You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

27 August 2023

Video Blockchain: A Decentralized Approach for Secure and Sustainable Networks with Distributed Video Footage from Vehicle-Mounted Cameras in Smart Cities

,
,
and
School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Intelligent Technologies for Vehicular Networks

Abstract

In this paper, we explore video blockchain for establishing connectivity among vehicles in a smart city through utilizing blockchain technology. By leveraging intelligent vehicular systems that provide location-based visualization through multiple deployed cameras in vehicles, we expand the scope of collecting video surveillance data for observation, thereby enhancing overall situational awareness. We utilize the decentralized nature of blockchain to implement a vehicle-based surveillance system across a smart city. To ensure reliability, the integration of two cryptographic functions, hashing and signing, with the blockchain is employed. This integration ensures secure and tamper-proof solutions for the existing intelligent surveillance system. In this paper, our primary focus is on combining blockchain technology to achieve sustainable and robust smart solutions for intelligent vehicular distributed video networks while eliminating the need for third-party intermediaries. Through extensive experiments and analysis, we demonstrate the effectiveness and feasibility of our proposed video blockchain approach. The results indicate that this innovative framework provides enhanced security, privacy, and scalability for intelligent vehicular distributed networks in smart cities, paving the way for a connected and efficient urban environment.

1. Introduction

The rapid advancement of blockchain has significantly impacted multiple facets of society, necessitating the careful consideration of the complexities that play a vital role in community development and that enhance our daily lives. As we navigate this area, addressing both its positive and negative aspects becomes imperative. Therefore, in the context of contemporary technologies, ensuring security is of paramount importance. Particularly in smart cities, where sensitive information is abundant, the establishment of a highly secure repository is necessary.
The concept of a “smart city” represents an ambitious goal pursued by cities world-wide, driven by the intricate nature of urban environments and the potential offered by intelligent technologies. Within this context, it is crucial to thoroughly examine digital surveillance systems, as they hold significant importance today. Furthermore, prioritizing the safety and security of individuals by reducing crime rates and accidents stands as one of the primary objectives of smart cities [1,2].
In video surveillance [3], the primary objective is to capture video footage using vehicle cameras and securely store it onsite, leveraging blockchain to ensure data communication integrity and resistance against tampering and cyberattacks. Video surveillance serves multiple purposes, including crime solving, anomalous event detection, and privacy policy enforcement, making recorded video footage highly valuable for diverse applications. However, there exists a potential risk of malicious attackers, savvy hackers, or unauthorized third parties manipulating cameras and video repositories, rendering them ineffective in crime scenarios. These attacks may include false frame injection, data tampering, and privacy violations within a surveillance system. To address these challenges and enhance the security of video data captured using intelligent surveillance systems, we propose the following hypotheses:
  • The utilization of a video blockchain framework will significantly enhance the security and integrity of video data;
  • The integration of enhanced cryptographic functions, such as the Schnorr signature and hash (SHA256), within a video blockchain, along with the implementation of Merkle trees, will establish a comprehensive security mechanism that ensures the robust storage, retrieval, and data integrity of video records within a network;
  • The combination of vehicle cameras, blockchain, and third-party certificate authority (CA) verification will ensure the secure and sequential storage of video data and protect it from tampering and unauthorized access;
  • The proposed video blockchain will effectively mitigate the risks associated with malicious attacks, data tampering, and privacy violations in “intelligent vehicular distributed video networks”, thereby improving its effectiveness in crime scenarios.
In this paper, our focus was driven by our intention to combine video blockchain with an enhancement of intelligent vehicular systems. We aimed for an evaluation of a novel method for capturing and storing video data using vehicle-mounted cameras and blockchain. Building upon existing work and implementing enhanced cryptographic functions, our objective was to enhance the security of vehicle videos in smart cities.
The rest of this paper is organized as follows. Section 2 provides a survey of related work, followed by a detailed presentation of our proposed method in Section 3, as well as a demonstration of the experimental results in Section 4 to assess the validity and effectiveness of our hypotheses. In Section 5, we discuss the results and conclude this paper, with the limitations and future work in Section 6.

