Research on Video Encryption and Privacy Protection in Cloud Monitoring System Based on H.264

Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xuan Wang ◽  
Jingjing Xu ◽  
Jiaxin Wang ◽  
Wei Ou ◽  
Jung Yoon Kim ◽  
...  

With the continuous development and application of monitoring technology, which involves increasingly more sensitive information, the global demand for video monitoring systems has surged. As a result, video monitoring technology has received widespread attention both at home and abroad. Traditional video monitoring systems experience security threats, with differing levels of severity, in terms of attack, storage, transmission, etc., which results in different degrees of damage to users’ rights. Therefore, we propose a blockchain-SM-based video monitoring system called BSVMS. For the front-end device invasion risk, internal attack risk, and security storage problem of the monitoring system, we use commercial cryptography algorithms to complete the encryption processing of images through a visual change network in the imaging process, thereby ensuring the security of the video data from the source. To address the problem that the video monitoring application software and data are vulnerable to damage, we use blockchain technologies that are tamper-proof and traceable to build a trustworthy video monitoring system. In the system, no member can query the original monitoring data. To address the security issues in network transmission, we use a commercial cryptography algorithm for multilayer encryption to ensure the security of data during transmission, guarantee the confidentiality of the system, and realize domestic autonomous control. We then conduct tests and security analysis of the encryption and decryption efficiency of the SM4 algorithm used in the system, the blockchain performance, and the overall performance. The experimental results show that in this system environment, the SM4 algorithm encryption and decryption efficiency is better than other algorithms and that the blockchain used meets industry standards.


2014 ◽  
Vol 543-547 ◽  
pp. 891-894
Author(s):  
Lian Jun Zhang ◽  
Shi Jie Liu

The bus video monitoring system is composed by WCDMA transmission system, video server system, system monitoring center and outreach system. By WCDMA wireless transmission module achieving real time video data return, while using VPDN network technology. Using of the DVS video server and by WCDMA transmission system, the monitoring videos information will be transmitted to the monitoring center rapidly and in real time. The monitoring center can remotely monitor, manage, and dispatch the bus. The results demonstrating this system has good real time transmission ability.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Hong-Chan Chang ◽  
Shang-Chih Lin ◽  
Cheng-Chien Kuo ◽  
Hao-Ping Yu

This study endeavors to develop a cloud monitoring system for solar plants. This system incorporates numerous subsystems, such as a geographic information system, an instantaneous power-consumption information system, a reporting system, and a failure diagnosis system. Visual C# was integrated with ASP.NET and SQL technologies for the proposed monitoring system. A user interface for database management system was developed to enable users to access solar power information and management systems. In addition, by using peer-to-peer (P2P) streaming technology and audio/video encoding/decoding technology, real-time video data can be transmitted to the client end, providing instantaneous and direct information. Regarding smart failure diagnosis, the proposed system employs the support vector machine (SVM) theory to train failure mathematical models. The solar power data are provided to the SVM for analysis in order to determine the failure types and subsequently eliminate failures at an early stage. The cloud energy-management platform developed in this study not only enhances the management and maintenance efficiency of solar power plants but also increases the market competitiveness of solar power generation and renewable energy.


2013 ◽  
Vol 765-767 ◽  
pp. 615-619
Author(s):  
Xue Yan Zhang ◽  
Hu Chao Deng ◽  
Liang Wei Chen

To meet the requirement of multimedia video transmission's safety and real-time, this paper provides a conclusion based on video encryption schemes of the encryption algorithm. The solution sorts video data into VLC(variable length code) and FLC(fix-length code) ,only choose to reconstruction images FLC compared to encrypt the important element of the operation. The analysis and the simulation results show that the encryption scheme is not only high safety but also low cost system.


2013 ◽  
Vol 380-384 ◽  
pp. 790-793
Author(s):  
Min Feng ◽  
Jie Sun ◽  
Yin Yang Zhang

According to some bottleneck problems of the communication network bandwidth in wireless video transmission, a design scheme of real-time traffic video monitoring system based on 3G network is put forward in this paper. The design of hardware and the software realization of the system process are mainly introduced. TMS320DM8168 is selected to build the hardware platform in this system. H.264 video encoder is integrated internally. The real-time transmission of video data is sent to the remote monitoring center through the 3G network to improve the video transmission quality. The system meets the requirements of video transmission applied in automobiles.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Tingting Yang ◽  
Yangyang Li ◽  
Chengzhe Lai ◽  
Jie Dong ◽  
Minghua Xia

