Video Surveillance A Distributed Approach to protect Privacy Update 20070912
安全防范视频监控高清晰度摄像机测量方法

[9] JEITA TTR-4605 揉像机测景方法(网络圾像机) [IO] CEA-639 Consumer camcorder or video,camera low light performance(消费型便捞式援
像机或视频摄像机低照度性能)
子静态图像分辨力浏试方法) [7] ISO/IEC 13818-1 Information 1echnology-Generic coding of moving picLurcs and associ一
ated audio information:Systems—Part 1(信息技术 运动图像及其伴音信息的通用编码 第1部分:
[4] ISO/IEC 14496-2 倌息技术 视听对象编码 第2部分:视频
[5] ISO/IEC 14496-10 倌息技术 音频-可视对象的编码 第10部分:高级视频编码 [6] TSO 12233 Photography-Electronic still-picture cameras一Resolution measurements(电
龙牛网 下载
龙牛网 下载
龙牛网 下载
龙牛网 下载
龙牛网 下载
龙牛网 下载
龙牛网 下载
GA/T 1128一2013
。a
Z
参考
献
文
UN8,_
L
[l] GB 28281 安全防范视猴监控联网系统信息传输 、 交换 、控制技术要求
VI
[2) GB/T 15865 一 1995 摄像机(PAL/SECAM/NTSC)润最方法 第1部分:非广播单传感器
9
摄像机
[3] ISO 15739 浏试图
Bosch NDC-265-P 720p IP Dome Camera 说明书

The Bosch NDC-265-P 720p IP dome camera is a ready-to-use, complete network video surveillance system inside a compact camera. This camera brings Bosch’s high-performance technology into the realm of small office and retail businesses by offering a cost-effective solution for a broad range of applications.To use the camera as a stand-alone video surveillance system, simply take it out of the box, assemble it according to the quick installation guide, start it, and walk away – it’s already recording. In this mode, no additional equipment is required.For medium-to-large-scale or growing systems, the camera easily integrates with the Bosch Divar 700 Series recorder. It uses H.264 compression technology to give clear images while reducing bandwidth and storage by up to 30%.FunctionsBest-in-class HD 720p image performanceThe camera delivers the clearest HD 720p images and most accurate colors within its class. Progressive scan ensures moving objects are always sharp.Tri-streaming videoTri-streaming allows a data stream to be encoded simultaneously according to different, customized settings. Two types of streams can serve different purposes. For example, use H.264 stream for local recording and viewing, and the M-JPEG stream to provide compatibility with legacy DVRs.Efficient recordingA removable microSD/SDHC card offers edge recording inside the IP dome camera. This card not only saves network bandwidth but also reduces the requirement for a high-capacity hard disk or DVR. When used with a microSD/SDHC card, the camera is a complete, self-contained surveillance system without the need for additional equipment.The camera can also be used with an iSCSI server connected via the network to store long-term recordings. 16-channel PC surveillance softwareThe bundled PC surveillance software offers a user-friendly interface to support easy installation and configuration. A wizard allows the configuration of multiple cameras simultaneously using an auto detection device. Multiple cameras can be monitored in one screen and video clips on microSD/SDHC cards can be archived, searched, and exported in a single application.NDC-265-P HD 720p IP Dome Camera▶Complete network video surveillance system inside adome camera▶HD 720p progressive scan for sharp images of movingobjects▶Tri-streaming: Dual H.264 and M-JPEG simultaneously▶Removable microSD/SDHC card offers days ofstorage inside camera▶PC surveillance software supports multiple cameramonitoring▶Two-way audio and audio alarm▶Power over Ethernet (IEEE 802.3af compliant)▶ONVIF conformant2ONVIF 1.0 conformantThe latest Open Network Video Interface Forum (ONVIF) standard ensures compatibility with other surveillance products. This will contribute to a reduction in future upgrade or migration costs.Two-way audio and audio alarmTwo-way audio allows remote users to listen in on an area and communicate messages to visitors or intruders via an external loudspeaker (not included). Audio detection can be used to generate an alarm, if needed.Tamper and motion detectionA wide range of configuration options is available for alarms signaling camera tampering. A built-in algorithm for detecting movement in the video can also be used for alarm signaling.Power-over-EthernetPower for the camera can be supplied via a Power-over-Ethernet (IEEE 802.3af) compliant network cable connection. With this configuration, only a single cable connection is required to view, power, and control the camera.Certifications and ApprovalsSafety EU: EN 60950-1: 2006,Reference IEC 60950-1:2005US: UL 60950-1:1st edition dated October 31, 2007Canada: CAN/CSA-C22.2 NO. 60950-1-03EMC EN 50130-4:1995 + A1:1998 + A2:2003FCC Part15 Subpart B, Class BEMC directive 2004/108/ECEN 55022 class BEN 61000-3-2 :2006EN 61000-3-3 : 1995+A1 :2001+A2 :2005EN 55024AS/NZS CISPR 22 (equal to CISPR 22)ICES-003 Class BEN 50121-4:2006Product Certifica-tionsCE, FCC, UL, cUL, C-tick, CB, VCCIPower supply CE, UL, cUL, PSE, CCC Installation/Configuration NotesConnections1I/O2Power 12 VDC3Ethernet RJ454Audio Line-out5Audio Line-inDimensionsmm (in)Parts IncludedQuantity Component1NDC-265-P 720p IP Dome camera1Quick Installation Guide1Installation paper sticker1Torx screwdriver for Dome cover1CD ROM1Camera fixing screw kit1MicroSDHC card (warranty provided by card manufacturer) 1Universal power supply with US, EU and UK plug3Technical SpecificationsPowerInput voltage+12 VDC orPower-over-EthernetPower consumption 4.2 W (max)VideoSensor type¼-inch CMOSSensor pixels1280 x 800Sensitivity 1.0 lxVideo resolution720p, 4CIF/D1, VGA, CIF, QVGA Video compression H.264 MP (Main Profile); H.264 BP+(Baseline Profile Plus); M-JPEGMax. frame rate30 fps (M-JPEG frame rate can vary de-pending on system loading)LensLens type Varifocal 2.7 to 9 mm, DC Iris F1.2 tocloseLens mount Board mountedConnectionAnalog video out 2.5 mm jack for installation onlyAlarm input Short or DC 5V activationRelay out Input rating Maximum 1 A 24 VAC/VDC AudioAudio input Built-in microphoneLine in jack connectorAudio output Line out jack connectorAudio communication Two-way, full duplexAudio compression G.711, L16 (live and recording)Local StorageMemory card slot Supports up to 32 GB microSD/SDHCcard(An SD card of Class 4 or higher is recom-mended for HD recording) Recording Continuous recording, ring recording.alarm/events/schedule recording Software ControlUnit configuration Via web browser or PC surveillance soft-wareNetworkProtocols HTTP, HTTPs, SSL, TCP, UDP, ICMP,RTSP, RTP, Telnet, IGMPv2/v3, SMTP,SNTP, FTP, DHCP client, ARP, DNS,DDNS, NTP, SNMP, UPnP, 802.1X, iSCSI Ethernet10/100 Base-T, auto-sensing, half/full du-plex, RJ45PoE IEEE 802.3af compliant MechanicalDimensions Diameter: 135 mm (5.32 in)Height: 102 mm (4 in)Weight568 g (1.25 lb) approx. EnvironmentalOperating temperatureCamera-10 ºC to +50 ºC (14 ºF to +122 ºF)Operating temperatureUniversal Power Supply Unit0 ºC to +40 ºC (+32 ºF to +104 ºF) Storage temperature-20 ºC to +70 ºC (-4 ºF to +158 ºF) Humidity10% to 80% relative humidity (non con-densing)Ordering InformationNDC-265-P 720p IP Dome CameraHD 720p IP Dome Camera System includingvarifocal lens and power supplyNDC-265-P4Americas:Bosch Security Systems, Inc. 130 Perinton Parkway Fairport, New York, 14450, USA Phone: +1 800 289 0096 Fax: +1 585 223 9180***********************.com Europe, Middle East, Africa:Bosch Security Systems B.V.P.O. Box 800025600 JB Eindhoven, The NetherlandsPhone: + 31 40 2577 284Fax: +31 40 2577 330******************************Asia-Pacific:Robert Bosch (SEA) Pte Ltd, Security Systems11 Bishan Street 21Singapore 573943Phone: +65 6258 5511Fax: +65 6571 2698*****************************Represented by© Bosch Security Systems Inc. 11 | Data subject to change without notice T7233796747 | Cur: en-US, V2, 5 Jan 2011。