3. Proposed Video Blockchain

In this paper, a descriptive research design is employed to investigate a secure mechanism for linking vehicle-mounted cameras in a smart city. Both primary and secondary video data are utilized to achieve the research objectives. For primary data collection, videos from vehicle-mounted cameras were collected, and the images extracted from these videos were used for experimentation. This implementation was part of our studies in the visual blockchain [28]. During the image encryption process, the raw image data were converted into a sequence of bytes, and the original data of the raw image could not be accessed once the encryption process was completed [29,30].
The main objective of this paper was to create a chain of blocks using vehicle videos and connect them in a distributed manner to ensure the correct video sequence without tampering, while minimizing the involvement of third parties in a smart city. To attain secure surveillance data communication using blockchain technology, a combination of a SHA-256 hash function and Schnorr signature was employed. The hash function ensures collision resistance, while the Schnorr signature scheme enhances the security of the communication.
Let (G′, S′, V′) represent a signature scheme, and H (·) denotes a hash function with collision resistance properties. We utilized these components to achieve the desired security requirements for the communication of surveillance data over our blockchain.
  • Key Generation (G′):
  • Generate a private key, sk, randomly from the set G.
  • Compute the corresponding public key vk as vk = gsk.
  • Signing (S’):
  • Take a message, m, as input.
  • Generate a random value, b, from the set of integers modulo, |G.
  • Compute u as u = gb;
  • Calculate a by applying the random oracle H (·) to u and the message m: a = H (u, m).
  • Compute s as s = a. sk + b mod q, where q represents the modulus of the group G.
  • Output the signature (a, s).
  • Verification (V’):
  • Take a message, m, and a signature (a, s) as input.
  • Retrieve the public key vk.
  • Compute u’ as u’ = gs · vk(−a).
  • Calculate a’ by applying the random oracle H (·) to u’ and the message m: a’ = H (u’, m);
  • If a’ is equal to a, the signature is considered valid. Otherwise, it is invalid.
In the context of blockchain data processing, the calculation involves generating both hashing and signature functions. This dual process ensures the integrity and security of the data. In this paper, we calculated the hash value using a specific hash function, such as SHA-256. This hash value acts as a unique identifier for the data, helping to ensure its integrity and prevent tampering.
To enhance the data protection of the vehicle-based video surveillance system in the smart city, we employed a third-party certification process. This involved collaborating with a certificate authority (CA) to verify the authority and authenticity of the data. The involvement of a trusted third party, such as a CA, adds an extra layer of security and credibility to the data.
Moreover, a private blockchain was employed to transmit the video data. By utilizing a private blockchain, we ensured that the data sent through the CA were received without any tampering. The private blockchain serves as a secure and decentralized platform for transmitting and storing video frame data, ensuring its integrity and protection. This mechanism, which combines the calculation of hash values, third-party certification, and the use of a private blockchain, effectively enhances the security and integrity of data in the vehicle-based video surveillance system in the smart city. It offers a reliable and trustworthy approach to guarantee the authenticity and integrity of data originating from vehicles.
In Algorithm 1, we assume the availability of a blockchain web service (Blockchain Web Service) and aim to process incoming requests (Ri) from authenticated nodes (Ni). The steps involved in the process include:
Algorithm 1: Blockchain-Based Image Encryption Process
Require: Blockchain Web Service
Ensure: Genesis Block
(1) while T has not expired do
(2)         if node Ni is authenticated == True then
(3)                 if request Ri is matched == True then
(4)                         if Ri is identified as a processed request == False then
(5)                                 process the response to Ci
(6)                                 Hash (video_frame_metadata)
(7)                                 Sign (video_frame_metadata)
(8)                                 Update chain
(9)                         else
(10)                               Response to Ni that Ri is not a valid request
(11)                       end if
(12)               else
(13)                       Deny the request
(14)               end if
(15)               Validate and add block into chain
(16)       end if
(17) end while
In this updated version of Algorithm 2, a certificate authority (CA) has been introduced to provide certificates for the hashed features. The algorithm outlines a process for image encryption using blockchain and assumes the availability of a blockchain web service. Authenticated nodes can submit requests for image encryption, which are then vali-dated and processed according to specific conditions. Valid requests undergo the encryption process, which includes generating a response for the requesting node, hashing the video frame metadata, and signing it for integrity. The algorithm updates the blockchain by adding a new block containing the encrypted image or relevant information. Invalid requests are responded to accordingly, either by notifying the node of the issue or denying the request outright. The algorithm ensures the integrity and security of the blockchain by validating and adding processed blocks. It continues processing requests until a specified time has not expired. A certificate authority has also been introduced to generate certificates for the hashed features, enhancing security and verification capabilities.
Algorithm 2: Hashed Features Authentication Procedures
(1) Function: hash_feature (features_set)
(2)     string_features [empty_string]
(3)     for feature_vector in features_set.items do
(4)             feature_string = Convert_to_string (feature_vector)
(5)             string_features = (string_features || feature_string)
(6)     end for
(7)     bytes_features = Convert_to_bytes (string_features)
(8)     feature_hash = Convert_to_hash (bytes_features)
(9)     feature_id = features_set.name
(10)   return {feature_id: feature_hash}
(11) Procedure: record_hashed_feature (features_set)
(12)   feature_tx = hash_feature (features_set)
(13)   certificate = CertificateAuthority.generate_certificate (feature_tx)
(14)   tx_result = transaction_commit(feature_tx, certificate)
(15)   return tx_result
(16) Procedure: verify_hashed_feature (features_set)
(17)     feature_tx = hash_feature (features_set)
(18)     query_feature_tx = transaction_query (feature_tx)
(19)     if query_feature_tx == feature_tx then
(20)         verify_hash = True
(21)     else
(22)         verify_hash = False
(23)     end if
(24)   return verify_hash

