Protecting digital media content
Communications of the ACM
Tamper Resistance Mechanisms for Secure, Embedded Systems
VLSID '04 Proceedings of the 17th International Conference on VLSI Design
Enabling Video Privacy through Computer Vision
IEEE Security and Privacy
PICO: Privacy through Invertible Cryptographic Obscuration
CVIIE '05 Proceedings of the Computer Vision for Interactive and Intelligent Environment
Scrambling for Video Surveillance with Privacy
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Reconfigurable trusted computing in hardware
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A system architecture for reconfigurable trusted platforms
Proceedings of the conference on Design, automation and test in Europe
Embedded Trusted Computing with Authenticated Non-volatile Memory
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
A Prototype of Trusted Platform Functionality on Reconfigurable Hardware for Bitstream Updates
RSP '08 Proceedings of the 2008 The 19th IEEE/IFIP International Symposium on Rapid System Prototyping
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Analysis and design of a hardware/software trusted platform module for embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
Implementation Aspects of Mobile and Embedded Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
A PrivacyCA for Anonymity and Trust
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Demo abstract: A Trusted Platform based framework for participatory sensing
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Applications of trusted computing in pervasive smart camera networks
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
A secure digital camera architecture for integrated real-time digital rights management
Journal of Systems Architecture: the EUROMICRO Journal
Security for mobile low power nodes in a personal area network by means of trusted platform modules
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Towards trustworthy participatory sensing
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
A systematic approach towards user-centric privacy and security for smart camera networks
Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras
TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing
AVSS '10 Proceedings of the 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance
Hi-index | 0.00 |
Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analog towards digital systems, the capabilities of cameras are constantly increasing. Today's smart camera systems come with considerable computing power, large memory, and wired or wireless communication interfaces. With onboard image processing and analysis capabilities, cameras not only open new possibilities but also raise new challenges. Often overlooked are potential security issues of the camera system. The increasing amount of software running on the cameras turns them into attractive targets for attackers. Therefore, the protection of camera devices and delivered data is of critical importance. In this work we present an embedded camera prototype that uses Trusted Computing to provide security guarantees for streamed videos. With a hardware-based security solution, we ensure integrity, authenticity, and confidentiality of videos. Furthermore, we incorporate image timestamping, detection of platform reboots, and reporting of the system status. This work is not limited to theoretical considerations but also describes the implementation of a prototype system. Extensive evaluation results illustrate the practical feasibility of the approach.