CCTV Surveillance System Attacks and Des
CCTV Surveillance System Attacks and Des
Corresponding Author:
Muthusenthil B,
Information Security Research Institute,
Wookyoung Information Technology,
Dongbuk-ro, Buk-gu, Daegu, Korea.
Email: [email protected]
1. INTRODUCTION
CCTV (Closed Circuit Tele-Vision) is one of the most widely used physical security technologies.
A surveillance camera is a video collection device installed at a particular location and utilized for a variety
of purposes. As CCTV performance has become enhanced recently, technology is being developed that
attempts to perform automated processing through facial recognition using the facial information acquired
from a CCTV system [1]-[5]. However, if these technologies are exploited maliciously, privacy may be
seriously violated. A set of communication equipment devices that collect image information from a
surveillance camera device installed at a particular location, and transmit the images via an opened
wire/wireless communication channel, so that only specified persons can receive it [6].
a. Image monitoring control server
A server that stores, manages, and monitors the image information received from a surveillance
camera. The image monitoring server is composed of several modules such as encryption, decryption, facial
area detection, privacy protected image, image saving, and monitoring. The monitoring module can be
located behind the en/decryption module or privacy protected image module, depending upon whether
privacy protection is to be applied or not, while monitoring the image [7], [8].
b. Client
A system or user that seeks to receive and use the CCTV image from the image monitoring and
control server. Desktops, laptops, and mobile phones can be an example of clients. The client is composed of
the en/decryption, facial recognition, and image utilization modules [16].
c. Facial Area Detection
A process that must be executed before recognizing the face, and which detects the image spot
where the face is located. Generally speaking, “facial area detection” refers to the phase that identifies major
facial parts such as the face shape, eyes, nose, and mouth, whereas the “characteristics extraction phase”
refers to pre-processing after facial area detection, as well as facial feature extraction for the face
area [14], [15].
Our goal in this paper is to provide a clear overview of various video survelliance system (VSS)
suggested by various researchers and provide a guide for further design and development in this area. The
contributions of our work are listed as follows:
1. We summaries the various categories of VSSs.
2. We classify the current state of VSS and outline several major open attacks are possible in VSS.
3. We provide design goals for the development of future VSS which can be integrated into existing VSSs.
This paper is organized as follows. Section 2 gives an overview of various VSSs. Section 3 we
review main attacks taxonomies for video surveillance systems. Section 4 provides we provide a set of
recommendations that can help improve the design and development, which includes security and privacy
levels provided by the hardware, the firmware, the network communications and the operation of video
surveillance systems. Section 5 concludes our work.
computer (most of them now have USB capability) and pictures can be taken of any camera scene. All that is
necessary is for the camera to be mounted on a wall bracket and pointed in the desired direction [18].
As shown in Figure 1, the CCTV system is composed of various wire/wireless surveillance cameras
connected to an image monitoring control server, as well as the client [19]. The CCTV system transmits and
receives image data via a wire/wireless communication channel, as is composed of various components, such
as the surveillance camera, image monitoring control server, authentication and access control server, mobile
phone, desktop, and laptop.
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2072 – 2082
Int J Elec & Comp Eng ISSN: 2088-8708 2075
Ming Ying et al. [19] have suggested that the visual design method should be introduced and
advantages of spatial analysis and information query of GIS and 3D city model should be fully used to aid
CCTV monitoring system in design and maintenance.
Pradeep K. Atrey et al. [20] have attempted to solve the problem of dynamically selecting and
scheduling the four best CCTV views. We adopt a human-centric approach in which the system computes the
operator‟s attention in the CCTV views to automatically determine the importance of events captured by the
respective cameras. The experiments show that the proposed method helps a human operator in identifying
important events occurring in the environment.
Roy Coleman et al. [21] have concerned to chart the establishment and uses of CCTV within the
location of Liverpool city center. In doing this the paper seeks to contextualize CCTV within contemporary
„partnership‟ approaches to regeneration which are reshaping the material and discursive form of the city.
Thus CCTV schemes along with other security initiatives are understood as social ordering strategies
emanating from within locally powerful networks which are orderly regeneration projects. In focusing on the
normative aspects of CCTV, the paper raises questions concerning the efficiency of understanding
contemporary forms of „social ordering practices‟ primarily in terms of technical rationalities while
neglecting other, more material and ideological processes involved in the construction of social order.
Tae Hyung et al. [22] have examined the next generation functions and usages from the experience
from the disaster and safety management system, especially CCTV, in Gimpo Smartopia, Korea. and used
new hybrid methodology to rebuild requirements and design concepts in terms of their functions, service
types, usages gated ratings. Based on the examination results, this paper suggested sketched the architecture
and assessed implications and considerations for the public application development in the disaster and safety
management.
Young-Jin Han et al. [23] have proposed a security framework that protects personal information
obtained from the detected facial area. We pointed out the security threats within CCTV system, and then
propose a counter measures. The key point of this framework is processing the mosaic or scrambling
methods to the facial area, so that the facial information cannot be directly obtained without knowledge of the
secret key. When the original facial information is needed, such as crime investigation, it can be obtained
through reverse scrambling. This framework will contribute to protect privacy and develop the biometric-
based physical security technology area.
Sergio Saponara et al. [24] have proposed to exploit the on-board closed circuit television (CCTV)
security system to enable advanced services not only for surveillance, but also for safety, automatic climate
control, e-ticketing. The new system has minimal hardware and installation cost overheads, since it exploits
the already installed CCTV cameras. In addition, for each wagon, an embedded acquisition and processing
node (EAP) is used, composed by a video multiplexer, and by a digital signal processor that implements
algorithms for advanced services such as: smoke detection, to give an early alarm in case of a fire, or people
detection for people counting, or fatigue detection for the driver. The information is then transmitted from
each EAP node to the train information system. The final terminals can be the tablets of the train staff, and/or
visualization displays in each wagon in case of fire alarms for the passengers.
Sonali Hargude et al. [27] have developed the abandoned object detection system. This paper
describes methodology for Intelligent Surveillance system. Proposed Real time abandoned object detection
System helps to reduce harms causing due to unattended objects. In this paper, we have covered a detail
discussion on the various stages of any abandoned object detection technique. As future enhancement we can
take live video feed through android mobile. As everyone is using Smartphone it will be easier to have quick
looked at the system though android application. It will provide flexibility to the user or the authorized
person who can keep watch from a distance.
Grigore M. Havârneanu et al. [28] have covered at least five relevant issues which significantly
contribute to the prevention of railway suicide and trespass, and mitigation practice: (1) collating details
across a wide range of countries of what is happening in terms of prevention, data on incidents and processes
for investigation and the management of suicide and trespassing incidents, etc.; (2) developing and using
methodology for the evaluation of extensive sets of measures; (3) providing recommendations for further
examination of selected preventative measures; (4) looking for additional empirical support for a sample of
selected measures; and (5) providing a toolbox with guidance materials and best practice examples to help
IMs and RUs implement measures more effectively tailored to their specific needs.
S.Naga Jyothi et al. [29] have proposed the real time security surveillance system using IoT. The
system design uses Motion Detection algorithm written in Python as a default programming environment.
This significantly decreases the storage usage and save investment cost. The algorithm for Motion Detection
is being implemented on low processing power chip Raspberry pi 2 and Pi camera, which enables live video
streaming with detection of moving objects and get alarm when motion is detected and sends photos, videos
to a cloud server directly using pi camera. When cloud is not available then the data is stored locally on
raspberry pi and sent when the connection resumes. The camera is mounted on the motor and its movement
(Left/Right) is controlled through IoT webpage by the user, thus providing user with enhanced view of the
surroundings.
Patricia Marie L et al. [30] have presented the design and construction of a system consisted of five
mobile robots (mobots) and a communications system that will serve as a security surveillance system. This
is implemented using a microcontroller as the core that enables the mobots to work cooperatively. The
mobots are free to move within their designated areas and are capable of relaying messages via ZigBee
communication to a base controller system. The purpose of this system is to have an alternative or even a
complement to regular CCTV surveillance, especially in buildings with several rooms. This would enhance
the security as the system utilizes a database to store the information gathered from intruder alerts.
Furthermore, the communication radios used transmit with low power over a long range. The mobots are
enabled to relay data via mobot-to-PC and mobot-to-mobot paths up to five hops. The data transmitted allows
the base controller system to identify its source for intrusion detection.
Hyowon Lee et al. [31] have presented a system under development based on users interacting with
detected video objects. We outline the suite of technologies needed to achieve such a system and for each we
describe where we are in terms of realizing those technologies. We also present a system interface to this
system, designed with user needs and user tasks in mind.
Alan J. Lipton et al. [32] have outlined two examples indicating that AVS based on computer vision
technology is a useful piece of the solution for asset protection, perimeter monitoring, and threat detection.
The Logan airport example demonstrates that this technology is desirable over other technologies because it
is passive, relatively inexpensive, operationally effective, and provides real-time, actionable intelligence.
This technology, however, comes with the caveat that the customer must become educated about its
underlying technology and its applicability. Many proponents of computer vision technology are advocating
commercial systems that do not perform adequately in real-world environments - they are subject to poor
detection rates and high false alarms rates in realistic, unstructured environments. At Objectvideo, we
strongly recommend that potential customers trial the technology in their own unique environments to
determine the utility of this technology and its adaptability to environmental pressures. Our example shows
that the Object video system is, in general, extremely effective as a turnkey system - and in cases with unique
environmental phenomena, our system is rapidly adaptable to overcome operational concems.
Sunniva F Meyer et al. [33] have explored various trade-offs between standoff and other values,
and, when appropriate, proposes possible solutions to such dilemmas. Second, it asks whether employing the
SFF in the FGC of Norway will help illuminate these „troublesome trade-offs‟. The analysis has
demonstrated that standoff creates challenges for other purposes of the FGC, such as functional office spaces
for all employees, but many of these challenges can be solved by planning intelligently, such as creating an
external commodity reception. Standoff also creates opportunities for reinforcing social-responsibility
requirements, such as accessibility for pedestrians and environmental considerations. The current literature
has mostly focused on negative externalities of security, while this paper demonstrates that security measures
can have both negative and positive externalities and that planning might alleviate some of the negative ones.
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2072 – 2082
Int J Elec & Comp Eng ISSN: 2088-8708 2077
The results, furthermore, support Little‟s (2004) notion about thinking holistically about protection to create
robust and effective security, and show that the academic community can assist in such holistic thinking.
Hae-Min Moon et al. [34] have proposed the human identification method that uses height and
clothing-color information appropriate for the intelligent video surveillance system based on smartcard. It can
obtain reliable feature information using smartcard. In this paper, representative colors are extracted by
applying tree-based color quantization technique to the clothing region and height is extracted from the
geometrical information of the images. Identification is accomplished by comparing the similarities between
two data based on Euclidean distance. From the experiment, we could see that the identification of a human
can be checked through the proposed system.
Robin Singh Sidhu et al. [35] have proposed information processing techniques for CCTV based
surveillance systems employed in (a) work environments and (b) public places and transport, for automated
identification of scenes of inter-personal crime. Although both the scenarios presented in this work employ
similar signal processing and learning algorithms, the objective involved are significantly different. In (a) we
aim to preserve confidentiality and privacy of official meetings and discussions, while ensuring detection of
unbecoming behavior, like: bullying, harassment and assault. In the proposed method we identify such
critical conditions using a combination of image and speech processing and ensue conditional video
recording and saving. In (b), the target is to identify the occurrence of interpersonal crime using video and
voice processing, in order to raise alert at the local surveillance station, which may be receiving numerous
CCTV videos from neighboring areas. This can be an assistance to the security personnel, responsible to
monitor large number of screens. The proposed methods can be useful curbing interpersonal violence, and
crime against women, in the form of eve teasing, and harassment.
Analytical surveillance can perform the surveillance tasks much more efficient comparing to
operator manual monitoring. This had made it getting increased market‟s interest in recent years. Commonly,
closed circuit television (CCTV) is used for security surveillance. However, CCTVs are purely vision output.
These silent videos may not provide complete picture of the happening. Sound detection is incorporate into
vision surveillance for enhancement. Sound detection is able to detect abnormal sound although happen at
camera blind spots or due to intentional blocking.