4. Results

The process involves converting captured videos into individual video frames, each ranging from 50 KB to 1024 KB. These frames were utilized to establish a private blockchain system using Microsoft Windows 11 Pro 64 bit. An experimental setup was executed to assess the efficacy of the proposed approach against various attacks. The experimentation led to the creation of innovative computational techniques for video blockchains, combining specific cryptographic algorithms with video blockchain technology. This article serves as a valuable contribution to the realm of video blockchain by introducing a fresh method for safeguarding video data in surveillance setups. The study’s outcomes can serve as a cornerstone for forthcoming endeavors in both video blockchain and cryptographic algorithms.
Each root structure within the Merkle tree ensures the integrity of the connection between video frames and their respective hashing order. This safeguards against any alteration to the image sequence without modifying the entire root structure of the tree. Overall, these findings offer valuable insights into the advancement of web interfaces for video blockchain systems, and their implications can be harnessed to augment the dependability and security of such systems in the future.
The results in Figure 1 reflect Merkle tree-based approaches for data verification. The evaluation was conducted by measuring the computational time and amount of data for each experiment, with each experiment being repeated 100 times to minimize errors caused by outliers.
Figure 1. Average computational time (millisecond) for authentication based on Merkle tree by data size.
However, beyond 100 KB of data, these approaches exhibit only marginal differences. For instance, while generating a Merkle tree for a 1 MB data file, the prover’s computational time is dominated by the process, accounting for approximately 99.9% of the total time, and the results are presented in a Figure 1. The execution time varies based on different input sizes and block sizes, and we analyzed this variability to ascertain the function’s time complexity. Figure 2 illustrates the relationship between execution time (on the y-axis) and input size or block size (on the x-axis). This comparison encompasses various input sizes and block sizes, providing insights into the function’s performance.
Figure 2. Execution times for different input sizes and block sizes.
In Figure 3, we also compare the computation time and data size metrics with those of other similar work. Our results show a significant change after a data size of 100 KB, indicating that the study’s outcomes are comparatively reliable. These findings can be applied to improve the efficiency and accuracy of Merkle tree-based approaches for data verification.
Figure 3. Comparison of the computational time between ours and other similar work [17,27,31].
The use of blockchain technology in intelligent surveillance faces many challenges, such as scalability, interoperability, and regulatory compliance. Scaling blockchain to handle large volumes of data and transactions, integrating it with the existing systems, and navigating regulatory frameworks are crucial areas requiring attention in this domain. In our future work, we plan to address these issues.

