Show simple item record

dc.contributor.authorTahir, Mehwish
dc.contributor.authorQiao, Yuansong
dc.contributor.authorKanwal, Nadia
dc.contributor.authorLee, Brian
dc.contributor.authorAsghar, Mamoona Naveed
dc.identifier.citationTahir, M.; Qiao, Y.; Kanwal, N.; Lee, B.; Asghar, M.N. (2023). Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities. Cryptography, 7, 7. cryptography7010007en_US
dc.description.abstractThe purpose of smart surveillance systems for automatic detection of road traffic accidents is to quickly respond to minimize human and financial losses in smart cities. However, along with the self-evident benefits of surveillance applications, privacy protection remains crucial under any circumstances. Hence, to ensure the privacy of sensitive data, European General Data Protection Regulation (EU-GDPR) has come into force. EU-GDPR suggests data minimisation and data protection by design for data collection and storage. Therefore, for a privacy-aware surveillance system, this paper targets the identification of two areas of concern: (1) detection of road traffic events (accidents), and (2) privacy preserved video summarization for the detected events in the surveillance videos. The focus of this research is to categorise the traffic events for summarization of the video content, therefore, a state-of-the-art object detection algorithm, i.e., You Only Look Once (YOLOv5), has been employed. YOLOv5 is trained using a customised synthetic dataset of 600 annotated accident and non-accident video frames. Privacy preservation is achieved in two steps, firstly, a synthetic dataset is used for training and validation purposes, while, testing is performed on real-time data with an accuracy from 55% to 85%. Secondly, the real-time summarized videos (reduced video duration to 42.97% on average) are extracted and stored in an encrypted format to avoid un-trusted access to sensitive event-based data. Fernet, a symmetric encryption algorithm is applied to the summarized videos along with Diffie–Hellman (DH) key exchange algorithm and SHA256 hash algorithm. The encryption key is deleted immediately after the encryption process, and the decryption key is generated at the system of authorised stakeholders, which prevents the key from a man-in-the-middle (MITM) attack.en_US
dc.rightsAttribution-3.0 United States*
dc.subjectSmart citiesen_US
dc.subjectTraffic eventsen_US
dc.subjectVideo summarizationen_US
dc.titlePrivacy preserved video summarization of road traffic events for IoT smart citiesen_US
dc.contributor.affiliationTechnological University of the Shannon: Midlands Midwesten_US
dc.identifier.doi10.3390/ cryptography7010007en_US
dc.subject.departmentSoftware Research Institute: TUS MIdlandsen_US

Files in this item


This item appears in the following Collection(s)

Show simple item record

Attribution-3.0 United States
Except where otherwise noted, this item's license is described as Attribution-3.0 United States