Tan Teng Teng et al. [36] have proposed to use microcontroller embedded system to enhance
current CCTV system. Proposed abnormal sound embedded system is to carry out the sound detection, audio
processing and analysis. This study is using only single microphone for sound detection. Audio amplitude
and frequency range are targeted feature extracted from Fast Fourier Transform (FFT). Abnormal sound of
human screaming and glass breaking were classified using decision tree. From experiment, proposed
abnormal sound analytical surveillance system test yield average of 88% accuracy detection. We can
consider our work is simple and cost effective for field implementation.
without their pertaining field conditions. Experimental results show that the proposed visualization technique
produces promising results and found effective in conveying meaningful information while alleviating the
need of searching exhaustively colossal amount of video data.
Huan-Ting Chen et al. [39] have developed a robust visualization approach for evaluating the
coverage of CCTV systems in public building spaces. Firstly, a method for modeling CCTV systems in
virtual building spaces is presented. The emphasis is placed on offering a visual representation of the CCTV
coverage in a BIM-based virtual environment. By simulating varifocal lenses and configuring the parameters
of Revit cameras, the developed approach simulates the CCTV screen views to provide a better visual
demonstration of the working of the CCTV systems. This is advantageous in the checking of design conflicts
and effective communication between owners and contractors. The filled regions displayed in the 3D
environment are also apparent, allowing accurate visual evaluation of CCTV coverage. Finally, in the case
study of an MRT station, the developed approach is shown to be effective and can be widely applied to other
building spaces under similar conditions. Table 1 shows the comparison of various methods proposed in the
security surveillance system.
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2072 – 2082
Int J Elec & Comp Eng ISSN: 2088-8708 2079
c. Should sustain current and new heterogeneous environment to attract more applications and more
customers
d. Should be scalable from distributed caches and storage device to heterogeneous client devices
e. Should be extendable from PCs to mobile devices and still remain secure, for flexible new business
models
f. Should be easily renewable
g. Should not reduce the playback quality of the streaming media, i.e., it should not impact continuous
playback, loss resilient capability, and scalability of the system in real time streaming applications
h. Should be able to preserve entertainment like experience – users should be able to fast-forward or rewind
content without any degradation on the viewing or playback experience
5. CONCLUSION
Detecting the persons and analyzing their behavior by means of visualization is a prime factor for
the computer systems nowadays to interact cleverly in a few human populated areas. Visual surveillance
systems are used for the real time surveillance of targets like persons or vehicles will lead to the description
of objects' activities in that environment. Visual surveillance has been used for security observation, anomaly
recognition, and interloper detection, computing traffic flow, mishap detection on the highways and
scheduled maintenance. We have provided a detail survey on video surveillance system, attacks and their
design goals for implementing CCTV video surveillance system. Therefore, there is need of efficient CCTV
surveillance with higher performance rate and less computation cost. We hope the discussion made in this
paper will provide a valuable knowledge as well as promote further research and widen the scope of this field
beyond its current boundaries.
ACKNOWLEDGEMENTS
This work was supported by the Korean Federation of Science and Technology Societies (KOFST)
grant funded by the Korean government (MSIP: Ministry of Science, ICT and Future Planning).
REFERENCES
[1] H. M. Dee and S. A. Velastin, “How close are we to solving the problem of automated visual surveillance: A review
of real-world surveillance, scientific progress and evaluative mechanisms”, Machine Vision and Applications, 2007.
[2] A. Hampapur, L. Brown, J. Connell, A. Ekin, N. Haas, M. Lu, H. Merkl, S. Pankanti, A. Senior, C.-F. Shu, and Y.
L. Tian, “Smart video surveillance: Exploring the concept of multiscale spatiotemporal tracking”, IEEE Signal
Processing Magazine, pp. 38-51, March 2005.
[3] Brovko, N., and R. Bogush, “Smoke detection algorithm for intelligent video surveillance systems”, Computer
Science Journal of Moldova, vol. 21, no. 1(61), 2013.
[4] S. Amarnag, R. S. Kumaran, and J. N. Gowdy, “Real time eye tracking for human computer interfaces”, in IEEE
International Conference on Multimedia and Expo, Washington, DC, USA, pp. 557-560, 2003
[5] H. M. Dee and S. A. Velastin, “How close are we to solving the problem of automated visual surveillance: A review
of real-world surveillance, scientific progress and evaluative mechanisms”, Machine Vision and Applications, 2007.
