CFP last date
20 May 2024
Reseach Article

Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication

by Quist-Aphetsi Kester, Mohammed Dolapo Asisat, Ozoemena Willis Chibueze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 12
Year of Publication: 2015
Authors: Quist-Aphetsi Kester, Mohammed Dolapo Asisat, Ozoemena Willis Chibueze
10.5120/ijca2015904581

Quist-Aphetsi Kester, Mohammed Dolapo Asisat, Ozoemena Willis Chibueze . Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication. International Journal of Computer Applications. 123, 12 ( August 2015), 7-13. DOI=10.5120/ijca2015904581

@article{ 10.5120/ijca2015904581,
author = { Quist-Aphetsi Kester, Mohammed Dolapo Asisat, Ozoemena Willis Chibueze },
title = { Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 12 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number12/22009-2015904581/ },
doi = { 10.5120/ijca2015904581 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:29.668507+05:30
%A Quist-Aphetsi Kester
%A Mohammed Dolapo Asisat
%A Ozoemena Willis Chibueze
%T Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 12
%P 7-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in today's wireless camera sensor networks is very crucial for authentication of video feeds from appropriate sources. This will ensure the safety and security of the digital video feeds as well as provide means of authenticating the video. These authentication approaches should be able to identify tamper detection. In this paper, we propose an embedding technique for authentication of video feeds obtained from wireless camera sensor networks. These approaches are able make the signals more secured and easily verifiable.

References
  1. Shi, Changgui, Sheng-Yih Wang, and Bharat Bhargava. "MPEG video encryption in real-time using secret key cryptography." In in Proc. Int. Conf. Parallel and Distributed Processing Techniques and Applications. 1999.
  2. Goyal, Vanchhit, Devesh Mishra, and Ankit Agarwal. "A Novel Video Encryption and Decryption Scheme based on Discrete Wavelet Transform and Fractional Fourier Transform." International Journal of Computer Applications 111, no. 3 (2015).
  3. Moyun Li; Cheng Yang; Jiayin Tian, "Video Selective Encryption Based on Hadoop Platform," Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on , vol., no., pp.208,212, 13-14 Feb. 2015
  4. Li, Moyun, Cheng Yang, and Jiayin Tian. "Video Selective Encryption Based on Hadoop Platform." In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, pp. 208-212. IEEE, 2015.
  5. Maniccam, Suchindran S., and Nikolaos G. Bourbakis. "Image and video encryption using SCAN patterns." Pattern Recognition 37, no. 4 (2004): 725-737.
  6. Alfalou, A., C. Brosseau, and N. Abdallah. "Simultaneous compression and encryption of color video images." Optics Communications 338 (2015): 371-379.
  7. Liu, Shaohui, Daniel Bo-Wei Chen, Long Gong, Wen Ji, and Sanghyun Seo. "A Real-Time Video Watermarking Algorithm for Authentication of Small-Business Wireless Surveillance Networks." International Journal of Distributed Sensor Networks 501 (2015): 789536.
  8. Rajab, Lama, Tahani Al-Khatib, and Ali Al Haj. "A Blind DWT-SCHUR Based Digital Video Watermarking Technique." Journal of Software Engineering and Applications 8, no. 04 (2015): 224.
  9. Gaj, Sibaji, Ashish Singh Patel, and Arijit Sur. "Object based watermarking for H. 264/AVC video resistant to rst attacks." Multimedia Tools and Applications (2015): 1-28.
  10. Dutta T, Sur A, Nandi S (2013) Mcrd: Motion coherent region detection in h.264 compressed video. In: Multimedia and Expo (ICME), 2013 IEEE International Conference on, pp 1–6. doi:10.1109/ICME.2013.6607430
  11. Satpute, Snehal, Sunayana Shahane, Shivani Singh, and Manisha Sharma. "An Approach towards Video Steganography Using FZDH (Forbidden Zone Data Hiding)." (2015).
  12. Dixit, M.; Bhide, N.; Khankhoje, S.; Ukarande, R., "Video Steganography," Pervasive Computing (ICPC), 2015 International Conference on , vol., no., pp.1,4, 8-10 Jan. 2015
  13. ShengDun Hu; KinTak, U., "A Novel Video Steganography Based on Non-uniform Rectangular Partition," Computational Science and Engineering (CSE), 2011 IEEE 14th International Conference on , vol., no., pp.57,61, 24-26 Aug. 2011
  14. Bhattacharyya, Souvik, and Gautam Sanyal. "A novel approach of video steganography using pmm." In Wireless Networks and Computational Intelligence, pp. 644-653. Springer Berlin Heidelberg, 2012.
  15. Patel, K.; Rora, K.K.; Singh, K.; Verma, S., "Lazy Wavelet Transform Based Steganography in Video," Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.497,500, 6-8 April 2013
Index Terms

Computer Science
Information Sciences

Keywords

Image processing surveillance security wireless sensor networks intrusion detection systems.