Abstract
Internet-based video surveillance systems are now widespread in the modern e-Society, since they can be used to manage multiple physical security problems in a lot of contexts. Moreover, the growing diffusion of portable device, along with the necessity of keeping specific environments and motion events under control, brought out the need for more flexible and proactive systems, which allow the management of such scenarios. However, most of the state of the art video surveillance systems are known to be unscalable, unreliable, insecure, and do not provide adequate guarantees for user awareness when a determined situation of interest occurs. Furthermore, almost all the currently defined systems, lack in operation flexibility: they are designed for a specific context and can not be easily adapted to the different ones.
In this work, we propose general-purpose video surveillance system, which is fully distributed and accessible through ubiquitous portable devices. Such system, whose architecture is based on a self-organizing overlay network built on top of a mixture of already existing physical network connections, provides an high degree of reliability for the interactions among all its components, and ensures to its users, regardless of where they are located, the ability to receive notifications upon the occurrence of interesting events.
Chapter PDF
References
Valera, M., Velastin, S.: Intelligent distributed surveillance systems: a review. IEE Proceedings Vision, Image and Signal Processing, IET 152(2), 192–204 (2005)
Hu, W., Tan, T., Wang, L., Maybank, S.: A survey on visual surveillance of object motion and behaviors. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 34(3), 334–352 (2004)
Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine 22(2), 38–51 (2005)
Buxton, H., Gong, S.: Visual surveillance in a dynamic and uncertain world. Artificial Intelligence 78(1), 431–459 (1995)
Cucchiara, R., Grana, C., Piccardi, M., Prati, A.: Detecting moving objects, ghosts, and shadows in video streams. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(10), 1337–1342 (2003)
Hartley, R., Zisserman, A.: Multiple view geometry in computer vision, vol. 2. Cambridge University Press (2000)
Forsyth, D.A., Ponce, J.: Computer vision: a modern approach. Prentice Hall Professional Technical Reference (2002)
Parker, J.R.: Algorithms for image processing and computer vision. Wiley Publishing (2010)
Moeslund, T.B., Granum, E.: A survey of computer vision-based human motion capture. Computer Vision and Image Understanding 81(3), 231–268 (2001)
Kornecki, A.: Middleware for distributed video surveillance. IEEE Distributed Systems Online 9(2), 1 (2008)
Cucchiara, R., Grana, C., Prati, A., Vezzani, R.: Computer vision techniques for PDA accessibility of in-house video surveillance. In: First ACM SIGMM International Workshop on Video Surveillance, IWVS 2003, pp. 87–97. ACM, New York (2003)
Javed, O., Rasheed, Z., Alatas, O., Shah, M.: KNIGHT trade;: a real time surveillance system for multiple and non-overlapping cameras. In: Proceedings of 2003 International Conference on Multimedia and Expo, ICME 2003, vol. 1, pp. 649–652 (July 2003)
Comaniciu, D., Berton, F., Ramesh, V.: Adaptive Resolution System for Distributed Surveillance. Real-Time Imaging 8(5), 427–437 (2002)
Cucchiara, R., Prati, A., Vezzani, R.: A multi-camera vision system for fall detection and alarm generation. Expert Systems 24(5), 334–345 (2007)
Ostheimer, D., Lemay, S., Ghazal, M., Mayisela, D., Amer, A., Dagba, P.F.: A modular distributed video surveillance system over IP. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2006, pp. 518–521. IEEE (2006)
Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F.: Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds.) E-Commerce and Web Technologies. LNBIP, vol. 61, pp. 73–84. Springer, Heidelberg (2010)
Yuan, X., Sun, Z., Varol, Y., Bebis, G.: A distributed visual surveillance system. In: Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 199–204. IEEE (2003)
Dias, H., Rocha, J., Silva, P., Leao, C., Reis, L.P.: Distributed surveillance system. In: Portuguese Conference on Artificial Intelligence, EPIA 2005, pp. 257–261. IEEE (2005)
Desurmont, X., Bastide, A., Czyz, J., Parisot, C., Delaigle, J.F., Macq, B.: A general purpose system for distributed surveillance and communication. In: Intelligent Distributed Video Surveillance Systems, pp. 121–156 (2006)
Wu, Y.S., Chang, Y.S., Juang, T.Y., Yen, J.S.: An Architecture for Video Surveillance Service Based on P2P and Cloud Computing. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 661–666. IEEE (2012)
Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., You, I.: A Secure Distributed Video Surveillance System Based on Portable Devices. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 403–415. Springer, Heidelberg (2012)
Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., Yim, K., You, I.: Secure and distributed video surveillance via portable devices. Journal of Ambient Intelligence and Humanized Computing, 1–9 (2013)
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Rhea, S.C., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a DHT. Computer Science Division, University of California (2003)
Stutzbach, D., Rejaie, R.: Improving lookup performance over a widely-deployed DHT. In: Proc. Infocom, vol. 6 (2006)
Vixie, P., Thomson, S., Rekhter, Y., Bound, J.: Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136 (Proposed Standard), Updated by RFCs 3007, 4035, 4033, 4034 (April 1997)
Bradski, G.: The OpenCV library. Doctor Dobbs Journal 25(11), 120–126 (2000)
Bradski, G., Kaehler, A.: Learning OpenCV: Computer vision with the OpenCV library. O’Reilly Media, Incorporated (2008)
Wijnhoven, R., Jaspers, E., et al.: Flexible surveillance system architecture for prototyping video content analysis algorithms. In: International Society for Optics and Photonics Electronic Imaging 2006, p. 60730R (2006)
Castiglione, A., De Prisco, R., De Santis, A.: Do you trust your phone? In: Di Noia, T., Buccafurri, F. (eds.) EC-Web 2009. LNCS, vol. 5692, pp. 50–61. Springer, Heidelberg (2009)
Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: Proceedings of the 1st International Conference on Scalable Information Systems, p. 47. ACM (2006)
Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Urdaneta, G., Pierre, G., Steen, M.V.: A survey of DHT security techniques. ACM Computing Surveys (CSUR) 43(2), 8 (2011)
Wang, P., Tyra, J., Chan-Tin, E., Malchow, T., Kune, D.F., Hopper, N., Kim, Y.: Attacking the KAD network. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, p. 23. ACM (2008)
Irvine, D.: Kademlia DHT with NAT traversal, http://code.google.com/p/maidsafe-dht/ (accessed June 16, 2013)
Castiglione, A., Cattaneo, G., Cembalo, M., De Santis, A., Faruolo, P., Petagna, F., Ferraro Petrillo, U.: Engineering a secure mobile messaging framework. Computers & Security 31(6), 771–781 (2012)
De Santis, A., Castiglione, A., Cattaneo, G., Cembalo, M., Petagna, F., Ferraro Petrillo, U.: An Extensible Framework for Efficient Secure SMS. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 843–850 (2010)
Ramsdell, B.: S/MIME version 3 message specification (1999)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Castiglione, A., D’Ambrosio, C., De Santis, A., Palmieri, F. (2013). Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds) Security Engineering and Intelligence Informatics. CD-ARES 2013. Lecture Notes in Computer Science, vol 8128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40588-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-40588-4_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40587-7
Online ISBN: 978-3-642-40588-4
eBook Packages: Computer ScienceComputer Science (R0)