Tony Thomas, S. Emmanuel, Peng Zhang, M. Kankanhalli
{"title":"基于中国剩余定理的高效监控视频传输认证机制","authors":"Tony Thomas, S. Emmanuel, Peng Zhang, M. Kankanhalli","doi":"10.1109/AVSS.2010.13","DOIUrl":null,"url":null,"abstract":"Now-a-days, surveillance cameras have been widely deployedin various security applications. In many surveillanceapplications, the background changes very slowly andthe foreground objects occupy only a relatively small portionof a video frame. In these type of applications, an efficientsolution for transmissions over bandwidth-limited networksis to send only the foreground objects for every framein real time while the background is sent occasionally. Atthe receiving end of the transmission, the objects and themost recent background can be fused together and the originalframe can be reconstructed. However, protecting theauthenticity of the video becomes more challenging in thiscase as a malicious entity can modify/replace/remove the individualforeground objects and background in the video. Inthis paper, we propose a Chinese remainder theorem basedwatermarking mechanism for protecting the authenticity ofvideos transmitted or stored as objects and background.Our mechanism ensures the authenticity between video objectsand their associated background.","PeriodicalId":415758,"journal":{"name":"2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission\",\"authors\":\"Tony Thomas, S. Emmanuel, Peng Zhang, M. Kankanhalli\",\"doi\":\"10.1109/AVSS.2010.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now-a-days, surveillance cameras have been widely deployedin various security applications. In many surveillanceapplications, the background changes very slowly andthe foreground objects occupy only a relatively small portionof a video frame. In these type of applications, an efficientsolution for transmissions over bandwidth-limited networksis to send only the foreground objects for every framein real time while the background is sent occasionally. Atthe receiving end of the transmission, the objects and themost recent background can be fused together and the originalframe can be reconstructed. However, protecting theauthenticity of the video becomes more challenging in thiscase as a malicious entity can modify/replace/remove the individualforeground objects and background in the video. Inthis paper, we propose a Chinese remainder theorem basedwatermarking mechanism for protecting the authenticity ofvideos transmitted or stored as objects and background.Our mechanism ensures the authenticity between video objectsand their associated background.\",\"PeriodicalId\":415758,\"journal\":{\"name\":\"2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AVSS.2010.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AVSS.2010.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission
Now-a-days, surveillance cameras have been widely deployedin various security applications. In many surveillanceapplications, the background changes very slowly andthe foreground objects occupy only a relatively small portionof a video frame. In these type of applications, an efficientsolution for transmissions over bandwidth-limited networksis to send only the foreground objects for every framein real time while the background is sent occasionally. Atthe receiving end of the transmission, the objects and themost recent background can be fused together and the originalframe can be reconstructed. However, protecting theauthenticity of the video becomes more challenging in thiscase as a malicious entity can modify/replace/remove the individualforeground objects and background in the video. Inthis paper, we propose a Chinese remainder theorem basedwatermarking mechanism for protecting the authenticity ofvideos transmitted or stored as objects and background.Our mechanism ensures the authenticity between video objectsand their associated background.