IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



9 Masking Identification Information On Visual Surveillance Systems By Granting Access Permission

[Full Text]

 

AUTHOR(S)

Telugu Maddileti , Y. Rasagna

 

KEYWORDS

Surveillance, investigate, observations, techniques, Video system, masking, infiltration

 

ABSTRACT

Video surveillance systems (VSS), are used to gather the information about a crime, to check, prevent the crimes or investigate the crime that have already taken place. Surveillance is defined as performing observations of a group or an individual The most common techniques for surveillance is to store the concerned information. The stored visual footage is then recovered to its normal state by the authorized users. This paper proposes a mechanism of masking where infiltration of privacy on videos is minimized. This paper aims for the security or ensuring the privacy of a particular moving person or an object and provides the access to a limited extent only.

 

REFERENCES

[1] https://ieeexplore.ieee.org/document/6128013
[2] 2.https://www.semanticscholar.org/paper/A-Study-on-the-Human-Identification-Technique-for-Kim-Moon/bcaa3c8062058c0265a87d607d971cec45577aeb
[3] 3.https://www.researchgate.net/publication/221109333_A_Study_on_the_Human_Identification_Technique_for_Privacy_Protection_in_Intelligent_Video_Surveillance_System
[4] https://core.ac.uk/download/pdf/29471695.pdf
[5] https://link.springer.com/chapter/10.1007/978-1-84882-301-3_7
[6] https://ijmttjournal.org/Volume-1/Issue-1/ijmttjournal-v1i1p8.pdf
[7] Whatson, S. Faster Higher Stronger Secure. ITNOW 2012, 54, 12–15.
[8] Hagmann, J. Security in the Society of Control: The Politics and Practices of Securing Urban Spaces. Int.
[9] Polit. Sociol. 2017, 11, 418–438.
[10] Park, N.; Lee, D. Electronic identity information hiding methods using a secret sharing scheme in
[11] multimedia-centric internet of things environment. Pers. Ubiquitous Comput. 2018, 22, 3–10.
[12] Yan, J.; Zhang, X.; Lei, Z.; Li, S.Z. Face detection by structural models. Image Vis. Comput. 2014, 32, 790–799.
[13] Chen, W.-G.; Ling, Y. Noise variance adaptive successive elimination algorithm for block motion
[14] estimation: Application for video surveillance. IET Signal Process. 2007, 1, 150–155.
[15] Park, N.; Kang, N. Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 2016, 16, 20.
[16] Ziani, A.; Motamed, C.; Noyer, J.-C. Temporal reasoning for scenario recognition in video-
[17] surveillanceusing Bayesian networks. IET Comput. Vis. 2008, 2, 99–107.
[18] Lee, K.; Yeuk, H.; Kim, J.; Park, H.; Yim, K. An efficient key management solution for privacy masking,
[19] restoring and user authentication for video surveillance servers. Comput. Stand. Interfaces 2016, 44, 137–143.
[20] Vijayakumar, P.; Chang, V.; Deborah, L.J.; Balusamy, B.; Shynu, P.G. Computationally efficient privacy
[21] preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future
[22] Gener. Comput. Syst. 2018, 78, 943–955.
[23] Diaz, J.; Arroyo, D.; Rodriguez, F.B. A formal methodology for integral security design and verification of
[24] networkprotocols. J. Syst. Softw. 2014, 89, 87–98.
[25] Lee, K.; Yim, K.; Mikki, M.A. A secure framework of the surveillance video network integrating
[26] heterogeneous video formats and protocols. Comput. Math. Appl. 2012, 63, 525–535.
[27] Gope, P. LAAP: Lightweight Anonymous Authentication Protocol for D2D-Aided Fog Computing
[28] Paradigm. Comput. Secur. 2019, 86, 223–237.
[29] Choi, L.K.; Bovik, A.C. Video quality assessment accounting for temporal visual masking of local flicker.
[30] Signal Process. Image Commun. 2018, 67, 182–198.
[31] Koscinski, I.; El Alaoui-Lasmaili, K.; Di Patrizio, P.; Kohler, C. Videos for embryology teaching. power and
[32] weakness of an innovative tool. Morphologie 2019, 103, 72–79.