AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jihye | - |
dc.contributor.author | Lee, Jiwon | - |
dc.contributor.author | Ko, Hankyung | - |
dc.contributor.author | Oh, Donghwan | - |
dc.contributor.author | Han, Semin | - |
dc.contributor.author | Jeong, Gwonho | - |
dc.contributor.author | Oh, Hyunok | - |
dc.date.accessioned | 2022-07-09T03:43:25Z | - |
dc.date.available | 2022-07-09T03:43:25Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2019-10 | - |
dc.identifier.issn | 1539-9087 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/147037 | - |
dc.description.abstract | As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. It is challenging to satisfy both (personal) privacy and authenticity of a video simultaneously, since the privacy requires modifications (e.g., partial deletions) of an original video image while the authenticity does not allow any modifications of the original image. This paper proposes a novel method to convert an encryption scheme to support partial decryption with a constant number of keys and construct a privacy-aware authentication scheme by combining with a signature scheme. The security of our proposed scheme is implied by the security of the underlying encryption and signature schemes. Experimental results show that the proposed scheme can handle the UHD video stream with more than 17 fps on a real embedded system, which validates the practicality of the proposed scheme. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Oh, Hyunok | - |
dc.identifier.doi | 10.1145/3358195 | - |
dc.identifier.scopusid | 2-s2.0-85073164568 | - |
dc.identifier.wosid | 000491238700018 | - |
dc.identifier.bibliographicCitation | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.18, no.5SI, pp.1 - 17 | - |
dc.relation.isPartOf | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS | - |
dc.citation.title | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS | - |
dc.citation.volume | 18 | - |
dc.citation.number | 5SI | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 17 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Software Engineering | - |
dc.subject.keywordPlus | DIGITAL SIGNATURE | - |
dc.subject.keywordPlus | WATERMARKING | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | forward-secure signature | - |
dc.subject.keywordAuthor | video | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3358195 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.