Detailed Information

Cited 0 time in webofscience Cited 9 time in scopus
Metadata Downloads

An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers

Authors
Lee, KyungroulYeuk, HyeungjunKim, JaeinPark, HyungjoonYim, Kangbin
Issue Date
Feb-2016
Publisher
Elsevier BV
Keywords
Video surveillance system; Key management technique; Privacy masking and restoring; User authentication
Citation
Computer Standards and Interfaces, v.44, pp 137 - 143
Pages
7
Journal Title
Computer Standards and Interfaces
Volume
44
Start Page
137
End Page
143
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9411
DOI
10.1016/j.csi.2015.06.006
ISSN
0920-5489
1872-7018
Abstract
In this paper, we surveyed technical elements of video surveillance systems and proposed several countermeasures to effectively manage a number of keys for image encryption, privacy protection and user authentication. In addition, we proposed several solutions for potential problems that could arise when the system adopts a privacy masking policy for each user. The proposed solutions selectively implement a Kerberos approach, a round keys approach and a double hash chain approach. For secure video surveillance systems, protecting privacy and providing accessibility through strong user authentication and prioritized authorization is expected. (C) 2015 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE