communication between the surveillance camera
and the server, because the image would not appear
on the monitor, if the communication were
blocked. The administrator can deal with this
attack by setting in place a mechanism for
reporting unsuccessful communication.
Attack 4: Falsification of the data sent to the server
by the surveillance camera can be prevented using
the encryption function of the surveillance camera.
To detect falsification of the data sent by the access
points, the server produces a signature of the data
of the server. Therefore, user H can detect the
falsification easily. On the other hand, detection of
falsified data sent by user H is easy. The server can
verify it by verifying the data. The surveillant must
deal with user H, if the server fails several times to
verify the signature of the same device.
Attack 5: Detection of falsification of the image
stored in the server can be achieved by producing
a signature on the image data where the server
stores the image. The key for this signature must be
securely managed by the administrator. This
signature must be decided at a predetermined time
interval (for example, each day). An alternate
method is that the administrator encrypts the image
using his secret key. In this manner, falsification
can be prevented.
6 CONCLUSIONS
In this paper, we proposed a new surveillance camera
system that balances the requirements of both privacy
protection and criminal investigations. Further, we
presented the communication protocol of the
proposed system. We also assumed possible attacks
to the system and presented security measures these
attacks.
REFERENCES
Warren, S., Brandeis, L., 1890. The Righ to Privacy.
Harvard Law Review. Vol.4, pp.193.
Westin, A., 1967. Privacy and Freedom. Washington and
Lee Law Review, vol.25, pp.197-170.
Murakami, Y., 2004. Privacy Issues in the Ubiquitous
Information Society and Law in Japan. Systems, Man
and Cybernetics, 2004 IEEE International Conference
on, vol.6, pp.5645-5650.
Xiaoyi, Y., Chinomi, K., Koshimizu, T., Nitta, N., Ito, Y.,
Babaguchi, N., 2008. Privacy protecting visual
processing for secure video surveillance. 15th IEEE
International Conference on, pp.1672-1675.
Chaum, D., Heyast, E., 1991. Group Signatures
Proceedings of Eurocrypt 1991, vol.547, pp.257-265.
Boneh, D, Boyen, X, Shacham, H., 2004. Short Group
Signatures. Advances in Cryptology -CRYPTO 2004-,
pp.41-55.
Kusama, Y., Kang, H., Iwamura, K., 2015. Recoverable
original video for mosaic system.(japanese).
Xuan, G., Shi, G., Ni, Z., Chai, , Z., Cui, X., Tong, X., 2007.
Reversible Data Hiding for JPEG Images Based on
Histogram Pairs. Image Analysis and Recognition,
pp.715-727.
Cong, L., Z., Zhuang, W., 2001. Non-line-of-sight error
mitigation in TDOA mobile location. GLOBECOM’01.
IEEE, vol.1, pp.680-684.
Gezici, Z., 2008. A Survey on Wireless Position Estimation.
Wireless Personal Communications, vol.44, pp.263-
282.
Comaniciu, D., Ramesh, V., 2000. Real-time tracking of
non-rigid objects using mean shift. Computer Vision
and Pattern Recognition, 2000. Proceedings. IEEE
Conference on, vol.2, pp.142-149.
Ross, D., Lim, J., Lin, R., Yang, M., 2008. Incremental
Learning for Robust Visual Tracking. International
Journal of Computer Vision, vol.77, pp.125-141.
Viola, P., Jones, M., 2004. Robust Real-Time Face
Detection. International Journal of Computer Vision,
vol.57, pp137-154.
Wright, J., Yang, Y., Ganesh, A., Sastry, S., Yi M., 2008.
Robust Face Recognition via Sparse Representation.
Pattern Analysis and Machine Intelligence, IEEE
Transaction on, vol.31, pp.210-227.
Andrew, S., 2009. Privacy Protection in Video Surveillance
System. Protecting Privacy in Video Surveillance,
pp.35-47.
Writefix. Security Cameras and Privacy.
http://writefix.com/?page_id=1584.
ICE-B2015-InternationalConferenceone-Business
48