群晖surveillance内存占用

群晖surveillance内存占用【实用版】目录1.群晖 surveillance 简介2.内存占用的影响因素3.解决内存占用过高的方法4.结论正文1.群晖 surveillance 简介群晖 Surveillance 是一款适用于家庭和办公室的网络视频监控软件,用户可以通过智能手机或平板电脑随时随地查看监控画面。
该软件支持多种设备和操作系统,包括 Windows、macOS、iOS 和 Android 等。
通过群晖 Surveillance,用户可以轻松地设置监控摄像头、查看实时视频、回放录像等功能。
2.内存占用的影响因素在使用群晖 Surveillance 时,内存占用是一个需要注意的问题。
内存占用的大小受以下几个因素影响:(1)监控摄像头数量:摄像头数量越多,实时视频流的处理和存储所需的内存资源就越多。
(2)视频质量:高质量的视频流需要更多的内存来存储和处理。
用户可以根据自己的需求调整视频质量以降低内存占用。
(3)存储方式:群晖 Surveillance 支持本地存储和网络存储两种方式。
本地存储需要更多的内存来存储视频文件,而网络存储可以减轻内存负担。
(4)其他因素:如操作系统、硬件配置等也可能对内存占用产生影响。
3.解决内存占用过高的方法为了避免内存占用过高导致系统崩溃或性能下降,用户可以采取以下措施:(1)优化摄像头数量:减少不必要的摄像头,以便降低内存占用。
(2)调整视频质量:降低视频质量以减少内存占用。
用户可以根据自己的需求在设置中调整视频质量。
(3)选择合适的存储方式:如果内存资源有限,建议采用网络存储方式以减轻内存负担。
(4)升级硬件配置:提高内存容量和处理器性能,以应对更高的内存需求。
4.结论群晖 Surveillance 作为一款网络视频监控软件,在提供便捷的监控功能的同时,也需要用户关注内存占用问题。
视频监控系统选购指南说明书

W H I T E PA P E RVideo Surveillance in Focus:Selecting the right system to meet your organization’s needsPlanning with the Future In MindThe first question organizations should ask is: How will this organization use a video surveillance system and what might it use the sys-tem for in the future?The questionsounds obvious, but surprisingly, manyorganizations do not consider the second half of this question before making a purchase decision. The second part of the question is the most critical, be-cause an organization’s use of its video surveillance system can change significantly over time.For instance, when video surveillance systems firstbecame popular, many municipalities simply installedVideo surveillance systems are helping municipalities, businesses and public safety organizations across the globe protect their citizens, protect their property and put criminals behind bars. But given the wide variety of technology choices for video surveillance, selecting the right system can seem like a daunting task. Fortunately, it doesn’t have to be. Organizations that wish to install, add to or upgrade a video surveillance system can ask justthree powerful questions to guide them in selecting the optimal video system.cameras as a deterrent to crime. But today, even if an organization installs a video system for a specific purpose – such as simply to monitor activity in a high crime area – that same organization might find itself using that video for much more.It might be used in a courtroom to help prosecute a crime. Or the video could be sent to first responders when they are on the way to a crime scene so they are better prepared to handle the situation when they arrive.Today, many private and public safety organizations are also sharing video from their systems with other organizations in emergency situations. This means that video from many disparate systems needs to be piped to and accessed by many different command centers, such as the police department’s command center, the fire department’s command center or the Department of Transportation’s (DOT’s) command center.QUESTION 1:How will this organization use a video surveillance system and what might it use the system for in the future?The Easiest Way to Share VideoGetting the different organizations’ video and command systems – which often use very differ-ent technology – to talk to one another can be a challenge. Fortunately, this challenge can be solved using software called physical security information management (PSIM). This software neutralizes the incompatibilities between different video systems and allows them to easily communicate with each other.Using PSIM software, an organization can easily access and manage the video from disparatesurveillance system – even if they have no idea what camera, compression or transmission technology that system uses. Using PSIM software, organiza-tions can even easily track movement across many different types of cameras and video systems owned by many organizations.For instance, PSIM software can facilitate the tracking of suspects as they move from a private parking lot onto the street. Or the police dispatch center can quickly tap into and view video from the Department of Transportation’s cameras no matter what technology the DOT system uses.Hassle-free Video System ManagementIn addition, if an organization finds that the video surveillance system it installed several years ago does not meet its current needs and decides to upgrade just part of its system, PSIM software can help the organization easily manage both the old and the new system. For instance, this software can be used to neutralize the differences between an “old” analog and a “new” IP-based video system. This allows organizations to operate and manage the two different video networks as one integrated system using one user interface. This reduces training costs as well as video storage and retrieval headaches.Quality, Frame Rate, Cost and Bandwidth:Finding the Right BalanceThe second question that organizations need to ask is: What level of video quality is needed – and how does this affect band-width needs? First, an organization must determine how much detail it needs in its video recordings.For instance, security guards at an organization might use a video surveillance system to simply track the movements of someone who has entered a restricted area. There might not be any need to recognize the identity of that individual. But in a courtroom, jurors must be capable of recognizing a face or reading a license plate from a video.Picture quality is determined by resolution, and the primary measurement for resolution is pixels per foot (PPF). As a rule of thumb, the minimum pixel measurement needed to recognize a face is 40 by 40 or 1600 pixels. To read a license plate, a minimum of 80 by 80 or 6400 pixels is required.Another feature to consider is frame rate. Generally, video being viewed live should support frame rates