5. Discussion and Result Analysis

In this paper, our primary findings are rooted in videos captured from vehicles. To evaluate our video blockchain system, we established a blockchain environment using visual coding and the Hyperledger Fabric private blockchain platform. Hyperledger Fabric, designed for distributed ledger research and experimentation, facilitated the creation of our private blockchain, enabling us to conduct comprehensive analyses. Additionally, we harnessed the integrated development environment (IDE) in MATLAB to gather computational results and compare them against video frame encryption. The MATLAB IDE was also employed to measure the success rates of our proposed method.
This paper contributes valuable insights into the evolution of web interfaces for video blockchain systems, outlining avenues for bolstering their reliability and security in forthcoming developments. Our recorded videos yielded results for the number of normalized pixels change rate (NPCR) of 99.6021% and the unified averaged changing intensity (UACI) of 33.4065%. Table 1 shows a comparison with other results, indicating our method outperforms others. In Equation (1), M denotes the width (i.e., number of columns) of the images, and N signifies the height (i.e., number of rows) of the images.
P = M N .
Table 1. Comparisons of deferential attack.
Let | 1 ( i ,   j ) and |2(i, j) represent the pixel values at position (i, j) in the first and second images, respectively. Equation (1) calculates the normalized pixel difference rate (NPCR) as a percentage. It quantifies the proportion of pixels that differ between the two images and is computed by summing the absolute differences between corresponding pixel values not equal (|I1(i, j) - |2(i, j)|)and dividing it by the total number of pixels (M ∗ N), multiplied by 100.
N P C R = Σ | I 1 ( i ,   j ) I 2 ( i ,   j ) | M N × 100
where UACI provides an indication of the average changingintensity difference between the two images. Higher UACI values indicate greater average changing intensity differences, while lower UACI values suggest that the images have more similar average intensities. In this context, Σ represents the summation over all pixel positions (i, j). Additionally, |I1(i, j)−I2(i, j)| denotes the absolute difference in pixel values between corresponding positions (i, j) in the two images.
U A C I = Σ | I 1 ( i , j ) I 2 ( i , j ) | ( M N L ) × 100
We also established a peer-to-peer (P2P) network to interconnect the vehicle cameras and created a blockchain network using the required vehicles category in the smart city. For instance, the blockchain model can be applied to monitor city activities. Compared to the traditional client–server model, this P2P model offers numerous benefits. On the other hand, current surveillance systems heavily depend on service availability. However, a client–server architecture cannot guarantee high availability [31] because of its inherent nature. This structured P2P network continues to function even in the event of a node failure because of its distributed nature. Thus, we ensure the system’s availability for users and maintain the security of the system’s data.
It is noteworthy that while the results largely align with our expectations, there exist slight discrepancies when compared to the results of other studies. These variations can be attributed to several factors. Firstly, the choice of blockchain platform and encryption algorithms can lead to nuances in the results because of their inherent characteristics. Additionally, differences in the types of videos, varying frame rates, and even environmental conditions during recording could contribute to these deviations. These discrepancies are not unexpected within the realm of research, as the uniqueness of each approach and experimental setup can inevitably lead to divergent outcomes.
In conclusion, our discussion of the results highlights the alignment between our anticipated outcomes and the actual findings of our study. Moreover, the comparative analysis against other related research lends credence to the effectiveness of our video blockchain system. The minor discrepancies identified can be attributed to a combination of methodological choices and contextual variations. This discussion, thus, reinforces the value of our research in advancing the field of video blockchain systems while also acknowledging the nuanced nature of the experimental results in a diverse research landscape.

6. Conclusions

This paper presents a video blockchain framework that validates the hypotheses formulated in the study. The results underscore the significant enhancement in security and data integrity achievable through the utilization of a video blockchain within smart city surveillance systems. This outcome posits that the integration of a video blockchain establishes a robust security mechanism for the storage and retrieval of surveillance camera video records. Moreover, the inclusion of Merkle trees in the video blockchain architecture further bolsters the security and data integrity of the surveillance system.
The combination of vehicle cameras, blockchain technology, and third-party certification authority (CA) verification ensures the secure and sequential storage of video data, protecting it against tampering and unauthorized access. Lastly, the proposed video blockchain approach effectively mitigates the risks associated with malicious attacks, data tampering, and privacy violations in surveillance systems, enhancing their effectiveness in crime scenarios.
This paper contributes to the field by establishing a link between video frames captured by intelligent surveillance systems and blockchain. By leveraging cryptographic functions and decentralized storage platforms, the security of vehicle camera transferring video data is significantly improved. The proposed blockchain-based approach not only enhances the security and integrity of vehicle video data but also promotes trust, reliability, and controlled disclosure in smart cities. Throughout this paper, one of the identified limitations pertains to the necessity of maintaining a minimum number of connected nodes to enhance the system’s availability. Additionally, our method is not resistant to quantum computer attacks. Taking into account these limitations, we plan to extend our research in future endeavors to enhance the system’s resistance against attacks from quantum computers. This approach is of significant value to law enforcement monitoring, autonomous vehicles, insurance providers, and traffic management systems, providing increased security and adaptability for an advanced vehicular distributed video network in smart urban environments.