Depending on the actual demand of maritime security, this paper analyzes the specific requirements of video encryption algorithm for maritime monitoring system. Based on the technology of Internet of things, the intelligent monitoring system of unmanned surface vessels (USV) is designed and realized, and the security technology and network technology of the Internet of things are adopted. The USV are utilized to monitor and collect information on the sea, which is critical to maritime security. Once the video data were captured by pirates and criminals during the transmission, the security of the sea will be affected awfully. The shortcomings of traditional algorithms are as follows: the encryption degree is not high, computing cost is expensive, and video data is intercepted and captured easily during the transmission process. In order to overcome the disadvantages, a novel encryption algorithm, i.e., the improved Hill encryption algorithm, is proposed to deal with the security problems of the unmanned video monitoring system in this paper. Specifically, the Hill algorithm of classical cryptography is transplanted into image encryption, using an invertible matrix as the key to realize the encryption of image matrix. The improved Hill encryption algorithm combines with the process of video compression and regulates the parameters of the encryption process according to the content of the video image and overcomes the disadvantages that exist in the traditional encryption algorithm and decreases the computation time of the inverse matrix so that the comprehensive performance of the algorithm is optimal with different image information. Experiments results validate the favorable performance of the proposed improved encryption algorithm.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Cheng-Jian Lin ◽  
Shiou-Yun Jeng ◽  
Hong-Wei Lioa

In recent years, vehicle detection and classification have become essential tasks of intelligent transportation systems, and real-time, accurate vehicle detection from image and video data for traffic monitoring remains challenging. The most noteworthy challenges are real-time system operation to accurately locate and classify vehicles in traffic flows and working around total occlusions that hinder vehicle tracking. For real-time traffic monitoring, we present a traffic monitoring approach that overcomes the abovementioned challenges by employing convolutional neural networks that utilize You Only Look Once (YOLO). A real-time traffic monitoring system has been developed, and it has attracted significant attention from traffic management departments. Digitally processing and analyzing these videos in real time is crucial for extracting reliable data on traffic flow. Therefore, this study presents a real-time traffic monitoring system based on a virtual detection zone, Gaussian mixture model (GMM), and YOLO to increase the vehicle counting and classification efficiency. GMM and a virtual detection zone are used for vehicle counting, and YOLO is used to classify vehicles. Moreover, the distance and time traveled by a vehicle are used to estimate the speed of the vehicle. In this study, the Montevideo Audio and Video Dataset (MAVD), the GARM Road-Traffic Monitoring data set (GRAM-RTM), and our collection data sets are used to verify the proposed method. Experimental results indicate that the proposed method with YOLOv4 achieved the highest classification accuracy of 98.91% and 99.5% in MAVD and GRAM-RTM data sets, respectively. Moreover, the proposed method with YOLOv4 also achieves the highest classification accuracy of 99.1%, 98.6%, and 98% in daytime, night time, and rainy day, respectively. In addition, the average absolute percentage error of vehicle speed estimation with the proposed method is about 7.6%.


2015 ◽  
Vol 75 (1) ◽  
Author(s):  
Ali Abdulgader Mohamed ◽  
Mahamod Ismail ◽  
Nasharuddin Zainal

With rapid growth in communication techniques and multimedia application, security is becoming more important for multimedia data storage or transmission. Traditional encryption algorithm such as Advance Encryption Standard (AES) and Data Encryption Standard (DES) are not suitable for video data because it caused large computational overhead and reduce the MPEG compression efficiency. The encryption algorithm that has less computation overhead is needed. The proposed algorithm combines encryption process with MPEG video compression. Some modifications of the RC4 algorithm were proposed in this paper to enhance the performance of video encryption algorithm in terms of encryption time, compression ratio and to provide accepted level of the security. The modification of the RC4 algorithm depends on the maximum value of the plain text, chaotic map and circular shift operation. This modification will reduce the number of iteration in the Key scheduling Algorithm (KSA) and make the Pseudo Random Generator Algorithm (PRGA) depend on initial condition of chaotic maps to provide the strong shuffling inside the PRGA. The random rotation technique based on chaotic map is proposed to increase security of MPEG video. This technique depends on the value generated from chaotic map to rotate the Y blocks in I frame. The experimental results indicate that the proposed method provided better encryption times and provides sufficient level of the security. Thus the proposed method is suitable to protect the MPEG video with minimizing the overhead. 


Sign in / Sign up

Export Citation Format

Share Document