of 24 to 30 frames per second (fps) – which are the lowest speeds that the eye perceives as actual motion – to avoid eye strain. Depending on how the video is supported, however, some security opera-tions may find 10 to 15 fps acceptable today for basic video capture.In contrast, for video that is being reviewed after it is recorded, a higher resolution is often more important than a high frame rate. The higher resolution allows individuals to be recognized and license plates to be read more easily.It is critical to realize that video systems that sup-port better resolution and faster frame rates require higher bandwidth capabilities and thus cost more. Fortunately, using compression techniques, one can maintain a higher image quality while reducing band-width needs – and cost. But here again, organiza-tions must be willing to make choices.For instance, using a compression technique that is too aggressive results in anomalies that can damage the video’s credibility in court. Once again, an orga-nization must first determine how it wants to use its video system both now and in the future to make the right choices in this area.QUESTION 2:What level of video quality is needed – and how does this affect bandwidth needs?The Importance of ScalabilityThe third question to consider is: How much storage doI need for my video system? Unfortunately, video storage is oftenjust an afterthought with many organiza-tions, and this can lead to problems in the future.In fact, even when an organization starts with a small video system, it is critical to select a system that can easily scale because the storage require-ments for video surveillance systems are extremely large – and expand very quickly.For example, just one megapixel camera (1280 x 1024 pixels) will generate 80 kilobits of data per frame at 30 frames per second. In total, it will generate 207 gigabytes of data each 24-hour day. Even if motion analytics is used to record only when motion is detected, the camera will generate 20.7 gigabytes of data per day (assuming motion 10 percent of the time).Even if the camera records only when motion is detected, one year’s worth of video for just two cameras would generate 15 terabytes of data. And a law enforcement organization using that data as evidence in a trial might be required to store that data for at least five years.The Cost of Storing VideoOnce an organization’s storage needs reach 10 terabytes of data or higher, storing video usingtraditional systems – where data is backed up via tapes or hard drives – can become very costly. Why? As the amount of stored data grows, moreback-up copies of that data are needed. This not only leads to exponential increases in costs, it also leads to security concerns because the data is now located in many different facilities.Even when multiple back-up copies of data are made, the traditional data backup system is not that reliable, given that between one and five percent of hard drives fail every year and between 10 and 20 percent of tapes fail.Fortunately, there is an alternative way to store data using a technique called Information Dispersal. This technique stores slices of information on a network of servers – and then reassembles it when it isneeded. In addition, a file can be reassembled even if all the slices are not available, so if one server fails, the data can still be retrieved intact.The cost of a dispersed system is significantly less as well. With a large-scale storage system, where a company might need three back-up copies of the data using a traditional storage model, a dispersed storage system can cost one-fifth to one-half as much as a traditional storage system. Plus thedispersed back-up system will consume one-eighth the power and require much lower bandwidth.The bottom line is that once an organization under-stands how it wants to use its video surveillance system – and what it might use that system for in the future – it can more easily choose the right video system. By asking just three key questions, an organization will be well on its way to selecting a video surveillance system that meets its unique needs – both today and in the future.Investigate FurtherAs with any technology solution, wireless video surveillance networks are evolving and improving rapidly. That’s why it’s important to partner with a provider that knows wireless technology inside and out. For nearly 80 years, Motorola has been recognized as the leading provider of wireless communications, networks, devices and services. To learn more about how Motorola can help government and public safety agencies develop and deploy intelligent wireless video solutions that will provide immediate benefits and position your organization to take fast advantage of future innovation, please visit us at /videosurveillance.Motorola, Inc. 1301 E. Algonquin Road, Schaumburg, Illinois 60196 U.S.A. /videosurveillanceMOTOROLA and the stylized M Logo are registered in the U.S. Patent and Trademark Office. All other products or service names are the property of their registered owners.© Motorola, Inc. 2009QUESTION 3:How much storage do I need for my video system?。
HR-NR5000-2U系列NVR 说明书

The HR-NR5000-2U series NVRs are designed for the dynamic needs ofthe emergent digital video surveillance market. With high image resolution,seamlessly integrated mass storage, and alarm recording, The NVRdeliver flexible and powerful performance to security professionals fordistributed enterprise architectures and centralized managementapplications.The NVR are a complete network based video recording solution whichsupports various video compression formats of IP cameras (H.264,MPEG-4, and MJPEG), and image resolutions, from CIF/ D1, VGA, tomultiple megapixels. Integrating with megapixel IP cameras, MatriVideo™provides a breakthrough platform to view high resolution video from yoursurveillance system. Simply plug into the network infrastructure and theNVR can display the video image from any IP camera source through theEthernet. The IP cameras can be installed without cumbersome cabling,meaning that setting up a new IP-based security system has never beeneasier or more cost effective.Based on the embedded Linux OS, The NVR_On_Chip technology,combined with dual power supplies and RAID-5 and RAID-6 enhancement,provides customers a stable and secure system. The embedded Linux OSincreases overall system availability by reducing system downtime causedby power supply and hard drive failure. It has the capability to keep acomplete six month audit trail database of user activities. MatriVideo™NVRs allow different recording settings - continuous, motion detected,event triggered, and scheduled recording. This increases the