Author Contributions

Conceptualization, K.M. and W.Q.Y.; methodology, K.M.; software, K.M.; validation, K.M. formal analysis, K.M.; investigation, K.M.; resources, K.M. and W.Q.Y.; data curation, K.M.; writing—original draft preparation, K.M. writing—review and editing, K.M., W.Q.Y., M.N. and X.J.L.; visualization, K.M. supervision, W.Q.Y. and M.N.; project administration, X.J.L., W.Q.Y. and M.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript.
NPCRNormalized pixels change rate
UACIUnified average changing intensity

References

  1. Aldairi, A.; Tawalbeh, L. Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput. Sci. 2017, 109, 1086–1091. [Google Scholar] [CrossRef]
  2. Alketbi, A.; Nasir, Q.; Abu Talib, M. Novel blockchain reference model for government services: Dubai government case study. Int. J. Syst. Assur. Eng. Manag. 2020, 11, 1170–1191. [Google Scholar] [CrossRef]
  3. Deepak, K.; Badiger, A.N.; Akshay, J.; Awomi, K.A.; Deepak, G.; Harish Kumar, N. Blockchain-based management of video surveillance systems: A survey. In Proceedings of the International Conference on Advanced Computing and Communication Systems 2020, Coimbatore, India, 6–7 March 2020; pp. 1256–1258. [Google Scholar] [CrossRef]
  4. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  5. Engelhardt, M.A. Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector. Technol. Innov. Manag. Rev. 2017, 7, 22–34. [Google Scholar] [CrossRef]
  6. Fill, H.; Haerer, F. Knowledge blockchains: Applying blockchain technologies to enterprise modeling. In Proceedings of the Hawaii International Conference on System Sciences 2018, Waikoloa Village, HI, USA, 3–6 January 2018; pp. 4045–4054. [Google Scholar]
  7. Fitwi, A.; Chen, Y. Secure and privacy-preserving stored surveillance video sharing atop permissioned blockchain. In Proceedings of the International Conference on Computer Communications and Networks 2021, Athens, Greece, 19–22 July 2021; pp. 1–8. [Google Scholar]
  8. Fu, J.; Qiao, S.; Huang, Y.; Si, X.; Li, B.; Yuan, C. A study on the optimization of blockchain hashing algorithm based on PRCA. Secur. Commun. Netw. 2020, 2020, 8876317. [Google Scholar] [CrossRef]
  9. Kullig, N.; Lämmel, P.; Tcholtchev, N. Prototype implementation and evaluation of a blockchain component on IoT devices. Procedia Comput. Sci. 2020, 175, 379–386. [Google Scholar] [CrossRef]
  10. Hasan, O.; Brunie, L.; Bertino, E. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. Ph.D. Thesis, University of Lyon, Lyon, France, 2023. [Google Scholar]
  11. Hou, L.; Zheng, K.; Liu, Z.; Xu, X.; Wu, T. Design and prototype implementation of a blockchain-enabled lora system with edge computing. IEEE Internet Things J. 2021, 8, 2419–2430. [Google Scholar] [CrossRef]
  12. Khrais, L.T. The combination of iot-sensors in appliances and block-chain technology in smart cities energy solutions. In Proceedings of the International Conference on Advanced Computing and Communication Systems 2020, Coimbatore, India, 6–7 March 2020; pp. 1373–1378. [Google Scholar] [CrossRef]
  13. Gallo, P.; Pongnumkul, S.; Nguyen, U.Q. BlockSee: Blockchain for IOT video surveillance in smart cities. In Proceedings of the IEEE International Conference on Environment and Electrical Engineering and IEEE Industrial and Commercial Power Systems Europe, Palermo, Italy, 12–15 June 2018. [Google Scholar] [CrossRef]
  14. Chen, Y.C.; Chou, Y.P.; Chou, Y.C. An image authentication scheme using Merkle tree mechanisms. Future Internet 2019, 11, 149. [Google Scholar] [CrossRef]
  15. Gřivna, T.; Drápal, J. Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digit. Investig. 2019, 28, 1–13. [Google Scholar] [CrossRef]
