Intelligent Closed-Circuit Television and Applications

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 July 2020) | Viewed by 25784

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Education, Jeju National University, Jeju City, Korea
Interests: computer education; M2M; IoT; O2N and related security issues; WSN; mobile/wireless networks and related security issues
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

We are now witnessing the emergence of a Fourth Industrial Revolution building on the Third, the digital revolution that has been taking place since the middle of the last century. This revolution is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres. Internet of Small Things (IoST) represents an emerging era of networking that connects a variety of common appliances to one another, as well as with the rest of the Internet, to vastly improve our lives. Industrial and research organizations expect that tens of billions of daily life objects will be able to communicate with each other in the near future in a way that realizes a hyper connected society that is called Internet of Small Things (IoST).

This Special Issue offers an overview of ongoing research on high-performance closed-circuit television system techniques and brings together cutting-edge research work on security and privacy problems with respect to technological, behavioral, legal, and cultural aspects. As we anticipate that high-performance closed-circuit television system techniques will be soon adopted to large networked systems, we believe the role of IoST will become very important in this context. This Special Issue aims to highlight the latest research results and advances on various CCTV processing algorithms, architectures, and technologies for multimedia-based smart CCTV systems, sensors data fusion and processing at node side (client) or host side in IoST and, especially, their applications in IoT environment. It will include related topics to demonstrate pioneer work in this field, to investigate novel solutions, and to discuss the performance analysis. Contributions containing novel and original findings in this field are welcome.

The topics of interest for this Special Issue include but are not limited to:

  • Software architecture of an embedded system for multimedia-based smart CCTV
  • Fast and complexity-awareness algorithms for real-time CCTV multimedia computing
  • Signal optimization techniques for smart surveillance system
  • Privacy issues, protocols, and algorithms
  • Privacy and security metrics and quantification in sensor networks
  • Security issues, protocols, and algorithms
  • Sensors data fusion and processing at node side (client) or host side
  • Power-efficient implementation of new protocol and algorithms
  • Secure application case studies 
  • Standardization initiatives 
  • Architectural performance evaluation of system 
  • Big data analysis technique on smart surveillance system and application

Prof. Dr. Namje Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 10369 KiB  
Article
Python TensorFlow Big Data Analysis for the Security of Korean Nuclear Power Plants
by Sangdo Lee, Jun-Ho Huh and Yonghoon Kim
Electronics 2020, 9(9), 1467; https://doi.org/10.3390/electronics9091467 - 08 Sep 2020
Cited by 2 | Viewed by 3439
Abstract
The Republic of Korea also suffered direct and indirect damages from the Fukushima nuclear accident in Japan and realized the significance of security due to the cyber-threat to the Republic of Korea Hydro and Nuclear Power Co., Ltd. With such matters in mind, [...] Read more.
The Republic of Korea also suffered direct and indirect damages from the Fukushima nuclear accident in Japan and realized the significance of security due to the cyber-threat to the Republic of Korea Hydro and Nuclear Power Co., Ltd. With such matters in mind, this study sought to suggest a measure for improving security in the nuclear power plant. Based on overseas cyber-attack cases and attacking scenario on the control facility of the nuclear power plant, the study designed and proposed a nuclear power plant control network traffic analysis system that satisfies the security requirements and in-depth defense strategy. To enhance the security of the nuclear power plant, the study collected data such as internet provided to the control facilities, network traffic of intranet, and security equipment events and compared and verified them with machine learning analysis. After measuring the accuracy and time, the study proposed the most suitable analysis algorithm for the power plant in order to realize power plant security that facilitates real-time detection and response in the event of a cyber-attack. In this paper, we learned how to apply data for multiple servers and apply various security information as data in the security application using logs, and match with regard to application of character data such as file names. We improved by applying gender, and we converted to continuous data by resetting based on the risk of non-continuous data, and two optimization algorithms were applied to solve the problem of overfitting. Therefore, we think that there will be a contribution in the connection experiment of the data decision part and the optimization algorithm to learn the security data. Full article
(This article belongs to the Special Issue Intelligent Closed-Circuit Television and Applications)
Show Figures

