Abstract
In the intelligent CCTV surveillance environment, personal identity is confirmed based on face recognition. However, the recognition rate of the current face recognition technology is still faulty. In particular, face recognition may not work correctly due to various causes such as CCTV shot quality, weather, personal pose and facial expression, hairstyle, lighting condition, and so on. In this case, there is a great risk of exposing an object’s privacy information in the video surveillance environment due to erroneous object judgment. This paper proposes a video surveillance-based access control technique that combines a facial recognition system using CCTV machine learning with radio-frequency identification (RFID). The proposed method is implemented when accurate facial recognition is difficult to achieve due to poor video quality or low levels of similarity against feature vectors, in which cases multi-channel authentication is performed with the use of RFID features available on a mobile device in possession of the individual. The dual-channel authentication approach can still help identify the entity and protect his or her privacy with greater security even if the RFID tags for authentication are breached or accurate facial detection becomes challenging due to various factors such as CCTV video quality deterioration.
Similar content being viewed by others
References
Christos S, Kostas E. Psannis, Andreas P, Yutaka I, Kim B-G (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System 5(1):1–10
Wu Y-L, Tao Y-H, Chang C-J (2017) A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom. J Inf Optim Sci 38(1):173–196
Meng Y, Xing W, Guohang Z, Linlin S (2017) Joint and collaborative representation with local adaptive convolution feature for face recognition with single sample per person. Pattern Recogn 66:117–128
Robertson DJ (2018) Face recognition: security contexts, super-recognizers, and sophisticated fraud. The Journal of The United States Homeland Defence and Security Information Analysis Center (HDIAC) 5(1):6–10
Choudhary A, Rekha Vig (2017) Face recognition using multiresolution wavelet combining discrete cosine transform and Walsh transform. Proceedings of the 2017 International Conference on Biometrics Engineering and Application. ACM,
Vaesileios Memos, Kostas E. Psannis*, Yutaka Ishibashi, Byung-Gyu Kim, Brij Gupta (2017) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Elsevier, Future Generation Computer Systems
Stergiou C, Psannis KE, Kim B.-G, Gupta B (2016) Secure integration of IoT and cloud computing, Elsevier, Future Generation Computer Systems
Ya W, Tianlong B, Chunhui D, Ming Z (2017) Face recognition in real-world surveillance videos with deep learning method. Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. IEEE
Donghyeok L, Namje P (2017) Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1119
Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG data collection-processing and analysis in smart buildings. Futur Gener Comput Syst 82:349–357
Marek P, Ondrej K, Vladimir K, Vaclav S (2012) Cloud computing environments for biomedical data services. Intelligent Data Engineering and Automated Learning-IDEAL 2012:336–343
Joongheon K, Yeongjong M, Woojoo L, Daehun N (2017) Dynamic security-level maximization for stabilized parallel deep learning architectures in surveillance applications. Privacy-Aware Computing (PAC), 2017 IEEE Symposium on. IEEE
Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653–664
Rodríguez-Silva DA, Adkinson-Orellana L, Gonz'lez-Castaño FJ, Armiño-Franco I, Gonz'lez-Martínez D (2012) Video surveillance based on cloud storage. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE
Hyunjung L, Chunwoo P, Soodong K (2014) A framework for effectively managing dynamism of IoT devices. Journal of KIISE 41(8):545–556
Namje P, Hongxin H, Qun J (2016)Security and privacy mechanisms for sensor middleware and application in internet of things (IoT), International Journal of Distributed Sensor Networks, Vol. 2016
Ramachandra, Raghavendra, and Christoph Busch (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Computing Surveys(CSUR), 50(1)
Namje P, Donghyeok L (2017) Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment, Pers Ubiquit Comput, https://doi.org/10.1007/s00779-017-1017-1, pp.1–8
Namje P, Namhi K (2015) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):1–16
Hossain M (2014) Anwar. Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks 10(5)
Donghyeok L, Namje P (2016) Teaching book and tools of elementary network security learning using gamification mechanism. Journal of the Korea Institute of Information Security & Cryptology 26(3):787–797. https://doi.org/10.13089/JKIISC.2016.26.3.787
Namje P, Jin K, Seungjoo K, Dongho W, and Howon K (2006) “WIPI mobile platform with secure Service for Mobile RFID network environment”, Advanced Web and Network Technologies, and Applications, LNCS, Vol. 3842, pp. 741–748
