Presented by ankur chattopadhyay cs591 project spring 2007
Download
1 / 25

Presented By- Ankur Chattopadhyay CS591 PROJECT SPRING 2007 - PowerPoint PPT Presentation


  • 96 Views
  • Uploaded on

A METHOD FOR IMPLEMENTING PRIVACY-PRESERVING SECURITY SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK. Presented By- Ankur Chattopadhyay CS591 PROJECT SPRING 2007. Background Of The Problem. Today’s surveillance mechanism leads to “privacy invasion”

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Presented By- Ankur Chattopadhyay CS591 PROJECT SPRING 2007' - magnar


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Presented by ankur chattopadhyay cs591 project spring 2007 l.jpg

A METHOD FOR IMPLEMENTING PRIVACY-PRESERVING SECURITY SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

Presented By-

Ankur Chattopadhyay

CS591 PROJECT SPRING 2007


Background of the problem l.jpg
Background Of The Problem SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Today’s surveillance mechanism leads to “privacy invasion”

  • Legal issues in restricted places such as restrooms, private households

  • Over the years, instances of unmonitored crime on the rise.

“Eyes” Of A Camera Always Watching You Everywhere


Examples of existing surveillance cameras l.jpg

Surveillance SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

Cameras

Examples Of Existing Surveillance Cameras

Existing

Monitoring


The present issue to deal with l.jpg
The Present Issue To Deal With SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Current surveillance systems displace crime, rather than stop it

    - Employment of CCTV moving crime out of the camera boundaries

  • Areas under surveillance become crime-free while unmonitored zones become targets for illegal activity

    - Criminal acts committed in a private location, such as a locker room or restroom


Some interesting facts l.jpg
Some Interesting Facts SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Instances of crime rising in schools

  • Most students avoid school restrooms out of fear

  • Almost 2000 students physically attacked each hour of the school day

  • The Unfortunate Truth

    - Existing surveillance technology lowering privacy for the average person

    - Simultaneously, pushing crime further out of the view of the cameras


The challenge faced l.jpg
The Challenge Faced SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • So, the question posed to surveillance system designers:

    How to apply technology in the right way and at the right place to enhance security while protecting fundamental privacy rights of individuals?

  • The answer to this question lies in the technology of PrivacyCam

    - Future model of surveillance camera with privacy protection


Privacycam l.jpg
PrivacyCam SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

Blackfin DSP Module

Omnivision CMOS Camera Module

Integrated System: PrivacyCam


Privacycam the technology l.jpg
PrivacyCam: The Technology SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Uses privacy through cryptographic obscuration (PICO) technique

  • PICO on a tiny Blackfin DSP processor chip, integrated with a small Omnivision CMOS camera module

  • Application runs on a real-time operating system (uCLinux under Linux) within the chip

  • Application performs the necessary tasks for privacy enhancement

    - detection of the region to protect

    - encryption of that region


System level design of the technology implementation l.jpg
System Level Design Of The Technology Implementation SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

Capture image from the camera

Detect the region to protect (using face detection, skin detection, motion detection or other methods)

Use encryption key, generate session key and store the secured key, along with the protected region information, as embedded within the image

Carry out encryption on the region to protect, and pass on the encrypted data to the image compression process pipeline


Detection of region of interest l.jpg
Detection Of Region Of Interest SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Background Subtraction Model

  • Two separate image frames, background model and a captured one, compared against each other

  • Compute per coefficient (pixel wise) difference for each 8 x 8 DCT block

    - Compare the obtained difference with a model threshold value. If the majority of the coefficient differences are greater than the threshold, we encrypt (encode) that block, otherwise we don’t encrypt that block (for my research I have used JPEG image compression)


Overview of secret key cryptography l.jpg
Overview of Secret Key Cryptography SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • To transmit data securely over an insecure medium, two parties agree on a key in which to encrypt data.

    • This key is usually exchanged through public-key cryptographic methods

  • User A encrypts a block of data X with key W and sends this data to user B.

  • By using the same key W, user B decrypts the ciphertextY back into X

Insecure Medium

X

Z

Y

Y

Z-1

X

A

B

W

W

Fundamental Concept: Due to algorithm Z, it’s nearly impossible to recover data X from ciphertext Y without key W. “Guessing” the key W through exhaustive search is generally infeasible.