data storageutilization giving more space to store video and saving money. The NVR provide the most intelligent and comprehensive video search tools. Users can retrieve the desired video images with a few simple clicks. Its graphical display illustrates the recorded video history, yet with quick indicators for alarm instances (video loss, motion detection, real-time video analytics, sensor or digital inputs, even POS and Access Control System events), and manual recording instances (special events triggered by security personnel onsite).a high performance enterprise-class network based solution for distributed architecturedata protection (optional)ID-1304NR52UFunctionOperating systemImage controlDual watchdogVideo inputAudio inputSupported resolutionSupported formatMax frame rate**Recording modesPre/post alarm recordingInternal storageInternal RAID5 and RAID6External storageSearching methodMonitoring environmentSpeaker outAudio line inSerial portKeyboardEthernetUSBVGA outputI/O controlsOptional remote I/O ModuleHardware accessoriesVideo servers and IP-camerasACSElectric power sourceDual power suppliesPower outputOperating temperatureHumidityDimension (mm)Weight (kg)ModelNetwork video recorder Embedded Linux Contrast / Brightness / Saturation / Hue Yes 16 / 32 / 48 / 64 channels 16 / 32 / 48 / 64 channels All resolutions supported MJPEG / MPEG4 / H.26430 fps (NTSC) / 25 fps (PAL)Continuous / Scheduled / Motion detected / Intelligent video detected / Event triggered / Manual / API 1 ~ 60 seconds Up to 8 swappable HDDs Optional Archive Server / IP SAN / SAS Date / Time / Camera / Alarm list Command Center(Lite/Dual), nCCTV 112 x RS-232PS/2 and USB 2 x RJ-45, 10/100/1000Mbps 6 x USB2.015 pin female D-SUB Max. 128 Inputs / 64 Outputs using Remote I/O Modules (optional)ID-IO2000-1600 (16 DI), ID-IO2000-0008 (8 DO), ID-IO2000-0808 (8 DI / 8DO) C232-485i (RS232 / 485 converter)1 x Power cable 3S, ACTi, Appro, Arecont Vision, Arlotto, AXIS, Basler, Brickcom, CNB Technology, Hikvision, Hi-Sharp, Hitron, Hunt, Instek Digital,ITX, IQinVision, MatriCam, Messoa, Mobotix , Pixord, Pelco, Probe, Samsung, Secubest, SANYO, SONY , Vivotek Cardax, CEM, Tyco AC 100 ~ 240V Optional 400W 0 ~ 40°C Max. 90%, non-condensing 575(L) x 485(W) x 95(H) mm (w/o box)14.1 Kg (w/o box)HR-NR5416-2U / HR-NR5432-2U / HR-NR5448-2U / HR-NR5464-2U SpecificationsFront ViewRear View Power socket Exhaust fan a) The actual video display performance may vary according to type of camera(s) and lighting condition.b) Product specifications and availability are subject to change without notice.COM VGA Speaker out / audio in USB DVI PS/2Ethernet。
ves评估

ves评估VES(Video Evaluation Standard)是一种对视频质量进行客观评估的指标体系,主要用于评估视频编码和传输质量。
VES评估包括以下几个方面:分辨率、比特率、帧率、压缩编码器效能、视频详细度、运动估计、码率失真表现、变化场景、失真度、编码格式、音视频同步等。
首先,分辨率是用来衡量视频清晰度的一个重要指标。
通常使用像素数量来表示,分辨率越高,视频的细节越丰富,清晰度越高。
在VES评估中,会对视频的分辨率进行检测,以确认视频是否达到了预期的清晰度要求。
其次,比特率是指视频编码过程中每秒传输的数据量。
比特率越高,视频质量越好,但也会造成传输压力增大。
VES评估中会对比特率进行检测,以确认视频是否符合预期的传输质量。
帧率是指视频中每秒显示的图像帧数。
帧率越高,视频显示的动作就越流畅。
在VES评估中,帧率也是一个重要的参考指标,用于评估视频的流畅度和动作表现力。
压缩编码器效能是指编码器在压缩视频时的效率和准确性。
VES评估中,会对不同的编码器进行测试,以确定其在视频压缩方面的表现。
视频详细度是指视频的细节表现能力。
VES评估中,会对视频的细节进行评估,以确定视频的清晰度和细节表现能力。
运动估计是指对视频中的运动进行检测和估计。
VES评估中,会对视频中的运动进行评估,以确定运动估计的准确性和准确性对视频质量的影响。
码率失真表现是指在特定比特率下,视频质量的损失程度。
VES评估中,会对不同比特率情况下的视频质量进行评估,以确定视频的码率失真表现。
变化场景是指视频中场景的变化情况。
VES评估中,会对视频中的场景变化进行检测,以确定视频的场景变化情况对视频质量的影响。
失真度是指视频质量的失真程度。
VES评估中,会对视频的失真度进行评估,以确定视频的失真程度和失真对观看体验的影响。
编码格式是指视频编码时使用的格式。
VES评估中,会对不同的编码格式进行测试,以确定不同格式对视频质量的影响。
VIDEO SURVEILLANCE

专利名称:VIDEO SURVEILLANCE发明人:ROBAATO SHII ORIBAA JIYUNIAA 申请号:JP30044488申请日:19881128公开号:JPH02166986A公开日:19900627专利内容由知识产权出版社提供摘要:PURPOSE: To provide an inexpensive and flexible system by multiplexedly transmitting modulated signals from plural video cameras, applying signals to plural video screens and tuners in parallel by a signal splitter and controlling the tuners by a computer. CONSTITUTION: Respective video modulators 2 modulate signals outputted from cameras 1 and plural combiners 3 connected in series apply the signals from all the modulators 2 to the signal splitter 4 through a video signal transmission line 5. The splitter 4 supplies the received signals to plural video display devices 6, each of which transmits the supplied signal to a channel selected by a tuner 7 and a display screen 8 displays a picture included within the visiual field of the camera 1. The computer controls the tuners 7 and executes sequence control so as to display pictures observed by a series of cameras 1 on the screen 8. Consequently the flexible system reducing wiring cost can be obtained.申请人:ROBAATO SHII ORIBAA JIYUNIAA更多信息请下载全文后查看。
达华Ultra 4K HDCVI摄像头系列文档

System OverviewExperience the superior clarity of Dahua's Ultra 4K HDCVI cameras for vast coverage and superior image details. As the world's first 4K over coax cameras, the Dahua Ultra 4K HDCVI series leverages existing coax infrastructures to deliver forensic-level images seamlessly and more cost effectively. The outstanding performance, easy installation and rugged design make the camera an ideal choice for mid- to large-size businesses and for applications in large, open spaces (city centers, parks, campuses) where highly reliable surveillance and construction flexibility are valued.FunctionsMicro Four Thirds SystemThis Dahua camera takes advantage of the The Micro Four Thirds System, an interchangeable-lens photography system that offers superior picture quality from a smaller lens. This system offers nine times the surface area and pixel size of the standard 1/3-in. sensor commonly used in video surveillance applications. The larger surface area and pixel size increases the light gathering capability of the sensor to deliver color images in ultra-low light conditions in the 8MP camera class when other cameras have switched to monochrome.4K Resolution4K resolution is a revolutionary breakthrough in image processing technology. 4K delivers four times the resolution of standard HDTV 1080p devices and offers superior picture quality and image details. 