Advertisement

Video Surveillance: A Distributed Approach to Protect Privacy

  • Martin Schaffer
  • Peter Schartner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)

Abstract

The topmost concern of users who are kept under surveillance by a CCTV-System is the loss of their privacy. To gain a high acceptance by the monitored users, we have to assure, that the recorded video-material is only available to a subset of authorized users under exactly previously defined circumstances. In this paper we propose a CCTV video surveillance system providing privacy in a distributed way using threshold multi-party computation. Due to the flexibility of the access structure, we can handle the problem of loosing private-key-shares that are necessary for reconstructing video-material as well as adding new users to the system. If a pre-defined threshold is reached, a shared update of the master secret and the according re-encryption of previously stored ciphertext without revealing the plaintext is provided.

Keywords

Video Surveillance Access Structure Advance Encryption Standard Trusted Third Party Retrieval Phase 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Advanced Encryption Standard (AES). FIPS-Pub 197, NIST (2001)Google Scholar
  2. 2.
    Boyle, M., Edwards, C., Greenberg, S.: The Effects on Filtered Video on Awareness and Privacy. In: CSCW 2000: Proceed. of the 2000 ACM conference on Computer supported cooperative work, Philadephia, PA, USA, pp. 1–10 (2000)Google Scholar
  3. 3.
    Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)Google Scholar
  4. 4.
    ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  5. 5.
    Gennaro, R., et al.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295–310. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  6. 6.
    Goldreich, O., et al.: How to play any mental game – a completeness theorem for protocols with honest majority. In: Proc. 19th ACM STOC, pp. 218–229 (1987)Google Scholar
  7. 7.
    Herzberg, A., et al.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)Google Scholar
  8. 8.
    Hirt, M.: Multi-Party Computation: Efficient Protocols, General Adversaries, and Voting. Ph.D. thesis, ETH Zurich, 2001 Reprint as vol. 3 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag, Konstanz (2001)Google Scholar
  9. 9.
    Collins, R.T., et al.: A System for Video Surveillance and Monitoring. In: Proceedings of the American Nuclear Society (ANS) Eighth International Topical Meeting on Robotics and Remote Systems (1999)Google Scholar
  10. 10.
    Newton, E., Sweeney, L., Malin, B.: Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering 17(2), 232–243 (2005)CrossRefGoogle Scholar
  11. 11.
    Pedersen, T.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  12. 12.
    Pieprzyka, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)CrossRefzbMATHGoogle Scholar
  13. 13.
    Schaffer, M.: Managing Key-Shares in Distributed Public-Key Cryptosystems. Technical Report TR-syssec-05-04, University of Klagenfurt, Austria (August. 2005)Google Scholar
  14. 14.
    Schaffer, M.: Tree-shared Generation of a Secret Value. Technical Report TR-syssec-05-01, University of Klagenfurt, Austria (June 2005)Google Scholar
  15. 15.
    Schaffer, M., Schartner, P.: Hierarchical Key Escrow with Passive Adversaries. Technical Report TR-syssec-05-02, University of Klagenfurt, Austria (June 2005)Google Scholar
  16. 16.
    Senior, A., et al.: Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Research Report RC22886 (W0308-109), August 28 (2003)Google Scholar
  17. 17.
    Shamir, A.: How to share a secret. Comm. of the ACM 11, 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Yao, A.C.: Protocols for secure computation. In: Proceed. of the 23rd IEEE Symposium on Foundations of Computer Security (1982)Google Scholar
  19. 19.
    Zhou, L., et al.: Distributed Blinding for ElGamal Re-encryption. In: Proceed. 25th IEEE Int. Conf. on Distributed Computing Systems, Ohio, June 2005, pp. 815–824 (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Martin Schaffer
    • 1
  • Peter Schartner
    • 1
  1. 1.Computer Science System SecurityUniversity of KlagenfurtAustria

Personalised recommendations