[6] B. Aldred, “London Underground Platfrom to Train CCTV Studies”, IEEE WC2R, Savoy Place, London, UK,
pp. 1-12, 2000.
[7] D. Ferraiolo, J. Barkley, and D. Kuhn, “A Role-Based Access Control Model and Reference Implementation within
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2072 – 2082
Int J Elec & Comp Eng ISSN: 2088-8708 2081
a Corporate Intranet”, ACM Transactions on Information and System Security, vol. 2, Feb. 2000.
[8] C. Busch, W. Funk, and S. Wolthusen, “Digital Watermarking: from Concepts to Real-Time Video Applications”,
IEEE Computer Graphics and Applications, vol. 19, pp. 25-35, Jan 1999.
[9] Senior, Andrew, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell,
Chiao Fe Shu, and Max Lu, “Enabling video privacy through computer vision”, IEEE Security & Privacy, vol. 3,
no. 3, pp 50-57, 2005.
[10] “Selection of Cameras, Digital Recording Systems, Digital High-Speed Networks and Train lines for Use in
Transit-Related CCTV Systems”, American Public Transportation Association, IT-CCTV-RP-001-11 June 2011.
[11] A. Chattopadhyay and T. Boult, “PrivacyCam: A Privacy Preserving Camera Using uCLinux on the Blackfin DSP”,
IEEE Conf. on Computer Vision and Pattern Recognition, pp. 1-8, Jun. 2007.
[12] P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, “Privacy protecting biometric authentication systems: an
overview”, European Signal Processing Conference, pp. 1397-1400, 2004.
[13] Sagar Badgujar, Amol Mahalpure, Priyaka Satam, Dipalee Thakar, Swati jaiswal, “Real time number plate
recognition and tracking vehicle system”, SSRG International Journal of Computer Science and Engineering,
vol. 2, no. 12 December 2015.
[14] Li, Bin, Jian Zhang, Zheng Zhang, and Yong Xu, “A people counting method based on head detection and
tracking”, IEEE International Conference in Smart Computing, pp. 136-141, 2014.
[15] A. Cavallaro, “Privacy in video surveillance IEEE Signal Process”, Magazine, vol. 24, no. 2, pp. 166-168, Mar,
2007.
[16] Dong-Ik Ko, G. Agarwal, “Gesture recognition: Enabling natural interactions with electronics”, Texas Instruments
white paper, SPRY199, 2012.
[17] Lin, Kuan Jen, Tsai Kun Hou, and Rui Jen Chiu, “Jitter-constrained camera scheduling in CCTV surveillance
networks”, IEEE International Conference on Signal and Image Processing, pp. 650-654, 2016.
[18] Li, Liyuan, Weimin Huang, Irene Yu-Hua Gu, Ruijiang Luo, and Qi Tian. “An efficient sequential approach to
tracking multiple objects through crowds for real-time intelligent CCTV systems”, IEEE Transactions on Systems,
Man, and Cybernetics, Part B, vol. 38, no.5, pp. 1254-1269, 2008
[19] Ming, Y., J. Jiang, and F. Bian, “3D-City Model supporting for CCTV monitoring system”, International Archives
of Photogrammetry Remote Sensing and Spatial Information Sciences, vol. 34, no. 4, pp 456-459, 2002
[20] Atrey, Pradeep K., M. Anwar Hossain, and Abdulmotaleb El Saddik, “Automatic scheduling of CCTV camera
views using a human-centric approac”, IEEE International Conference on Multimedia and Expo, pp. 325-328,
2008.
[21] Coleman, Roy, and Joe Sim, “You'll never walk alone: CCTV surveillance, order and neo‐ liberal rule in Liverpool
city centre1”, The British journal of sociology, vol. 51, no. 4, pp. 623-639, 2000.
[22] Tae Hyung, Kim, “Next generation architecture examination for Mass Notification System (MNS) collaborating
with CCTV for Smart & Safe City”, International Journal of engineering Research and Applications, vol. 5, no. 3,
pp. 39-45, March 2015.
