Pixel tampering detection in encrypted surveillance videos on resource-constrained devices.
Ifeoluwapo AribilolaBrian LeeMamoona Naveed AsgharPublished in: Internet Things (2024)
Keyphrases
- resource constrained
- surveillance videos
- embedded systems
- resource constraints
- sensor networks
- video surveillance
- wireless sensor networks
- object classification
- video data
- tampering detection
- multi camera
- object tracking
- rfid tags
- event detection
- surveillance system
- real time
- video sequences
- authentication scheme
- multipath
- key management
- moving target
- video analysis
- compressed domain
- human activities
- sensor nodes
- low cost
- computer vision
- end to end
- energy consumption
- image sequences