher A., Maria, Eman Abu, Almanasra, Sally.  2019.  An Improved Video Steganography: Using Random Key-Dependent. 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT). :234–237.

Steganography is defined as the art of hiding secret data in a non-secret digital carrier called cover media. Trading delicate data without assurance against intruders that may intrude on this data is a lethal. In this manner, transmitting delicate information and privileged insights must not rely on upon just the current communications channels insurance advancements. Likewise should make more strides towards information insurance. This article proposes an improved approach for video steganography. The improvement made by searching for exact matching between the secret text and the video frames RGB channels and Random Key -Dependent Data, achieving steganography performance criteria, invisibility, payload/capacity and robustness.

2015-05-04
Hui Su, Hajj-Ahmad, A., Min Wu, Oard, D.W..  2014.  Exploring the use of ENF for multimedia synchronization. Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on. :4613-4617.

The electric network frequency (ENF) signal can be captured in multimedia recordings due to electromagnetic influences from the power grid at the time of recording. Recent work has exploited the ENF signals for forensic applications, such as authenticating and detecting forgery of ENF-containing multimedia signals, and inferring their time and location of creation. In this paper, we explore a new potential of ENF signals for automatic synchronization of audio and video. The ENF signal as a time-varying random process can be used as a timing fingerprint of multimedia signals. Synchronization of audio and video recordings can be achieved by aligning their embedded ENF signals. We demonstrate the proposed scheme with two applications: multi-view video synchronization and synchronization of historical audio recordings. The experimental results show the ENF based synchronization approach is effective, and has the potential to solve problems that are intractable by other existing methods.