Outline diagram of applied algorithm l.jpg
Outline Diagram Of Applied Algorithm SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK


The aes algorithm l.jpg
The AES Algorithm SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • The Advanced Encryption Standard (AES)

  • powerful standard cipher, that operates by performing a set of steps for a number of iterations called rounds

  • AES is a symmetric block cipher, and it’s better efficiency and effectiveness in handling data blocks (bytes) makes it an automatic choice over the vulnerable DES (Data Encryption Standard)

  • For my research I used the Rijndael Block Cipher


Aes outline diagram l.jpg
AES Outline Diagram SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK


Rijndael algorithm l.jpg
Rijndael Algorithm SURVEILLLANCE BY APPLYING CRYPTOGRAPHIC TECHNIQUES ON A REAL-TIME EMBEDDED DSP FRAMEWORK

  • Rijndael Block Cipher Algorithm

    • Developed by Joan Daemen and Vincent Rijmen (pronounced “Rhine-doll”)

    • An extremely fast, state-of-the-art, highly secure symmetric algorithm

    • Allows only 128, 192, and 256-bit key sizes

    • Variable block length supported

    • A block is the smallest data size the algorithm will encrypt


Slide16 l.jpg

Some sample images from our PrivacyCam application while monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.


Uniqueness of our technology l.jpg
Uniqueness Of Our Technology monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Protects privacy - hides individual identity

  • Encrypts the image-region to protect with AES (Advanced Encryption Standard) using an encryption key

  • Enhances security against any possible crime scenario

  • Upon legal authorization, recovery of the full original image possible

  • Recovery process through decryption by accessing the encryption key


Technology features advantages l.jpg
Technology Features/Advantages monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Unlike other existing technologies

    - PrivacyCam allows general surveillance to continue, without disrupting the privacy of an individual

  • Compared to existing commercial privacy-enhancing applications like Emmitall

  • Provides better system stability and free from the typical vulnerabilities of software implementation

  • Forms a network based ethereal webcam sensor


Analysis of technology l.jpg
Analysis Of Technology monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Low cost of embedded system hardware makes technology affordable

  • Smallness in size of system components makes technology space-optimized

  • Involves balanced DSP processors with minimum CPU overhead and very fast peripheral interfaces

  • System provides embedded real-time application with performance in the order of microseconds


Target application areas l.jpg
Target Application Areas monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • As a general-purpose security camera

  • in public places

  • In restricted areas like restrooms, locker-rooms to name a few

  • As a special vigilance camera

  • in bathrooms of school buildings

Locker Room

Rest Room


Application areas l.jpg
Application Areas monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • As a surveillance camera for monitoring

    - old home centers for elder care

    - trouble-prone zones of school/university

Elder Care Center

Examples of incidents of violence and trespassing at campus


Recommendations l.jpg
Recommendations monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Need to test PrivacyCam in more realistic conditions like restrooms and locker rooms

  • Need to show more results of real-time performance in testing conditions

  • Potential research work in improving the mechanism of detecting the privacy region

  • Potential research work in trying out other public-key block cipher techniques

  • Need to build on the technology by extending to audio & audio-video surveillance


Conclusion l.jpg
Conclusion monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Novel technology addressing the critical issue of “privacy invasion” in an efficient and cost-effective way in optimized space

  • Strikes fine balance between privacy protection and security enhancement

  • Meets all the ideal requirements of today’s surveillance

  • Growing and significant market

  • Our technology challenges existing privacy-enhancing applications and surveillance systems


References l.jpg
References monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • Ankur Chattopadhyay, T.E. Boult, Privacy Cam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP – IEEE CVPR Embedded Computer Vision Workshop, 2007

  • T.E. Boult, PICO: Privacy Through Invertible Cryptographic Obscuration - IEEE Computer Vision for Interactive and Intelligent Environments, 2005

  • Michael Hennerich, Linux on the Blackfin DSP Architecture - Embedded Systems Conference Silicon Valley 2006

  • Marc Van Droogenbroeck, Partial Encryption of Images for Real-time Applications - Fourth IEEE Signal Processing Symposium, April 2004


References25 l.jpg
References monitoring a private household. Each frame with a changing object is followed by an encrypted version. Here the human face region has been protected for hiding individual identity, thereby enhancing privacy.

  • J.M. Rodriguez, W. Puech and A.G. Borsb, A Selective Encryption for Heterogeneous Color JPEG Images Based on VLC and AES Stream Cipher - Third European Conference on Color in Graphics, Imaging and Vision, June, 2006

  • W. Puech, P. Meuel, J.C. Bajard and M. Chaumont, Face Protection by Fast Selective Encryption in a Video - IET,Crime Security Conference June, 2006

  • Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Blinkering Surveillance: Enabling Video Privacy through Computer Vision - IEEE Security & Privacy, 2005