4K resolution improves the clarity of a magnified scene to view or record crisp forensic video from large areas.Starlight+ TechnologyFor challenging low-light applications, Dahua’s Starlight Ultra-low Light Technology offers best-in-class light sensitivity, capturing color details in low light down to 0.001 lux. The camera uses a large pixel sensor, smart imaging algorithms and a set of optical features to balance light throughout the scene, resulting in clear images in dark environments.Ultra Series | A83AA9M43 Lens InterfaceThe lens is a key component of any security camera and one that directly effects the quality of the image. The Dahua 4K HDCVI box camera features the M43 lens interface, typically found on most SLR cameras. This camera is compatible with all types of M43 lenses, including fixed and vari-focal lenses.Four Signals over One Coaxial CableHDCVI technology simultaneously transmits video, power, data, and audio over a single coaxial cable. Dual-way data transmission allows the HDCVI camera to communicate with an HCVR to send control signals or to trigger alarms. HDCVI along with PoC technology delivers power 1 to devices at the edge, simplifying installation.Long Distance TransmissionHDCVI technology guarantees real-time transmission over long distances without loss of video quality. HDCVI cameras provide the same resolution as most IP network camera systems using existing RG-59, RG-6, or CAT 6 UTP cabling.SimplicityHDCVI technology seamlessly integrates traditional analog surveillance systems with upgraded, high-quality HD video, making it the best choice to protect security investments. The plug and play approach enables full HD video surveillance without the hassles of configuring a network. Multiple OutputsThe camera supports HDCVI and CVBS signal outputs simultaneously with one HDMI connector and one BNC connector. These output signals allow the camera to integrate with various devices, including analog matrix systems and monitors.1. Requires PoC Transceivers for each channel and an external power supply for each transceiver.•Micro Four Thirds 8 MP Progressive-scan CMOS Sensor •M43 Lens Interface•3840 x 2160 at 30 fps (HDMI) and 3840 x 2160 at 15 fps (BNC) •Simultaneous HDMI and HDCVI/CVBS Video Output •Starlight+ Technology for Ultra-low Light Sensitivity•Ultra Wide Dynamic Range (140 dB) and 2D and 3D Noise Reduction •Built-in Microphone •Software Upgrade via USB •Five-year Warranty**Warranty applies to products sold through an authorized Dahua Dealer.2. 4K at 15 fps resolution achievable with the following Dahua HDCVI DVRs: C52A1N/C52A2N/C52A3N(Channel 1) and X58A3S (Channels 1 and 9).3. Transmission distance results verified by real-scene testing in Dahua's test laboratory. Actual transmissiondistances may vary due to external influences, cable quality, and wiring structures.Rev 001.010© 2018 Dahua. All rights reserved. Design and specifications are subject to change without notice.PFB110WWall/Ceiling MountBracketPFB121WWall Mount Bracket PFM800-EPassive HDCVI Balun PFM810POC Transceiver DH-PFM320D-015Power Adapter DH-PFM321D-US Power AdapterDH-PFL085-J12M 12 MP Fixed LensDH-PFL2070-J12M 12 MP Vari-focalLens。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Video Surveillance:A Distributed Approach to protect Privacy⋆Update:2007/09/12Martin Schaffer and Peter SchartnerUniversity of Klagenfurt,AustriaComputer Science·System Security{m.schaffer,p.schartner}@syssec.atAbstract.The topmost concern of users who are kept under surveil-lance by a CCTV-System is the loss of their privacy.To gain a highacceptance by the monitored users,we have to assure,that the recordedvideo-material is only available to a subset of authorized users under ex-actly previously defined circumstances.In this paper we propose a CCTVvideo surveillance system providing privacy in a distributed way usingthreshold multi-party computation.Due to theflexibility of the accessstructure,we can handle the problem of loosing private-key-shares thatare necessary for reconstructing video-material as well as adding newusers to the system.If a pre-defined threshold is reached,a shared up-date of the master secret and the according re-encryption of previouslystored ciphertext without revealing the plaintext is provided.1IntroductionThe major concern of users monitored by a CCTV video surveillance system is the loss of their privacy.It is obvious,that encrypting the recorded material raises the acceptance by the monitored users.But what about unauthorized decryption?In this paper we propose several mechanisms concerning the setup, the recording and the retrieval of videos,and the key management during all these phases.Some of the mechanisms involve multi-party computation(MPC, cf.[18,6,8]),so that we can enforce dual control.A trusted third party(TTP) may also be used to enforce dual control.But if this TTP is compromised,a single unauthorized person may be able to decrypt the whole video-material. The main requirements for our system include:–Privacy-protection of the monitored users.–Shared generation and update of keys and key components.–Tree-based access structure to provide a mechanism for substitution.–Dual control(4-eyes principle)within the video retrieval process.–Minimal access of authorized people to monitored information.Several papers about video surveillance exist,most of which focus on the ability to detect and identify moving targets.Only a few discuss the privacy protection of recorded material.The authors in[9]for example describe a coop-erative,multi-sensor video surveillance system that provides continuous coverage over battlefield areas.In[10]the emphasis lies on face recognition–a solution to protect privacy by de-identifying facial images is given.A similar approach can be found in[2]concentrating on videos in general.The most general solution to cover privacy with respect to monitoring targets seems to be presented in [16].However the system in[16]uses a privacy preserving video console provid-ing access control lists.Once the console has been compromised videos may be decrypted without any restrictions.In our paper we focus on video surveillance where real-time reactions are not necessary like in private organisations where staffhas to be monitored.In case of criminal behaviour recorded video material can be decrypted if sufficiently enough instances agree–this e.g.is not provided in[10].Our approach can certainly be combined with the general solution proposed in[16]but also used for other applications such as key escrow as proposed in[15].Video CamerasFig.1.System ArchitectureFigure1shows the system architecture of the proposed system including all components and interactions within the setup phase,recording phase,retrieval phase and key putations within dotted boxes represent MPCs whereas undotted boxes are performed by a single belled arrows show which instance(s)deliver(s)or receive(s)which value(s).The proposed system employs the following hardware-components and users: Video Cameras.According to the monitored processes,video cameras record either single pictures or videos.Since we want to guarantee privacy of the2monitored users,we have to encrypt the video material.After encrypting the video,it is sent to the video server S V,whereas the key used for this encryption is(encrypted and)sent to the key server S K.Video Server S V.Here the