  16. Khan, P.W.; Byun, Y.C.; Park, N. A data verification system for CCTV surveillance cameras using blockchain technology in smart cities. Electronics 2020, 9, 484. [Google Scholar] [CrossRef]
  17. Lee, D.; Park, N. Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree. Multimed. Tools Appl. 2020, 80, 34517–34534. [Google Scholar] [CrossRef]
  18. Li, T.; Chen, Y.; Wang, Y.; Wang, Y.; Zhao, M.; Zhu, H.; Tian, Y.; Yu, X.; Yang, Y. Rational protocols and attacks in blockchain system. Secur. Commun. Netw. 2020, 2020, 8839047. [Google Scholar] [CrossRef]
  19. Majdoubi, D.E.L.; El Bakkali, H.; Sadki, S. Towards smart blockchain-based system for privacy and security in a smart city environment. In Proceedings of the International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (2020), Marrakesh, Morocco, 24–26 November 2020. [Google Scholar] [CrossRef]
  20. Chen, J.; Ruan, Y.; Guo, L.; Lu, H. BCVehis: A blockchain-based service prototype of vehicle history tracking for used-car trades in China. IEEE Access 2020, 8, 214842–214851. [Google Scholar] [CrossRef]
  21. Chen, X.; Xing, Z.; Karki, B.; Li, Y.; Chen, Z. Blockchain simulation: A web application for it education. In Proceedings of the IEEE Annual Computing and Communication Workshop and Conference 2021, Virtual, 27–30 January 2021; pp. 486–491. [Google Scholar] [CrossRef]
  22. Chukwu, E.; Garg, L. A systematic review of blockchain in healthcare: Frameworks, prototypes, and implementations. IEEE Access 2020, 8, 21196–21214. [Google Scholar] [CrossRef]
  23. Gabay, D.; Akkaya, K.; Cebe, M. Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs. IEEE Trans. Veh. Technol. 2020, 69, 5760–5772. [Google Scholar] [CrossRef]
  24. George, R.V.; Harsh, H.O.; Ray, P.; Babu, A.K. Food quality traceability prototype for restaurants using blockchain and food quality data index. J. Clean. Prod. 2019, 240, 118021. [Google Scholar] [CrossRef]
  25. Hartwig, M. ECDSA Security in bitcoin and Ethereum: A research survey. Blog. Coinfabrik 2016, 1–10. [Google Scholar]
  26. Gergely, A.M.; Crainicu, B. Randadminsuite: A new privacy-enhancing solution for private blockchains. Procedia Manuf. 2020, 46, 562–569. [Google Scholar] [CrossRef]
  27. Koo, D.; Shin, Y.; Yun, J.; Hur, J. Improving security and reliability in Merkle tree-based online data authentication with leakage resilience. Appl. Sci. 2018, 8, 2532. [Google Scholar] [CrossRef]
  28. Gedara, K.M.; Nguyen, M.; Yan, W.Q. Enhancing privacy protection in intelligent surveillance: Video blockchain solutions. In BLOCKCHAIN’23 Proceedings; Springer LNNS: Berlin/Heidelberg, Germany; Available online: https://cerv.aut.ac.nz/wp-content/uploads/2023/05/BLOCKCHAIN23.pdf (accessed on 23 August 2023).
  29. Gedara, K.; Nguyen, M.; Yan, W. Visual blockchain for intelligent surveillance in a smart city. In Blockchain Technologies for Sustainable Development in Smart Cities; IGI Global: Hershey, PA, USA, 2021. [Google Scholar]
  30. Kumar, M.; Kaur, G. High performance scalable recursive block matrix inverse for multicore architectures. In Proceedings of the International Conference on Parallel, Distributed and Grid Computing 2022, Solan, India, 25–27 November 2022; pp. 45–49. [Google Scholar]
  31. Fattahi, S.; Makanju, A.; Fard, A. SIMBA: An efficient simulator for blockchain applications. In Proceedings of the 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 29 June–2 July 2020; pp. 51–52. [Google Scholar]
  32. Belazi, A.; Abd El-Latif, A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
  33. Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.; Baik, S.W. Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans. Ind. Inform. 2018, 14, 3679–3689. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.