Namje P, Hyochan B (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Security and Communication Networks, John Wiley&Sons Ltd 9(6):500–512. https://doi.org/10.1002/sec.1108
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication, Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg
Cheolhee P, Dowon H, Changho S (2016) A secure and practical encrypted data de-duplication with proof of ownership in cloud storage. Korea Information Science Society 43(10):1165–1172. https://doi.org/10.5626/JOK.2016.43.10.1165
Namje P (2013) UHF/HF dual-band integrated mobile RFID/NFC linkage method for mobile device-based business application. The Journal of The Korean Institute of Communication Sciences 38(10):841–851. https://doi.org/10.7840/kics.2013.38C.10.841
Donghyeok L, Namje P (2017) Institutional improvements for security of IoT devices. Journal of KIISC 27(3):607–615
Namje P (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. Journal of KICS 39C(6):466–475
Kaaniche, Nesrine, and Maryline Laurent (2014) A secure client side deduplication scheme in cloud storage environments, New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp.1–7
Puzio P, Molva R, Onen M, Loureiro S (2013) ClouDedup: secure deduplication with encrypted data for cloud storage, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, pp. 363–370
Park N, Park J, Kim H (2015) Inter-authentication and session key sharing procedure for secure M2M/IoT environment. International Information Institute (Tokyo) INFORMATION, Japan 18(1):261–266
Donghyeok L, Namje P (2017) A secure almanac synchronization method for open IoT maritime cloud environment. Journal of Korean Institute of Information Technology 15(2):79–90. https://doi.org/10.14801/jkiit.2017.15.2.79
Jeongho Kim (2015) The weight of the mobile device user authentication protocol study the cloud service communications environment, Master’s thesis, Soongsil University
Tang, Yang, and Junfeng Yang (2015) Secure deduplication of general computations, USENIX Annual Technical Conference, pp.319–331
Yoo Y-J, Kim S-J, Ko YW (2014) Cloud file synchronization scheme using bidirectional data deduplication. Journal of KIIT 12(1):103–110
Kim J, Park N, Kim G, Seunghun CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia. Electronics 8(4):412. https://doi.org/10.3390/electronics8040412
Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, “De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment”, Peer-to-Peer Networking and Applications, DOI https://doi.org/10.1007/s12083-018-0637-1, pp. 1–10, 2018
Park N (2018) The core competencies of SEL-based innovative creativity education. International Journal of Pure and Applied Mathematics 118(19a):837–849
Lee D, Park N (2018) A study on COP-transformation based metadata security scheme for privacy protection in intelligent video surveillance. Journal of KIISC 28(2):417–428
Park N (2018) STEAM education program: training program for financial engineering career. International Journal of Pure and Applied Mathematics 118(19a):819–835
Riedl P, Mayrhofer R, Möller A, KranzEmail M, Lettner F, Holzmann C, Koelle M (2015) Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Pers Ubiquit Comput 19(5–6):941–954
Lee D, Park N (2019) Privacy protection method based on multi-object authentication in intelligent CCTV environment. Journal of KIISE 46(2):154–160
Kirkham R, Bartindale T, Evans M, Olivier P (2015) Build me a Ubicomp: bespoke ubiquitous accessibility in live television production environments. Pers Ubiquit Comput 19(5–6):853–880
Qiu L, Liu Z, Pereira GCCF, Seo H (2017) Implementing RSA for sensor nodes in smart cities. Pers Ubiquit Comput 21(5):807–813
Lee D, Park N (2018) ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment. Journal of IJET 7(2.33):151–154
Park N (2017) Information exchange between VTSCs for secure next-generation vessel traffic system. International Information Institute (Tokyo) INFORMATION, Japan 20(2B):1309–1316
Lee D, Park N (2017) Technology and policy post-security management framework for IoT electrical safety management. The transactions of The Korean Institute of Electrical Engineers 66(12):1879–1888
Lee D, Park N (2018) A proposal of privacy-enhanced deduplication technique in a cloud environment. Journal of KIIT 16(5):91–102
Liu S, MengjingYu ML, Xu Q (2019) The research of virtual face based on Deep Convolutional Generative Adversarial Networks using TensorFlow. Journal of Physica A:SMA 521:667–680. https://doi.org/10.1016/j.physa.2019.01.036
Acknowledgement
Corresponding author is Namje Park (namjepark@jejunu.ac.kr).
Funding
This work was financially supported by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korean government (MSIT) (2019-0-00203, The Development of Predictive Visual Security Technology for Preemptive Threat Response).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kim, J., Park, N. Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Pers Ubiquit Comput 26, 345–353 (2022). https://doi.org/10.1007/s00779-019-01299-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-019-01299-w