Are you R. Reda?

Claim your profile

Publications (13)0 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: In this work the convergence of ICT security and physical security is addressed. Starting by analyzing the impact of technology penetration on the global market and subsequently on security. Security spending in the Global IT market is analyzed, focusing on the development of the split out, which revealed the fact that spending is not always in the right sector. ICT Security and its classification in the different sectors are presented by taking into consideration the major security classes and their impact. Finally, an outlook of emerging future technologies is presented, focusing on the sector video surveillance, which is the driving potential of both physical and ICT-security.
    Informatics and Systems (INFOS), 2010 The 7th International Conference on; 04/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: For large scale, high performance Video Surveillance Systems, performance and the Security Management Process are intertwined. Confidentiality and Privacy are increasingly crucial factors determining the acceptance of the system. The current solution is based on a distributed architecture, utilizing high performance and real time characteristics of the base system. It presents an evaluation of existing technologies considering both theoretical as well as currently available systems. Following the extracted requirements, a user right management model with foci on extensibility and usability to minimize possible misconfiguration is proposed.
    Informatics and Systems (INFOS), 2010 The 7th International Conference on; 04/2010
  • [Show abstract] [Hide abstract]
    ABSTRACT: This work presents a break-through feature package for Advanced Intelligent Video Surveillance Systems. The feature package selective ID protection in advanced high performance intelligent video surveillance was designed and implemented with two different approaches: A hardware based-solution, where an additional ILP processor was mounted in the SmartCam core board to execute such special tasks like Selective ID Protection of an object, a person or a vehicle, This guarantees that the overall performance of the SmartCam will be almost not affected through those tasks. The second approach is a software-based solution: the feature package was implemented on one of the available advanced SmartCam, without altering its HW structure. The implementation concept was based upon scrambling the selective ID/characteristics of the object/person/vehicle under consideration. Those characteristics must be predefined in the SmartCam. This feature package was implemented upon the request of a European security authority.
    Informatics and Systems (INFOS), 2010 The 7th International Conference on; 04/2010
  • Source
    S. Sutor, G. Pujolle, R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper an instantaneous, high performance, large-scale video surveillance system is presented. Available and future network technologies are analyzed for the dynamical and flexible use of mobile devices in video surveillance. Based on this analysis, video quality levels are proposed followed by wireless ad hoc video surveillance performance levels (WAD levels). Then the systems' structure as well as the underlying technologies are presented. The system is further analyzed to measure its performance and to expose potential security threats and discuss the corresponding counter meas.ures on real-world attack scenarios.
    Wireless Days, 2008. WD '08. 1st IFIP; 12/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.
    Wireless Days, 2008. WD '08. 1st IFIP; 12/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper an analytical study and novel concept of software, hardware and engineering of a new device is presented: the video surveillance local control unit (VSLC). Engineering and performance parameters of the VSLC will be evaluated. Subsequently, the state-prevent-event process of the video surveillance system will be analyzed. Accordingly, a new spectrum of applications of video surveillance systems will be introduced. It is expected to achieve new real-time features, especially in critical situations. Finally, one of the applications is considered and analyzed within a case study.
    Wireless Days, 2008. WD '08. 1st IFIP; 12/2008
  • K. Kraus, R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper the need of sensors other than analog and digital cameras in a CCTV environment are discussed as well as the advantages these security relevant sensors can offer. After evaluating various use cases the currently available technologies in this area will be analyzed including Bluetooth, Zigbee and Wireless USB. The main focus will be placed on the security aspects, the behavior in case of failure and power management. On the basis of the evaluation a network topology will be proposed which is resilient to failure and reorganizing with the installation of new sensors.
    Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on; 11/2008
  • S. Sutor, R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: Based on the success of intelligent video surveillance systems, especially in the field of security, scalability and performance, the corresponding architecture and concept is extended to involve different types of sensors in addition to visual sensors. In this work an analytical study of the whole spectrum of sensor technologies and their characteristics and performance recommendation is presented. Subsequently the multi-sensor approach is discussed with the goal of augmentation of intelligent video surveillance systems. Utilizing multi-sensor technologies will require massive data fusion and bring new challenges not only in fusion but also security.
    Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on; 11/2008
  • F. Matusek, R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: The trade-off between privacy and security was a subject of intensive discussion. Giving up privacy does not necessarily result in greater security, and greater security does not necessarily require a loss of privacy. In this work, three different novel approaches are presented to store personal data obtained from intelligent video surveillance systems in an efficient and secure way. The storage process of this data poses a number of challenges e.g. storage optimization, query performance, security management, access control and performance management. Each of the proposed technique is evaluated and analyzed with respect to the above-mentioned challenges. Field test results showed that each of the technique can be successfully applied to hide/conceal privacy related data with a maximum storage as well as retrieval performance.
    Computer and Information Sciences, 2008. ISCIS '08. 23rd International Symposium on; 11/2008
  • S. Sutor, F. Matusek, R. Reda
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper an innovative approach for utilizing advances of wireless mobility and computer vision for the application of video surveillance are given. Design and engineering of a high performance wireless self-contained surveillance unit is presented (WSSU). These WSSUs can be deployed in emergency cases, where no time for preparation and installation is available. Further, utilizing the performance of the WSSU, together with a mobile video surveillance local control (VSLC), an ad hoc video surveillance system is presented.
    Telecommunications, 2008. AICT '08. Fourth Advanced International Conference on; 07/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a novel architecture for high security, scalable video surveillance systems. The goal of this architecture concept was the creation of a virtually indestructible video surveillance system with the highest possible performance level, even under worst-case circumstances. First, the security management process used to build up such a system is introduced and analyzed, with the focus of how to achieve the highest possible security level. The presented system was subject to several test methods and phase levels to evaluate system performance. From the end user's point of view, all the achieved results verified the high performance and nearly indestructible characteristics of the system.
    Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on; 01/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: As the threat potential against critical infrastructure increases, more and more flexible, scalable, efficient, reliable and future-proof video surveillance technologies are required. This paper introduces an analytical study of performance parameters for large-scale video surveillance systems. Analog to computer network systems, performance parameters are defined: e.g. reliability, availability (instantaneous, interval and steady state) and survivability are defined, calculated, evaluated and analyzed. Moreover, a new important performance parameter, visual coverage-quality and redundancy levels are introduced. Two case studies are presented, which show that these factors are indispensable for designing the best possible configuration of a large-scale video surveillance systems.
    Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on; 01/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: One of the major, difficult tasks in automated video surveillance is the segmentation of relevant objects in the scene. Current implementations often yield inconsistent results on average from frame to frame when trying to differentiate partly occluding objects. This paper presents an efficient block-based segmentation algorithm which is capable of separating partly occluding objects and detecting shadows. It has been proven to perform in real time with a maximum duration of 47.48 ms per frame (for 8x8 blocks on a 720x576 image) with a true positive rate of 89.2%. The flexible structure of the algorithm enables adaptations and improvements with little effort. Most of the parameters correspond to relative differences between quantities extracted from the image and should therefore not depend on scene and lighting conditions. Thus presenting a performance oriented segmentation algorithm which is applicable in all critical real time scenarios.