Figure 1

20 pages, 3335 KiB  
Article
Upsampling Real-Time, Low-Resolution CCTV Videos Using Generative Adversarial Networks
by Debapriya Hazra and Yung-Cheol Byun
Electronics 2020, 9(8), 1312; https://doi.org/10.3390/electronics9081312 - 14 Aug 2020
Cited by 5 | Viewed by 4163
Abstract
Video super-resolution has become an emerging topic in the field of machine learning. The generative adversarial network is a framework that is widely used to develop solutions for low-resolution videos. Video surveillance using closed-circuit television (CCTV) is significant in every field, all over [...] Read more.
Video super-resolution has become an emerging topic in the field of machine learning. The generative adversarial network is a framework that is widely used to develop solutions for low-resolution videos. Video surveillance using closed-circuit television (CCTV) is significant in every field, all over the world. A common problem with CCTV videos is sudden video loss or poor quality. In this paper, we propose a generative adversarial network that implements spatio-temporal generators and discriminators to enhance real-time low-resolution CCTV videos to high-resolution. The proposed model considers both foreground and background motion of a CCTV video and effectively models the spatial and temporal consistency from low-resolution video frames to generate high-resolution videos. Quantitative and qualitative experiments on benchmark datasets, including Kinetics-700, UCF101, HMDB51 and IITH_Helmet2, showed that our model outperforms the existing GAN models for video super-resolution. Full article
(This article belongs to the Special Issue Intelligent Closed-Circuit Television and Applications)
Show Figures

Figure 1

21 pages, 787 KiB  
Article
A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities
by Prince Waqas Khan, Yung-Cheol Byun and Namje Park
Electronics 2020, 9(3), 484; https://doi.org/10.3390/electronics9030484 - 15 Mar 2020
Cited by 83 | Viewed by 14726
Abstract
The video created by a surveillance cameras plays a crucial role in crime prevention and examinations in smart cities. The closed-circuit television camera (CCTV) is essential for a range of public uses in a smart city; combined with Internet of Things (IoT) technologies [...] Read more.
The video created by a surveillance cameras plays a crucial role in crime prevention and examinations in smart cities. The closed-circuit television camera (CCTV) is essential for a range of public uses in a smart city; combined with Internet of Things (IoT) technologies they can turn into smart sensors that help to ensure safety and security. However, the authenticity of the camera itself raises issues of building up integrity and suitability of data. In this paper, we present a blockchain-based system to guarantee the trustworthiness of the stored recordings, allowing authorities to validate whether or not a video has been altered. It helps to discriminate fake videos from original ones and to make sure that surveillance cameras are authentic. Since the distributed ledger of the blockchain records the metadata of the CCTV video as well, it is obstructing the chance of forgery of the data. This immutable ledger diminishes the risk of copyright encroachment for law enforcement agencies and clients users by securing possession and identity. Full article
(This article belongs to the Special Issue Intelligent Closed-Circuit Television and Applications)
Show Figures

Figure 1

21 pages, 4672 KiB  
Article
Digital Forensics System Using PLC for Inter-Floor Noise Measurement: Detailing PLC-Based Android Solution Replacing CCTV-based Solution
by Min-Ji Choo and Jun-Ho Huh
Electronics 2019, 8(10), 1091; https://doi.org/10.3390/electronics8101091 - 26 Sep 2019
Cited by 1 | Viewed by 2742
Abstract
The neighborly dispute arising from the inter-floor noises has been increasing for the past two decades in Korean apartments or multi-unit houses sometimes leading to a serious consequence. Although there have been some attempts to resolve such a dispute, one of the underlying [...] Read more.
The neighborly dispute arising from the inter-floor noises has been increasing for the past two decades in Korean apartments or multi-unit houses sometimes leading to a serious consequence. Although there have been some attempts to resolve such a dispute, one of the underlying problems has to be solved first. That is, in addition to identifying the cause for the noise, it is necessary to prove who has actually suffered from the noise itself. Now that many of such a dispute is being settled at the civil court, producing objective evidence has become important. Therefore, digital forensics which is being widely used at the crime scenes by the police or other anti-crime organizations to collect evidences scientifically has begun to receive attention for the purpose of measuring noise levels. This technique has evolved in recent years following the rapid development in IT and ICT technologies but its problem is that such a technique has to be performed by the experts due to its complicated system so that those who need to measure the noise level usually outsource this work spending quite a sum. Thus, this study introduces a digital forensic system design which allows the user to effectively measure the inter-floor or neighborly noises directly and conveniently without much cost. The relevant system elements have been implemented with Java Android. Full article
(This article belongs to the Special Issue Intelligent Closed-Circuit Television and Applications)
Show Figures

Graphical abstract

Back to TopTop