Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
V. Prashyanusorn, Y. Fujii, S. Kaviya, S. Mitatha, P. P. Yupapin
.
DOI: 10.4236/jis.2010.12008   PDF    HTML     4,218 Downloads   9,385 Views   Citations

Abstract

For sustainable tourism, a novel method of security camera operation is proposed. In the method, security cameras, which encrypt the taken images and store them into the memory card inside, are used. Only when crimes occur, the memory cards are taken out from the cameras and the images are decrypted with the key and viewed by the city government and/or the police. When no crimes occur, images are overwritten by the new ones after a week automatically without being viewed by anyone. By using the stand-alone cameras without wiring to the control center, the installation cost and the operation cost are much lower than CCTV cameras. By using image encryption, the privacy of the tourists is protected. Using this system, high density installation of the security cameras with very low cost can be realized in encryption with image encryption privacy protection function

Share and Cite:

V. Prashyanusorn, Y. Fujii, S. Kaviya, S. Mitatha and P. Yupapin, "Sustainable Tourism Using Security Cameras with Privacy Protecting Ability," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 68-73. doi: 10.4236/jis.2010.12008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] C. Welsh and D. Farrington, “Crime Prevention Effects of Closed Circuit Television: A Systematic Review,” Home Office Research Study, 252, 2002.
[2] M. Gill and A. Spriggs, “Assessing the Impact of CCTV,” Home Office Research Study, 292, 2005.
[3] NPO, The e-JIKEI Network Promotion Institute. http:// www.e-jikei.org/index_e.htm/.
[4] Y. Fujii, N. Yoshiura and N. Ohta, “Community Security by Widely Available Information Technology,” JoCI 2005, 2. http://ci-journal.net/index.php/ciej/article/view/285/.
[5] Y. Fujii, N. Yoshiura and N. Ohta, “Creating a Worldwide Community Security Structure Using Individually Maintained Home Computers: The e-JIKEI Network Project,” Soc. Sci. Comput. Rev., Vol. 23, 2005, pp. 250-258.
[6] N. Yoshiura, Y. Fujii and N. Ohta, “Using the Security Camera System Based On Individually Maintained Computers For Homeland Security: The e-JIKEI Network Project,” Proc. IEEE IMTC, Ottawa, Canada, 2005, pp. 101-105.
[7] H. Ueda, Y. Fujii, S. Kumakura, N. Yoshiura and N. Ohta, “e-JIKEI Network Project/Japan: Enhancing Community Security,” eGov., Vol. 11, 2009, pp. 9-11.
[8] Y. Fujii, K. Maru, N. Yoshiura, N. Ohta, H. Ueda and Y. Sugita, “New Concept Regarding Management of Security Cameras,” JoCI 2008, 4. http://www.ci-journal.net/ index.php/ciej/article/view/442/427/
[9] Y. Fujii, K. Maru, K. Kobayashi, N. Yoshiura, N. Ohta, H. Ueda and P. P. Yupapin, “e-JIKEI Network Using e-JIKEI Cameras: Community Security Using Considerable Number of Cheap Stand-Alone Cameras,” Safety Science, Vol. 48, No. 7, 2010, pp. 921-925.
[10] V. Prashyanusorn, S. Kaviya and P. P. Yupapin, “Surveillance System for Sustainable Tourism with Safety and Privacy Protection,” Procedia—Social and Behavioral Sciences, Vol. 2, 2020, pp. 74-78.
[11] M. Zhang, B. Yang, S. Zhu and W. Zhang, “Ordered semiring-Based Trust Establish Model with Risk Evaluating,” International Journal of Network Security, Vol. 8, No. 2, 2009, pp. 101-106.
[12] S. H. Chiu, C. P. Lu and C. Y. Wen, “A Motion Detection-Based Framework for Improving Image Quality of CCTV Security Systems,” Journal of Forensic Sciences, Vol. 51, No. 5, 2006, pp. 1115-1119.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.