ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment

  • Authors

    • Dong hyeok Lee
    • Nam je. Park
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.13873
  • Virtual Facial, Privacy Protection, Intelligent CCT, Big Data, CCTV
  • Background/Objectives: Big data environment is being realized. Recently, intelligent public safety environment on the foundation of the image processing technique based on big data is being introduced, and accordingly, processing CCTV images is becoming more important day by day.

    Methods/Statistical analysis: In this paper, an efficient technique to send image information for mass cloud storage environment was proposed. With the offered method, only the ROI area is extracted and partial object images are transmitted, and it has the strengths of higher efficiency and protected privacy with the application of a masking technique.

    Findings: it is general to apply the masking technique partially to face information, and in this study, the privacy of the image data registered in the cloud storage was to be protected based on this masking technique, and an efficient data transmission structure grounded on ROI area extraction was proposed.

    Improvements/Applications: With the offered method, only the ROI area is extracted and partial object images are transmitted, and it has the strengths of higher efficiency and protected privacy with the application of a masking technique.

     

     

  • References

    1. [1] S. Aramvith, S. Pumrin, T. Chalidabhongse, and S.Siddhichai, "Video Processing and Analysis for Surveillance Applications", in Proc. Int. Symp.Intelligent Signal Processing and Communication Systems pp.607-610, 2009.

      [2] Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim, WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", LNCS, Advanced Web and Network Technologies and Applications, 2016, Vol.3842, pp.741-748.

      [3] H. M. Moon and S. B. Pan, "A New Human Identification Method for Intelligent Video Surveillance System", in Proc. IEEE Int. Conf. Computer Communications and Networks, Switzerland, Aug. 2010.Park, J., Shin, S., Kang, N., Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things, J. Korea Inf. Commun. Soc., 2013, 38, pp.707–714.

      [4] Hae-Min Moon, Sung-Bum Pan, "The Analysis of De-identification for Privacy Protection in Intelligent Video Surveillance System", Journal of Korean Institute of Information Technology 9(7), pp.189-200, 2011.7.

      [5] Park N, Bang H-C, Mobile middleware platform for securevessel traffic system in IoT service environment, Security Communication Network, 2016, 9(6), pp.500–512.

      [6] H. M. Moon, C. H. Seo, Y. W. Chung, and S. B.Pan, "Privacy Protection Technology in Video Surveillance System", in Proc. Int. Conf. Embedded and Multimedia Computing, pp. 160-165, Dec. 2009.

      [7] Lee D, Park N, Geocasting-based synchronization ofAlmanac on the maritime cloud for distributed smart surveillance, J Supercomput, 2016, 73(3), pp.1103–1118.

      [8] Park N, Hu H, Jin Q, Security and privacy mechanisms forsensor middleware and application in internet of things (IoT), IntJ Distrib Sens Netw, 2016, Article 2965438.

      [9] Do-Kim Gwon Woo, Han Jong Wook, Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 1623-1624, 2009.

      [10] Park N, Kang N, Mutual authentication scheme in secureinternet of things technology for comfortable lifestyle, Sensors, 2016, 16(1), pp.1–16.

      [11] Yeonghae Ko, Namje Park, A Study of IT Centered Smart Grid's STEAM Curriculum and Class for 3rd and 4th Graders in Elementary School, Journal of the korean association of information education, 2013, Vol.17 No.2 pp.167-175.

      [12] Jaewan Shin, Shin Dong Kyoo, Shin Dong Il, "Design of Brain-Computer Interface System for User Intention Recognition", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, 2013.6, pp. 790-791

      [13] Park N, Kim M, Implementation of load management application system using smart grid privacy policy in energy management service environment, Clust Comput, 2014, 17(3), pp.653–664.

      [14] Chang Gi Kim, Jeong Min Seo, "An Design and Implementation of Navigation System for Visually Impaired Persons Based on Smart Mobile Devices", JOURNAL OF THE KOREA CONTENTS ASSOCIATION, 2015, 15(1), pp.24-30.

      [15] Park N, Implementation of inter-VTS data exchange formatprotocol based on mobile platform for next-generation vessel trafficservice system, Int Inf Inst (Tokyo) Inf, 2014, 17(10A), pp.4847–4856.

      [16] Dong-Eun Kim, Kwee-Bo Sim, "A Study on the Relation between EEG and Strength for Artificial Hand Control", Proceedings of Symposium of the Korean Institute of Intelligent Systems, 2013.10, pp.121-122.

      [17] Park N, Park J, Kim H, Inter-authentication and sessionkey sharing procedure for secure M2M/IoT environment, Int InfInst (Tokyo) Inf, 2015, 18(1), pp.261–266.

      [18] Dong-Eun Kim, Je-Hun Yu, Kwee-Bo Sim, "EEG Feature Classification for Precise Motion Control of Artificial Hand", Journal of Korean Institute of Intelligent Systems 25(1), 2015.02, pp.29-34

      [19] Park N, Implementation of inter-VTS data exchange formatprotocol based on mobile platform for next-generation vessel trafficservice system, Int Inf Inst (Tokyo) Inf, 2014, 17(10A), pp.4847–4856.

      [20] Luo, Ying, Shuiming Ye, and S. Cheung Sen-ching, "Anonymous subject identification in privacy-aware video surveillance." Multimedia and Expo (ICME), 2010 IEEE International Conference on. IEEE, 2010.

      [21] Park N, Implementation of terminal middleware platformfor mobile RFID computing, Int J Ad Hoc Ubiquitous Comput, 2011, 8(4), pp.205–219.

      [22] Lee Hyun Ju, Shin Dong Il, Shin Dong Kyoo, "A Study on the system design for analysis of EEG signals", Proceedings of Symposium of the Korean Institute of communications and Information Sciences , 2014, pp.610-611

      [23] Park N, Performance analysis for VTS-based dataexchange protocol in e-navigation environment. Int J MultimedUbiquitous Eng., 2016, 11(1), pp.337–344.

      [24] Yong-Hee Lee, Chun-Ho Choi, “Pattern classification of the synchronized EEG records by an auditory stimulus for human –computer interfaceâ€, Journal of the Korea Institute of Information and Communication Engineering, 2008, 12 (12) , pp. 2349-2356.

  • Downloads

  • How to Cite

    hyeok Lee, D., & je. Park, N. (2018). ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment. International Journal of Engineering & Technology, 7(2.33), 151-154. https://doi.org/10.14419/ijet.v7i2.33.13873