Skip to main content
Log in

Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In the intelligent CCTV surveillance environment, personal identity is confirmed based on face recognition. However, the recognition rate of the current face recognition technology is still faulty. In particular, face recognition may not work correctly due to various causes such as CCTV shot quality, weather, personal pose and facial expression, hairstyle, lighting condition, and so on. In this case, there is a great risk of exposing an object’s privacy information in the video surveillance environment due to erroneous object judgment. This paper proposes a video surveillance-based access control technique that combines a facial recognition system using CCTV machine learning with radio-frequency identification (RFID). The proposed method is implemented when accurate facial recognition is difficult to achieve due to poor video quality or low levels of similarity against feature vectors, in which cases multi-channel authentication is performed with the use of RFID features available on a mobile device in possession of the individual. The dual-channel authentication approach can still help identify the entity and protect his or her privacy with greater security even if the RFID tags for authentication are breached or accurate facial detection becomes challenging due to various factors such as CCTV video quality deterioration.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Christos S, Kostas E. Psannis, Andreas P, Yutaka I, Kim B-G (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System 5(1):1–10

  2. Wu Y-L, Tao Y-H, Chang C-J (2017) A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom. J Inf Optim Sci 38(1):173–196

    Google Scholar 

  3. Meng Y, Xing W, Guohang Z, Linlin S (2017) Joint and collaborative representation with local adaptive convolution feature for face recognition with single sample per person. Pattern Recogn 66:117–128

  4. Robertson DJ (2018) Face recognition: security contexts, super-recognizers, and sophisticated fraud. The Journal of The United States Homeland Defence and Security Information Analysis Center (HDIAC) 5(1):6–10

    MathSciNet  Google Scholar 

  5. Choudhary A, Rekha Vig (2017) Face recognition using multiresolution wavelet combining discrete cosine transform and Walsh transform. Proceedings of the 2017 International Conference on Biometrics Engineering and Application. ACM,

  6. Vaesileios Memos, Kostas E. Psannis*, Yutaka Ishibashi, Byung-Gyu Kim, Brij Gupta (2017) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Elsevier, Future Generation Computer Systems

  7. Stergiou C, Psannis KE, Kim B.-G, Gupta B (2016) Secure integration of IoT and cloud computing, Elsevier, Future Generation Computer Systems

  8. Ya W, Tianlong B, Chunhui D, Ming Z (2017) Face recognition in real-world surveillance videos with deep learning method. Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. IEEE

  9. Donghyeok L, Namje P (2017) Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1119

  10. Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG data collection-processing and analysis in smart buildings. Futur Gener Comput Syst 82:349–357

    Article  Google Scholar 

  11. Marek P, Ondrej K, Vladimir K, Vaclav S (2012) Cloud computing environments for biomedical data services. Intelligent Data Engineering and Automated Learning-IDEAL 2012:336–343

  12. Joongheon K, Yeongjong M, Woojoo L, Daehun N (2017) Dynamic security-level maximization for stabilized parallel deep learning architectures in surveillance applications. Privacy-Aware Computing (PAC), 2017 IEEE Symposium on. IEEE

  13. Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653–664

    Article  Google Scholar 

  14. Rodríguez-Silva DA, Adkinson-Orellana L, Gonz'lez-Castaño FJ, Armiño-Franco I, Gonz'lez-Martínez D (2012) Video surveillance based on cloud storage. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE

  15. Hyunjung L, Chunwoo P, Soodong K (2014) A framework for effectively managing dynamism of IoT devices. Journal of KIISE 41(8):545–556

  16. Namje P, Hongxin H, Qun J (2016)Security and privacy mechanisms for sensor middleware and application in internet of things (IoT), International Journal of Distributed Sensor Networks, Vol. 2016

  17. Ramachandra, Raghavendra, and Christoph Busch (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Computing Surveys(CSUR), 50(1)

  18. Namje P, Donghyeok L (2017) Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment, Pers Ubiquit Comput, https://doi.org/10.1007/s00779-017-1017-1, pp.1–8

  19. Namje P, Namhi K (2015) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):1–16

  20. Hossain M (2014) Anwar. Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks 10(5)

  21. Donghyeok L, Namje P (2016) Teaching book and tools of elementary network security learning using gamification mechanism. Journal of the Korea Institute of Information Security & Cryptology 26(3):787–797. https://doi.org/10.13089/JKIISC.2016.26.3.787

  22. Namje P, Jin K, Seungjoo K, Dongho W, and Howon K (2006) “WIPI mobile platform with secure Service for Mobile RFID network environment”, Advanced Web and Network Technologies, and Applications, LNCS, Vol. 3842, pp. 741–748

  23. Namje P, Hyochan B (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Security and Communication Networks, John Wiley&Sons Ltd 9(6):500–512. https://doi.org/10.1002/sec.1108

  24. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication, Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg

  25. Cheolhee P, Dowon H, Changho S (2016) A secure and practical encrypted data de-duplication with proof of ownership in cloud storage. Korea Information Science Society 43(10):1165–1172. https://doi.org/10.5626/JOK.2016.43.10.1165

  26. Namje P (2013) UHF/HF dual-band integrated mobile RFID/NFC linkage method for mobile device-based business application. The Journal of The Korean Institute of Communication Sciences 38(10):841–851. https://doi.org/10.7840/kics.2013.38C.10.841

  27. Donghyeok L, Namje P (2017) Institutional improvements for security of IoT devices. Journal of KIISC 27(3):607–615

  28. Namje P (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. Journal of KICS 39C(6):466–475

  29. Kaaniche, Nesrine, and Maryline Laurent (2014) A secure client side deduplication scheme in cloud storage environments, New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp.1–7

  30. Puzio P, Molva R, Onen M, Loureiro S (2013) ClouDedup: secure deduplication with encrypted data for cloud storage, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, pp. 363–370

  31. Park N, Park J, Kim H (2015) Inter-authentication and session key sharing procedure for secure M2M/IoT environment. International Information Institute (Tokyo) INFORMATION, Japan 18(1):261–266

  32. Donghyeok L, Namje P (2017) A secure almanac synchronization method for open IoT maritime cloud environment. Journal of Korean Institute of Information Technology 15(2):79–90. https://doi.org/10.14801/jkiit.2017.15.2.79

  33. Jeongho Kim (2015) The weight of the mobile device user authentication protocol study the cloud service communications environment, Master’s thesis, Soongsil University

  34. Tang, Yang, and Junfeng Yang (2015) Secure deduplication of general computations, USENIX Annual Technical Conference, pp.319–331

  35. Yoo Y-J, Kim S-J, Ko YW (2014) Cloud file synchronization scheme using bidirectional data deduplication. Journal of KIIT 12(1):103–110

    Google Scholar 

  36. Kim J, Park N, Kim G, Seunghun CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia. Electronics 8(4):412. https://doi.org/10.3390/electronics8040412

  37. Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, “De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment”, Peer-to-Peer Networking and Applications, DOI https://doi.org/10.1007/s12083-018-0637-1, pp. 1–10, 2018

  38. Park N (2018) The core competencies of SEL-based innovative creativity education. International Journal of Pure and Applied Mathematics 118(19a):837–849

  39. Lee D, Park N (2018) A study on COP-transformation based metadata security scheme for privacy protection in intelligent video surveillance. Journal of KIISC 28(2):417–428

    Google Scholar 

  40. Park N (2018) STEAM education program: training program for financial engineering career. International Journal of Pure and Applied Mathematics 118(19a):819–835

  41. Riedl P, Mayrhofer R, Möller A, KranzEmail M, Lettner F, Holzmann C, Koelle M (2015) Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Pers Ubiquit Comput 19(5–6):941–954

    Article  Google Scholar 

  42. Lee D, Park N (2019) Privacy protection method based on multi-object authentication in intelligent CCTV environment. Journal of KIISE 46(2):154–160

    Article  Google Scholar 

  43. Kirkham R, Bartindale T, Evans M, Olivier P (2015) Build me a Ubicomp: bespoke ubiquitous accessibility in live television production environments. Pers Ubiquit Comput 19(5–6):853–880

    Article  Google Scholar 

  44. Qiu L, Liu Z, Pereira GCCF, Seo H (2017) Implementing RSA for sensor nodes in smart cities. Pers Ubiquit Comput 21(5):807–813

    Article  Google Scholar 

  45. Lee D, Park N (2018) ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment. Journal of IJET 7(2.33):151–154

    Google Scholar 

  46. Park N (2017) Information exchange between VTSCs for secure next-generation vessel traffic system. International Information Institute (Tokyo) INFORMATION, Japan 20(2B):1309–1316

  47. Lee D, Park N (2017) Technology and policy post-security management framework for IoT electrical safety management. The transactions of The Korean Institute of Electrical Engineers 66(12):1879–1888

  48. Lee D, Park N (2018) A proposal of privacy-enhanced deduplication technique in a cloud environment. Journal of KIIT 16(5):91–102

    Article  Google Scholar 

  49. Liu S, MengjingYu ML, Xu Q (2019) The research of virtual face based on Deep Convolutional Generative Adversarial Networks using TensorFlow. Journal of Physica A:SMA 521:667–680. https://doi.org/10.1016/j.physa.2019.01.036

Download references

Acknowledgement

Corresponding author is Namje Park (namjepark@jejunu.ac.kr).

Funding

This work was financially supported by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korean government (MSIT) (2019-0-00203, The Development of Predictive Visual Security Technology for Preemptive Threat Response).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Namje Park.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, J., Park, N. Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Pers Ubiquit Comput 26, 345–353 (2022). https://doi.org/10.1007/s00779-019-01299-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-019-01299-w

Keywords

Navigation