received encrypted video material is stored in a suitable database so that it can be easily retrieved,if required.Key Server S K.Keys that are used for encrypting videos are chosen interval-wise(so we provide minimal access to videos).Therefore,we call them interval-keys(ikeys)and store them encrypted at S K.Users.In this paper,the term user always means an instance retrieving videos, not a person monitored by the system.Within strict regulations(e.g.dual control),these users are authorized to decrypt the stored videos.Due to the fact that enterprises are often hierarchically structured,we have to provide easy deputy-mechanisms.If a user is not available,he may be simply replaced by a qualified set of users of the next lower level in the hierarchy. Smartcards.In order to enforce the cooperation of several users in the decryp-tion process,the corresponding private key d is shared among a group of users.Hence,each user holds a share of the private key,which is stored ina pin-protected smartcard.Note that the private key d is never available inthe system or present during intermediate results of the decryption process.The proposed system consists of the following procedures:Setup Phase.To initialize the system,the users perform a MPC which pro-vides each user with a random share of private key d in a fair way.Addition-ally,the users generate shares of the corresponding public key.These shares are sent to the video cameras which reconstruct the public key e. Recording Phase.Due to performance reasons,the recorded video-material is encrypted by use of a hybrid cryptosystem.Hence,each video camera has to hold the public key e.The ikey is then encrypted by use of an asymmetric scheme(employing the public key e)and isfinally sent to S K,whereas the symmetrically encrypted video is sent to S V.Retrieval Phase.Within the retrieval phase,the authorized users perform a MPC which provides them with the ikey of the specific interval,without direct usage of the private key d(which corresponds to the public key e). Key Management.In order to take part in the system,a new user has to re-trieve a share of the private key d.To achieve this,the users already enrolled in the system perform a MPC whichfinally provides the new user with his share.Since the decryption process involves threshold cryptography,some smartcards(and the shares stored there)may be lost,without any danger for the privacy of the stored video material.Additionally,we employ a mech-anism which regularly updates the remaining shares(without changing the shared private key)and hence makes the shares on the lost(or stolen)smart-cards useless.Finally,we propose a mechanism to perform a shared update of d and the corresponding public key e.It is obvious that in this case,all en-crypted ikeys have to be re-encrypted,whereas the encrypted video material remains unchanged since the ikeys have not been compromised.3In the remainder of the paper we will give a more formal description of the processes briefly discussed by now.Note that within the proposed mechanisms we will only care about passive adversaries(see[6,8])from inside the system and we will assume that there exist pair-wise protected links between the individual parties participating in the surveillance process.2PreliminariesThroughout this work let G q be a group of prime order q,where the Discrete Logarithm Problem and closely related problems are believed to be hard.More-over,let g be a generator of G q.For computations in Z Z q we omit to write MOD q, since this will be clear from the context.The direct successors of the root of the tree-based access structure are calledfirst-level-users and united in the set U. To reduce complexity,we will only consider one video camera called V C.2.1Shamir’s Secret SharingTo share a secret s∈Z Z q among n users resulting in the shares s1,...,s n(denoted by s→(s1,...,s n))we use the following t-degree polynomial according to[17]:s i=g(i),g(x)=s+tj=1r j x j,r j∈R Z Z∗q(1)In order to reconstruct the secret s(denoted by(s1,...,s n)→s)we need at least t+1shares,because there are t+1unknown values in a t-degree polynomial.For efficiency reasons we use the interpolation formula of Lagrange(see e.g.[12]):s=g(0),g(x)=ni=1s iλs x,i,λs x,i=n j=1j=i(x−j)(i−j)−1(2)Several computations of the upcoming sections use the following transformation:z=y s(2)=y n i=1s iλs0,i=n i=1y s iλs0,i(3) 2.2Symmetric CryptosystemRecording videos causes a lot of data.Hence,we apply a symmetric algorithm (e.g.AES,see[1])to encrypt the video-material.We simply define the encryption function E S(m,k)=c and decryption function D S(c,k)=m.42.3ElGamal CryptosystemWe suppose that the reader is familiar with the basic ElGamal cryptosystem[4]. Assuming the key generation has already taken place resulting in the public key e∈G q and the private key d∈Z Z q,the encryption E and decryption D are: E(m,e)=(gα,meα)=(c1,c2),e=g d,α∈R Z Z q(4)D((c1,c2),d)=c2 c d1 −1=m(5) 3ElGamal Threshold Decryption and Re-encryptionA public key cryptosystem can be shared in several ways.The plaintext,the public key,the ciphertext as well as the private key can be used in a distributed way.For a video surveillance system sharing the encryption process does not make sense.However,sharing the decryption process enables us to realize dual-control.To increase the security it is very useful to share the ciphertext as well. For lack of space we decided not to describe this variation.Instead we focus on how to share the decryption process emphasizing on selected aspects of the corresponding management of key-shares.Due to its simplicity we use ElGamal threshold decryptionfirstly proposed in[3].The basic ElGamal decryption can be divided into two parts so that its computation only uses shares of private key d.Therefore d has to be shared using a t-degree polynomial:d→(d1,...,d n). The ElGamal decryption function can be modified replacing d with its Lagrange-representation over the shares:D((c1,c2),d)=c2 c d1 −1(3)=c2 n i=1cλd0,i1i −1(5)=m,c1i=c d i1(6) Now we can divide this computation into the following two sub-functions: Decryption Step1.This step has to be done by at least t+1shareowners.D1(c1,d i)=c d i1(6)=c1iDecryption Step2.To compute m at least t+1outputs of D1are required.D2((c11,...,c1n),c2)=c2 n i=1cλd0,i1i −1(6)=mIf the private key d has been compromised we have to provide an update of d and a re-encryption of the corresponding ciphertext without revealing plaintext. In[19]an approach based on distributed blinding is given.There,a ciphertext is first blinded by a randomly chosen and encrypted value.After having decrypted the blinded ciphertext in a particular way the resulting blinded plaintext is en-crypted