[23] Han, Byoung-Jin, Hyuncheol Jeong, and Yoo-Jae Won, “The privacy protection framework for biometric
information in network based cctv environment”, IEEE Conference on Open Systems, pp. 86-90, 2011.
[24] Saponara, Sergio, Luca Pilato, and Luca Fanucci, “Exploiting CCTV camera system for advanced passenger
services on-board trains”, IEEE International in Smart Cities Conference, pp. 1-6, 2016.
[25] Nguyen, Hoang Thanh, Bir Bhanu, Ankit Patel, and Ramiro Diaz, “Design and optimization of the videoweb
wireless camera network”, EURASIP Journal on Image and Video Processing, no. 1, 865803, 2010
[26] Bhavani, anabham, Tulasi jami, And Gajjala ashok, “Low Cost Smart Security Camera with Night Vision
Capability Using Raspberry Pi and PIR Sensor”, Int. Journal of advanced technology and innovative research,
vol 8, no. 21, pp. 4053-4056, 2016.
[27] Hargude, Sonali, and S. R. Idate, “I-surveillance: Intelligent surveillance system using background subtraction
technique”, International Conference in Computing Communication Control and automation, pp. 1-5, 2016.
[28] Havârneanu, Grigore M., Marie-Hélène Bonneau, and Jacques Colliard, “Lessons learned from the collaborative
European project RESTRAIL: REduction of suicides and trespasses on RAILway property”, European Transport
Research Review, vol. 8, no. 2, pp. 1-15, 2016.
[29] Jyothi, S. Naga, and K. Vijaya Vardhan, “Design and implementation of real time security surveillance system
using IoT”, International Conference in Communication and Electronics Systems, pp. 1-5, 2016.
[30] Lapeña, Patricia Marie L., Joseph Ian Q. Blanco, Kevin I. Bunda, Arnold Gabriel S. Cruz, Aaron I. Ramirez, and
Argel A. Bandala, “Swarm algorithm implementation in mobile robots for security and surveillance”, IEEE Region
10 Conference in TENCON 2014-2014, pp. 1-5, 2014.
[31] Lee, Hyowon, Alan F. Smeaton, Noel O'Connor, and Noel Murphy, “User-interface to a CCTV video search
system”, The IEEE International Symposiumc in Imaging for Crime Detection and Prevention, pp. 39-43, 2005.
[32] Lipton, Alan J., Craie H. Heartwell, Niels Haering, and Donald Madden, “Automated video protection, monitoring
& detection”, IEEE Aerospace and Electronic Systems Magazine, vol. 18, no. 5, pp 3-18, 2003
[33] Meyer, Sunniva F., Sissel H. Jore, and Kjell W. Johansen, “Troublesome trade-offs: balancing urban activities and
values when securing a city-centre governmental quarter”, City, territory and architecture, vol. 2, no. 1, 2015.
[34] Moon, Hae-Min, and Sung Bum Pan, “A new human identification method for intelligent video surveillance
system”, Proceedings of 19th International Conference on Computer Communications and Networks, 2010.
[35] Sidhu, Robin Singh, and Mrigank Sharad, “Smart surveillance system for detecting interpersonal crime”, IEEE
International Conference on Communication and Signal Processing, pp. 2003-2007, 2016.
[36] Teng, Tan Teng, Lim Tien Sze, and Ong Lee Yeng, “Abnormal sound analytical surveillance system using
microcontroller”, IEEE 12th International Colloquium in Signal Processing & its Applications, pp. 162-166, 2016.
[37] Chen, Shaokang, Sandra Mau, Mehrtash T. Harandi, Conrad Sanderson, Abbas Bigdeli, and Brian C. Lovell, “Face
recognition from still images to video sequences: a local-feature-based framework”, EURASIP journal on image
and video processing, no. 1, 790598, 2011.
[38] Mehboob, Fozia, Muhammad Abbas, Saad Rehman, Shoab A. Khan, Richard Jiang, and Ahmed Bouridane,
“Glyph-based video visualization on Google Map for surveillance in smart cities”, EURASIP Journal on Image and
Video Processing, no. 1, pp. 28, 2017.
