Securing Surveillance Data Using Incremental Cryptography

被引:0
|
作者
Antony, Lissiyas [1 ]
Sobhana, N., V [1 ]
机构
[1] Rajiv Gandhi Inst Technol, Kottayam, Kerala, India
关键词
Incremental cryptography; Image encryption; Encryption; Security; Real time surveillance;
D O I
10.1007/978-3-030-96302-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Incremental cryptography is applicable for an environment wherein the data going through cryptographic changes are modified variants of data which have previously gone through similar cryptographic changes. We implemented a secure surveillance image encryption technique using incremental cryptography. Surveillance systems are generally used for real-time abnormal event detection and autonomous video analysis. Video and real-time images captured by surveillance cameras often contain personally identifiable information, which must be protected by privacy, and sometimes contains sensitive information, such as surveillance locations. Here we consider surveillance images which can exploit the verifiable truth that constant video frames generally have only minor differences. A novel incremental symmetric encryption technique is proposed on this paper. Using incremental encryption, it is possible to rapidly refresh the computational result for a newly updated photo. Thus we can reduce the time complexity. Significant hypothetical consideration has been given to major cryptographic primitives such as digital signatures and message authentication code. The meaning of protection and security has been explored in various works. In this investigation, the attention is on incremental encryption to see how it can assist securing surveillance information.
引用
收藏
页码:216 / 225
页数:10
相关论文
共 50 条
  • [1] Securing Network-on-Chip Using Incremental Cryptography
    Charles, Subodha
    Mishra, Prabhat
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 168 - 175
  • [2] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [3] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [4] Securing EPR Data Using Cryptography and Image Watermarking
    Zaz, Youssef
    El Fadil, Lhoussain
    El Kayyali, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2012, 4 (02) : 76 - 87
  • [5] A Review on Cryptography Protocol for Securing Data
    Rahim, Robbi
    1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE, 2019, 1381
  • [6] Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
    Khari, Manju
    Garg, Aditya Kumar
    Gandomi, Amir H.
    Gupta, Rashmi
    Patan, Rizwan
    Balusamy, Balamurugan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01): : 73 - 80
  • [7] Securing Networks using Quantum Cryptography
    Chaudhuri, Kostav
    Singh, Tanya
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [8] Securing the Data in Clouds with Hyperelliptic Curve Cryptography
    Mukhopadhyay, Debajyoti
    Shirwadkar, Ashay
    Gaikar, Pratik
    Agrawal, Tanmay
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 201 - 205
  • [9] Securing biometric data by combining watermarking and cryptography
    Ouslim, Mohamed
    Sabri, Ahmed
    Mouhadjer, Hassan
    2013 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN BIOMEDICAL ENGINEERING (ABME 2013), 2013, : 179 - 182
  • [10] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589