Professional Documents
Culture Documents
Dr. Sowmyarani C N
Associate Professor
Dept. of CSE, RVCE
• Design
• Methodology
• Simulation/ algorithm development
• Experimental setup/Conducting experiments
• Testing
• References
The distributor’s constraint is to satisfy agents’ requests, by providing them with the number
of objects they request or with all available objects that satisfy their conditions.
His objective is to be able to detect an agent who leaks any portion of his data. We consider
the constraint as strict.
Let,
DLD is the system such that DLD={A,D,T,U,R,S,U*,C,M,F}.
1.{A} is the Administrator who controls entire operation’s
performed in the Software
2.{D} is the Distributor who will send data T to different agents U.
3. T is the set of data object that are supplied to agents.
T can be of any type and size, e.g., they could be tuples in a
relation, or relations in a database.
T= {t1,t2 ,t3,...tn}
4. U is the set of Agents who will receive the data from the
distributor A
U={u1,u2,u3,...un}
Security Analysis in Surveillance System 4
RV College of
Engineering Methodology Go, change the world
Our goal is to detect when the distributor’s sensitive data have been leaked by agents, and if
possible to identify the agent that leaked the data.
3. Rounds
SubBytes—a non-linear substitution step where each byte is replaced with another according to
a lookup table.
ShiftRows—a transposition step where each row of the state is shifted cyclically a certain
number of steps.
MixColumns—a mixing operation which operates on the columns of the state, combining the
four bytes in each column.
4. AddRoundKey
Final Round (no MixColumns)
SubBytes
ShiftRows
AddRoundKey
Registration Page
Security Analysis in Surveillance System 10
RV College of
Engineering Experimental setup/Conducting experiments Go, change the world
• Elharrouss, O., Almaadeed, N. and Al-Maadeed, S., 2021. A review of video surveillance systems. Journal of Visual
Communication and Image Representation, 77, p.103116.
• Shidik, G.F., Noersasongko, E., Nugraha, A., Andono, P.N., Jumanto, J. and Kusuma, E.J., 2019. A systematic review of intelligence
video surveillance: trends, techniques, frameworks, and datasets. IEEE Access, 7, pp.170457-170473.
• Lee, K., Yeuk, H., Kim, J., Park, H. and Yim, K., 2016. An efficient key management solution for privacy masking, restoring and
user authentication for video surveillance servers. Computer Standards & Interfaces, 44, pp.137-143.
• Rahman, S.M.M., Hossain, M.A., Hassan, M.M., Alamri, A., Alghamdi, A. and Pathan, M., 2016. Secure privacy vault design for
distributed multimedia surveillance system. Future Generation Computer Systems, 55, pp.344-352.
• Bentafat, E., Rathore, M.M. and Bakiras, S., 2021. Towards real-time privacy-preserving video surveillance. Computer
Communications, 180, pp.97-108.
• Matos, S., 2019. Privacy and data protection in the surveillance society: The case of the Prüm system. Journal of forensic and legal
medicine, 66, pp.155-161.
• Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. and de Meer, H., 2018. Surveillance and security: protecting electricity
utilities and other critical infrastructures. Energy Informatics, 1(1), pp.1-24.
• Kim, J.S., Kim, M.G. and Pan, S.B., 2021. A study on implementation of real-time intelligent video surveillance system based on
embedded module. EURASIP Journal on Image and Video Processing, 2021(1), pp.1-22.
Thank
You