with the new public key andfinally unblinded.The advantage of this approach is that the instances that blind the ciphertext do not know anything5about the private key.This is useful for transferring a ciphertext from one in-stance to another one(with different keys).In our case we need a mechanism that provides an update of the private key and the corresponding ciphertext. In our scenario the solution in[19]would require a distributed blinding,a dis-tributed decryption and a distributed unblinding.As a consequence we propose a different variation based on the distanceδbetween the old private key d and the new private key d′.The advantage of our re-encryption is that we only modify the old ciphertext and do not perform decryptions and encryptions respectively. Theorem1.Assume(c1,c2)is a ciphertext performed over m and e.Then a ciphertext based on e′=egδand decryptable by d′=d+δcan be computed by doing the following random transformation of(c1,c2)without intermediately revealing the corresponding plaintext m:RE((c1,c2),δ,e′)=(c1gβ,c2cδ1e′β)=(c′1,c′2),β∈R Z Z q(7)d′=d+δ,e′=egδ(8) Proof.Let(c′1,c′2)be a transformed ciphertext according to(7).Then the basic ElGamal decryption with new private key d′results in m because:D((c′1,c′2),d′)(5)=c′2(c′d′1)−1(7)=c2cδ1e′β((c1gβ)d′)−1(8)=c2cδ1(egδ)β((c1gβ)d+δ)−1(4)=meαgαδ(g d gδ)β((gαgβ)d+δ)−1(4)=mgα(d+δ)gβ(d+δ)(g(α+β)(d+δ))−1=m⊓⊔The re-encryption process in(7)can also be divided into two sub-functions so that it can be performed in a distributed way(assume:δandβare shared): Re-encryption Step1.Thefirst step is done locally by every user P i.RE1(c1,δi,e′,βi)=(gβi,cδi1,e′βi)=(˜c1i,c1i,e′i)Re-encryption Step2.The second step uses all outputs of RE1and(c1,c2).RE2(c1,(˜c11,...,˜c1n),(c11,...,c1n),(e′1,...,e′n),c2)=(c′1,c′2)c′1=c1ni=1˜cλβ0,i1i,c′2=c2 n i=1cλδ0,i1i n i=1e′iλβ0,iIf there is no need to mask the correspondence between old and new ciphertext, the modifications of the original randomnessαby use ofβcan be removed.64Video Surveillance4.1Setup PhaseDuring the initialization of the system,a key-pair(e,d)for the ElGamal cryp-tosystem has to be generated in a shared way.To achieve this,all users co-operatively generate shares of the private key d without reconstructing it.Then they computed and send e to the video camera.The distributed key generation proposed in[11]is very useful to generate a private key without reconstructing it.A more secure version is proposed in[5].However,we need a fair tree-structured generation of the private key.Based on this fact we modify the original protocol in order to be able to build such a tree.A detailed description of a tree-shared generation of secret values can be found in[14]–we refer to it for lack of space.4.2Recording PhaseWithin this phase V C uses local hybrid encryption.First of all V C generates an interval-key k at random and encrypts the interval-video using symmetric encryption described in section2.2:E S(video,k)=c.For encryption of k the camera uses asymmetric encryption described in section2.3with public key e: E(k,e)=(c1,c2).Within each interval the camera sends the encrypted video to S V and its corresponding encrypted ikey to S K.Both server store the ciphertext in a particular database.4.3Retrieval PhaseThe retrieval of a particular video can be done in two steps:Decryption of ikey.S K has to send(c1,c2)to every user in U who agrees to reconstruct the video.Then each user P i performs D1(c1,d i)=c1i and broadcasts the result within U.Finally every user P i decrypts ikey k by computing D2((c11,...,c1n),c2)=k.Decryption of Video.S V has to send the encrypted video c(corresponding to k)to every user P i who decrypts it by performing D S(c,k)=video.5Managing Private-Key-SharesGenerally,an access structure has to be veryflexible within an organization.The more users exist the sooner it might occur that a user leaves or joins the system.5.1Registration of a New UserWhen registering a new user P n+1we have to distinguish users of thefirst level who do not have a predecessor and users of lower levels who have predecessors.7New First-Level-User.Every existingfirst-level-user P i shares his share d i→(d i1,...,d in+1)among U′=U∪{P n+1}.Then every user P j in U′inter-polates the received shares(d1j,...,d nj)→d j.Due to the fact,that every share changes,an update of successor-shares has to be performed.Others.Every user P i of a lower level always has a predecessor P who is re-sponsible for registering his new successor P n+1.If P does not know the shares of his existing successors they have to send him their shares.Owningat least t+1shares of his successor enables P to generate a share d n+1= n i=1d iλd n+1,i for P n+1without causing a recursive update of successor-shares.After importing d n+1to P n+1’s smartcard P removes d1,...,d n fromhis smartcard.Generation of new shares can be done in several ways.An important fact is tokeep side effects minimal which we cannot guarantee with the solution describedabove when registering afirst-level-user.For more efficient but also some more complex variations we refer to our technical report[13].5.2Loss of SmartcardsIf a user collects at least t+1previously lost smartcards he might be able to compromise the private key d.Regularly updates of shares without changing d make the collector’s shares unusable.Such updates can be very time-consuming because all users of the access structure have to participate in the update process at the same time(except if centralized updates are used).If a user looses his smartcard his share can be reconstructed using the computations in section5.1. We always have to consider the worst case which is that another user of the access structurefinds the smartcard.Then the threshold is decreased which we want to avoid.Due to this fact we propose to run an update-protocolfirst and then generate a new share for the user who lost his smartcard.5.3Proactive BehaviourCollecting lost smartcards can be used to decrease the threshold.So we have to update the private-key-shares without changing the private key(as proposed in [7]).This should be done in case of loosing a smartcard but can also be performed proactively ing short intervals can be very time-consuming if up-dates are done in a distributed way because users have to be online at the same time.In this case the update could be initiated by a central trusted authority.A big advantage of this variation is that updates could be run in batch-mode.What happens if threshold t is vulnerable within one interval?In this case we propose to update the private key in a shared way in sufficient time which forces a re-encryption of ciphertext that corresponds to the compromised private key (see section6).Until