Abstract
The Internet of things is a new technological revolution following the computer and Internet. It aims to connect all physical objects existing in the world and forms a network with everything. In recent years, smart home gradually enters into our life. Smart home uses the Internet of things technology to connect all kinds of devices in the home, to achieve a smart home environment. Although the development of smart home has brought a qualitative leap to people’s life, there are many problems in security. Privacy security is one of the challenges to the smart home environment. Attackers can intrude various smart devices in the smart home environment, to achieve the purpose of stealing users’ personal information and privacy. Among these devices, smart cameras are the most intruded frequently. Since many cameras are installed in users’ homes to achieve real-time monitoring of the environment, but the existence of these cameras provides a channel to get information for attackers. In recent years, the leak of video privacy is emerging in an endless stream. According to the researches about privacy protection, this paper proposes a new scheme to selectively encrypt the video captured by the cameras through machine learning technology, so as to protect the personal privacy of users and improve the security of the smart home environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiaolei, D.: Advances of privacy preservation in internet of things. J. Comput. Res. Dev. 52(10), 2341–2352 (2015)
Ping, Q., Meng, W.: Survey on privacy preservation in IoT. Appl. Res. Comput. 30(01), 1001–1008 (2013)
Zhihao, Y., Li, M., Chunping, H.: Internet of Things Security Technology. Tsinghua University Press, Beijing (2016)
Masum Sadique, K., Rahmani, R.: Towards security on internet of things: applications and challenges in technology. Procedia Comput. Sci. 141, 199–206 (2018)
Miorandim, D., Sicari, S., De Pellegrini, F.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Yinghui, Z., Robert, H.: Secure smart health with privacy-aware aggregate authentication and access control in internet of things. J. Netw. Comput. Appl. 123, 89–100 (2018)
Lu, Z., Jiguo, Y., Chuanqing, H., Honglu, J.: Fine-grained access control with privacy support and network service optimization in ad hoc networks. Procedia Comput. Sci. 129, 372–374 (2018)
Kevin, A., Katia, O., Leland, M.: Solar-powered, wireless smart camera network: an IoT solution for outdoor video monitoring. Comput. Commun. 118, 217–233 (2018)
Charlie, W., Tom, H., et al.: Benefits and risks of smart home technologies. Energy Policy 103, 72–83 (2017)
Frédéric, B., Kevin, B., Gaboury, S.: Tracking objects within a smart home. Expert Syst. Appl. 113, 428–442 (2018)
Burrows, A., Coyle, D., GoobermanHill, R.: Privacy, boundaries and smart homes for health: an ethnographic study. Health Place 50, 112–118 (2018)
Min, L., Wenbin, G., Wei, C.: Smart home: architecture, technologies and systems. Procedia Comput. Sci. 131, 393–400 (2018)
Hui, X., Xiaojun, T., Xianwen, M.: An efficient chaos pseudo-random number generator applied to video encryption. Optic 127, 9305–9319 (2016)
Aasha Nandhini, S., Radha, S.: Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor network. Comput. Electr. Eng. 60, 175–192 (2017)
Hamidouche, W., Farajallah, M., Sidaty, N.: Real-time selective video encryption based on the chaos system in scalable HEVC extension. Signal Process. Image Commun. 58, 73–86 (2017)
Mousa, F., Wassim, H., Olivier, D.: ROI encryption for the HEVC coded video centents. In: IEEE International Conference on Image Processing, ICIP, Spain, Barchalona, pp. 3096–3100 (2015)
Santiago, L., Rafael, M.: Using machine learning to detect and localize concealed objects in passive millimeter-wave image. Eng. Appl. Artif. Intell. 67, 81–90 (2018)
Assem Mahmoud, A., Mai, A.: A time-efficient optimization for robust image watermarking using machine learning. Expert Syst. Appl. 100, 197–210 (2018)
Sheng, H., Lambert, S.: Deep adaptive learning for writer identification based on single handwritten word images. Pattern Recogn. 88, 64–74 (2019)
Shengtao, Y., Cheolkon, J., Qiaozhou, L.: HEVC encoder optimization for HDR video coding based on irregularity concealment effect. Sig. Process. Image Commun. 64, 68–77 (2018)
Sami, J., Mohamed-Chaker, L., Jamel Belhadj, T.: Low complexity intra prediction mode decision for 3D-HEVC depth coding. Signal Process. Image Commun. 67, 34–47 (2018)
Xiaojie, L., Wenpeng, D., Yunhui, S.: Content adaptive interpolation filters based on HEVC framework. J. Vis. Commun. Image R. 56, 131–138 (2018)
Xing, X., Xiaopeng, S., Chunhui, D.: Captcha recognition based on deep learning. J. Test Measur. Technol. 33(02), 138–142 (2019)
Hong, H., Liang, P., Zhongzhi, S.: Image matting in the perception granular deep learning. Knowl.-Based Syst. 102, 51–63 (2016)
Yuan, J., Xingxing, H., Yaoqiang, X., Da, C.: Multi-criteria active deep learning for image classification. Knowl.-Based Syst. 172, 86–94 (2019)
Acknowledgments
This paper is supported by NSFC under Grant No. 61672350 and 61373149, NSSFC under Grant No.16BGL003, Ministry of Education Fund under Grant No. 39120K178038 and 14YJA880033, SIT Collaborative innovation platform under Grant No. 3921NH166033, and SIT Foundation for Distinguished Scholars under Grant No. 39120K176049. We are also grateful for the support of the National Natural Science Foundation of China (61170227).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xue, Q. et al. (2019). A Video-Selection-Encryption Privacy Protection Scheme Based on Machine Learning in Smart Home Environment. In: Han, S., Ye, L., Meng, W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-22971-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22970-2
Online ISBN: 978-3-030-22971-9
eBook Packages: Computer ScienceComputer Science (R0)