Securing Surveillance Data Using Incremental Cryptography

被引:0
|
作者
Antony, Lissiyas [1 ]
Sobhana, N., V [1 ]
机构
[1] Rajiv Gandhi Inst Technol, Kottayam, Kerala, India
关键词
Incremental cryptography; Image encryption; Encryption; Security; Real time surveillance;
D O I
10.1007/978-3-030-96302-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Incremental cryptography is applicable for an environment wherein the data going through cryptographic changes are modified variants of data which have previously gone through similar cryptographic changes. We implemented a secure surveillance image encryption technique using incremental cryptography. Surveillance systems are generally used for real-time abnormal event detection and autonomous video analysis. Video and real-time images captured by surveillance cameras often contain personally identifiable information, which must be protected by privacy, and sometimes contains sensitive information, such as surveillance locations. Here we consider surveillance images which can exploit the verifiable truth that constant video frames generally have only minor differences. A novel incremental symmetric encryption technique is proposed on this paper. Using incremental encryption, it is possible to rapidly refresh the computational result for a newly updated photo. Thus we can reduce the time complexity. Significant hypothetical consideration has been given to major cryptographic primitives such as digital signatures and message authentication code. The meaning of protection and security has been explored in various works. In this investigation, the attention is on incremental encryption to see how it can assist securing surveillance information.
引用
收藏
页码:216 / 225
页数:10
相关论文
共 50 条
  • [21] On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography
    Bourreau, Hugo
    Guichet, Emeric
    Barrak, Amine
    Simon, Benoit
    Jaafar, Fehmi
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 758 - 759
  • [22] Securing Cloud Computing Environment using a new Trend of Cryptography
    Mohammad, Omer K. Jasim
    Abbas, Safia
    El-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 217 - 224
  • [23] Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, J. M.
    Quaynor, Nii Narku
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 199 - 204
  • [24] Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography
    Zaidan, A. A.
    Othman, Fazidah
    Zaidan, B. B.
    Raji, R. Z.
    Hasan, Ahmed K.
    Naji, A. W.
    WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, 2009, : 259 - +
  • [25] A Novel DNA Sequence Dictionary method for Securing Data in DNA using Spiral Approach and Framework of DNA Cryptography
    Jain, Shipra
    Bhatnagar, Vishal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [26] Implementation Stage for High Securing Cover-File of Hidden Data Using Computation between Cryptography and Steganography
    Zaidan, A. A.
    Zaidan, B. B.
    Abdulrazzaq, M. M.
    Raji, R. Z.
    Mohammed, S. M.
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 482 - 489
  • [27] Securing Topology Control in SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Liu, Xin
    Chen, Jianfei
    Ma, Lei
    Wang, Yong
    Zhang, Hao
    Yu, Hao
    Su, Bing
    Zhang, Fangzhe
    Sun, Lili
    JOURNAL OF SENSORS, 2023, 2023
  • [28] Securing IoT devices: A novel approach using blockchain and quantum cryptography
    Dhar, Shalini
    Khare, Ashish
    Dwivedi, Ashutosh Dhar
    Singh, Rajani
    INTERNET OF THINGS, 2024, 25
  • [29] Role of Threshold Cryptography in Securing MANETs
    Samreen, Aasia
    Hyderv, Syed Irfan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (01): : 106 - 112
  • [30] CRYPTOGRAPHY IS KEY TO SECURING PROPRIETARY INFORMATION
    WATTS, A
    EDN, 1995, 40 (14) : 99 - 102