the re-encryption process has beenfinished S K has to be protected against availability-compromising attacks.To handle this problem we propose to share the ciphertext-pairs(c1,c2)among several server.This would lead to several modifications of the basic system which we do not describe here.85.4De-registration of UsersIf a user leaves the organisation his smartcard(holding the share)should be securely destroyed.If a new user takes over his tasks the protocol described in section5.1has to be run.6Update of Private Key and corresponding Ciphertext First of all(e,d)has to be updated by all cameras and all shareowners of d. Before destroying the update-values a re-encryption of every ciphertext(c1,c2) generated using e has to be done.Shared Generation of Update-Values.All the users in U run the tree-based key generation mentioned in section4.1to get sharesδ1,...,δn of a private-key-updateδand sharesβ1,...,βn of randomness-updateβ.Update of Private-Key-Shares.Every user P i computes d′i=d i+δi which is a share of private key d′=d+δ.Shared Update of Public Key.All users perform the updated public key e′=e n i=1gδiλδ0,i in a distributed way and send e′to V C.Re-encryption of Encrypted ikeys.S K has to send the old ciphertext-part c1to every user P i participating in the re-encryption processes.Then each P i has to perform RE1(c1,δi,e′,βi)=(˜c1i,c1i,e′i).Finally,each output of RE1 has to be sent to S K which then replaces the old ciphertext(c1,c2)by the output of RE2(c1,(˜c11,...,˜c1n),(c11,...,c1n),(e′1,...,e′n),c2)=(c′1,c′2).7Security AnalysisWe now briefly analyse the power of each instance of the system to retrieve any secret information.However,we do not consider the tree-structure–the analysis can be interpreted recursively.As long as video cameras are not able to solve the Discrete Logarithm Prob-lem and do not compromise at least t+1first-level-users,they are not able to get any information about the private key d,update-valuesδandβor any shares of the users.To decrypt video-material S V needs the corresponding ikey.But to get access to it he has to compromise at least t+1first-level-users and S K.Afirst-level-user needs at least t other shares to reconstruct d or update-valuesδandβ. Moreover,he has to compromise S K and S V to be able to decrypt videos.Up to t smartcards offirst-level-users can be stolen and compromised without reveal-ing any information about d.Regularly updates of shares increase the security of the private key.Moreover,the smartcards are secured by a Personal Identifi-cation Number.To preserve resistance against active malicious behaviour(e.g. sending wrong intermediate results),extensions according to secure multi-party computation with active adversaries are required(see[6,8]).98Conclusion&Future ResearchConsidering the requirements stated in section1,it can be seen that all of them have been fulfilled.Privacy-protection of the monitored users is provided by encryption of video-material and interval-keys.4-eyes principle(dual control)is provided by a tree-based access structure.Minimal access of authorized people to monitored in-formation is guaranteed by scaling monitored intervals to a minimum so that many ikeys are generated.Keys and key components are generated tree-based in a fair distributed way according to[14].Update of keys and key components is realized by tree-based generation of update-values and threshold re-encryption. Tree-based secret sharing provides the possibility to simulate any user by his successors.The discussed distributed version of ElGamal is well known since[3]and only one-out-of many.Discussing how public key cryptosystems can be distributed can lead to many more applications than access structures to monitored informa-tion.When sharing functions the management of key-shares appears to be much more difficult than the“normal”key management.Some future research could emphasize on managing keys in distributed public-key cryptosystems keeping the number of local shares minimal not limiting to the ElGamal cryptosystem. References1.Advanced Encryption Standard(AES).FIPS-Pub197,NIST,2001.2.M.Boyle,C.Edwards,S.Greenberg.The Effects on Filtered Video on Aware-ness and Privacy.CSCW’00:Proceed.of the2000ACM conference on Computer supported cooperative work,Philadephia,PA,USA,2000,pages1–10.3.Y.Desmedt,Y.Frankel.Threshold Cryptosystems.Adv.in Crypt.:Proceed.ofCRYPTO’89,Springer-Verlag,pp.307–315,1990.4.T.ElGamal.A Public-Key Cryptosystem and a Signature Scheme Based on Dis-crete Logarithms.Adv.in Crypt.:CRYPTO’84,Springer-Verlag,pp.10–18,1985.5.R.Gennaro et al.Secure Distributed Key Generation for Discrete-Log BasedCryptosystems.Proceed.of EUROCRYPT’99,Springer LNCS1592,pp.295-310.6.O.Goldreich et al.How to play any mental game–a completeness theorem forprotocols with honest majority.Proc.19th ACM STOC,p.218–229,1987.7. A.Herzberg et al.Proactive secret sharing or:how to cope with perpetual leakage.In Adv.in Crypt.:CRYPTO’95,vol.963of LNCS,Springer-Verlag,pp.339–352.8.M.Hirt.Multi-Party Computation:Efficient Protocols,General Adversaries,andVoting.Ph.D.thesis,ETH Zurich,2001Reprint as vol.3of ETH Series in Infor-mation Security and Cryptography,Hartung-Gorre Verlag,Konstanz,2001.9.R.T.Collins et al.A System for Video Surveillance and Monitoring.Proceedingsof the American Nuclear Society(ANS)Eighth International Topical Meeting on Robotics and Remote Systems,1999.10. E.Newton,L.Sweeney,B.Malin.Preserving Privacy by De-identifying FacialImages.IEEE Transactions on Knowledge and Data Engineering,vol.17,no.2, pp.232–243,February2005.1011.T.Pedersen.A threshold cryptosystem without a trusted party.Adv.in Crypt.:EUROCRYPT’91,vol.547of LNCS,Springer-Verlag,pp.522–526,1991.12.J.Pieprzyka,T.Hardjono,J.Seberry.Fundamentals of Computer Security.Springer-Verlag,2003.13.M.Schaffer.Managing Key-Shares in Distributed Public-Key Cryptosystems.Technical Report TR-syssec-05-04,University of Klagenfurt,Austria,August 2005.14.M.Schaffer.Tree-shared Generation of a Secret Value.Technical Report TR-syssec-05-01,University of Klagenfurt,Austria,June2005.15.M.Schaffer,P.Schartner.Hierarchical Key Escrow with Passive Adversaries.Technical Report TR-syssec-05-02,University of Klagenfurt,Austria,June2005.16. A.Senior et al.Blinkering Surveillance:Enabling Video Privacy through Com-puter Vision.IBM Research Report RC22886(W0308-109),August28,2003.17. A.Shamir.How to share a m.of the ACM,vol.11,pp.612–613,1979.18. A.C.Yao.Protocols for secure computation.In Proceed.of the23rd IEEE Sym-posium on Foundations of Computer Security,1982.19.L.Zhou et al.Distributed Blinding for ElGamal Re-encryption.Proceed.25thIEEE Int.Conf.on Distributed Computing Systems.Ohio,June2005,p.815–824.11。