Abstract

With the continuous development and application of monitoring technology, which involves increasingly more sensitive information, the global demand for video monitoring systems has surged. As a result, video monitoring technology has received widespread attention both at home and abroad. Traditional video monitoring systems experience security threats, with differing levels of severity, in terms of attack, storage, transmission, etc., which results in different degrees of damage to users’ rights. Therefore, we propose a blockchain-SM-based video monitoring system called BSVMS. For the front-end device invasion risk, internal attack risk, and security storage problem of the monitoring system, we use commercial cryptography algorithms to complete the encryption processing of images through a visual change network in the imaging process, thereby ensuring the security of the video data from the source. To address the problem that the video monitoring application software and data are vulnerable to damage, we use blockchain technologies that are tamper-proof and traceable to build a trustworthy video monitoring system. In the system, no member can query the original monitoring data. To address the security issues in network transmission, we use a commercial cryptography algorithm for multilayer encryption to ensure the security of data during transmission, guarantee the confidentiality of the system, and realize domestic autonomous control. We then conduct tests and security analysis of the encryption and decryption efficiency of the SM4 algorithm used in the system, the blockchain performance, and the overall performance. The experimental results show that in this system environment, the SM4 algorithm encryption and decryption efficiency is better than other algorithms and that the blockchain used meets industry standards.

Highlights

  • With the rapid development of modern science and technology, the construction of network infrastructure is increasingly sound, and the application of network video monitoring technology is gradually increasing

  • In view of the front-end equipment intrusion risk, internal network attack risk, and data storage security problems of video monitoring, in this paper, we modify the visual sensor directly and use a commercial cryptography algorithm to encrypt the images through the visual transformation network to realize the encryption of the images during the imaging process, which solves the root cause of the problems

  • The chaotic encryption algorithm has developed from one-dimensional chaotic encryption to later two-dimensional and three-dimensional chaotic encryption, and even the hyperchaotic system and composite chaotic system have been proposed [23, 24]

Read more

Summary

Introduction

With the rapid development of modern science and technology, the construction of network infrastructure is increasingly sound, and the application of network video monitoring technology is gradually increasing. In view of the front-end equipment intrusion risk, internal network attack risk, and data storage security problems of video monitoring, in this paper, we modify the visual sensor directly and use a commercial cryptography algorithm to encrypt the images through the visual transformation network to realize the encryption of the images during the imaging process, which solves the root cause of the problems. Regarding the security problems during network transmissions, video data processed by key state encryption can be uploaded to the blockchain platform directly, quickly, and effectively. The blockchain network participants can use the SM4 encryption algorithm to generate a public key, which can be uploaded to the blockchain platform In this way, we can ensure the security of the video data in the entire transmission process

Background
Autonomous Trustworthy Video Monitoring Scheme
L transforms to obtain CC
Experiment and Analysis
Analysis
Result items
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call