[39] Chen, Huan-Ting, Si-Wei Wu, and Shang-Hsien Hsieh, “Visualization of CCTV coverage in public building space
using BIM technology”, Visualization in Engineering, vol. 1, no. 1, pp. 5, 2013.
[40] M. Guri, O. Hasson, G. Kedma, and Y. Elovici, “Visisploit: An optical covert-channel”, arXiv preprint
arXiv:1607.03946, 2016.
[41] N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields, D. Wagner, and W. Zhou, “Hidden Voice
Commands”, In 25th USENIX Security Symposium , Austin, TX, 2016.
[42] Bi, Suzhi, and Ying Jun Angela Zhang, “Graph-based Cyber Security Analysis of State Estimation in Smart Power
Grid”, IEEE Communications Magazine, 2017.
[43] Chen, Jie, Jianwei Liu, Kefei Mao, Mengmeng Wang, and Haosu Cheng, “A Reconfigurability Based Security
Service Path Construction Scheme”, IEEE Access, 2017.
[44] Ciapessoni, Emanuele, Diego Cirio, Gerd Kjølle, Stefano Massucco, Andrea Pitto, and Marino Sforna,
“Probabilistic Risk-Based Security Assessment of Power Systems Considering Incumbent Threats and
Uncertainties”, IEEE Transactions on Smart Grid, vol. 7, no. 6, pp 2890-2903, 2016.
[45] Figueiredo, Lucas Silva, Benjamin Livshits, David Molnar, and Margus Veanes, “Prepose: Privacy, Security, and
Reliability for Gesture-Based Programming”, IEEE Symposium in Security and Privacy, pp. 122-137, 2016.
[46] Hossain, M. Shamim, Ghulam Muhammad, Sk Md Mizanur Rahman, Wadood Abdul, Abdulhameed Alelaiwi, and
Atif Alamri, “Toward end-to-end biomet rics-based security for IoT infrastructure”, IEEE Wireless
Communications, vol. 23, no. 5, pp. 44-51, 2016.
[47] Huang, Tian-en, Qinglai Guo, and Hongbin Sun, “A Distributed Computing Platform Supporting Power System
Security Knowledge Discovery Based on Online Simulation”, IEEE Transactions on Smart Grid, 2016.
[48] Jamei, Mahdi, Emma Stewart, Sean Peisert, Anna Scaglione, Chuck McParland, Ciaran Roberts, and Alex
McEachern, “Micro synchrophasor-based intrusion detection in automated distribution systems: Towards critical
infrastructure security”, IEEE Internet Computing, vol. 20, no. 5, 2016.
[49] A. Costin. “Poor Man‟s Panopticon: Mass CCTV Surveillance for the masses”, In Power of Community, November
2013.
[50] K. Mowery, E. Wustrow, T. Wypych, C. Singleton, C. Comfort, E. Rescorla, J. A. Halderman, H. Shacham, and S.
Checkoway, “Security analysis of a full-body scanner”, In 23rd USENIX Security Symposium , pp 369-384, 2014.
[51] J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis, and signature generation of
exploits on commodity software”, 2005.
[52] A. Castiglione, M. Cepparulo, A. De Santis, and F. Palmieri, “Towards a lawfully secure and privacy preserving
video surveillance system”, In International Conference on Electronic Commerce and Web Technologies,
pp. 73-84. Springer, 2010.
[53] M. Brocker and S. Checkoway, “iSeeYou: Disabling the MacBook webcam indicator LED”, In 23rd USENIX
Security Symposium, pp. 337-352, 2014.
[54] J. Aron. Want to rob a bank? Hack your way in. New Scientist, 220(2937):22, 2013.
BIOGRAPHIES OF AUTHORS
Hyunsung Kim received his MSc. and Ph.D. degrees in Computer Engineering from Kyungpook
National University, Republic of Korea, in 1998 and 2002, respectively. From 2000 to 2002, he
worked as a senior researcher at Ditto Technology. He had been an associate professor from 2002 to
2011 with the Department of Computer Engineering, Kyungil University. Currently, he is a
professor at the Department of Cyber Security, Kyungil University.His current research interests are
cryptography, VLSI, security protocols, network security and ubiquitous computing security
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2072 – 2082