Enhancing Crime Detection in Video Surveillance via a Lightweight Blockchain and Homomorphic Encryption-based Computer Vision System

Main Article Content

Tanya Abdulsattar Jaber

Abstract

Blockchain technology consists of distributed ledgers or database systems, regarded as immutable, secure, and innovative, characterized by unsupervised internal maintenance with a special security protocol used to prevent inference from malicious or third parties. The widespread use of this technology has led to deep research into the problems posed by this technology, which can be summarized in terms of computational cost and latency time. The crime detection process in video surveillance has made great progress with the use of technologies such as the Internet of Things and blockchain technologies. However, to reach high levels of security in the physical crime detection process in which data are sent to servers via a computer network, there must be a high degree of security for Internet of Things systems related to the crime detection process. There has been a significant increase in the number of problems associated with crime detection in video surveillance systems, including the modification of surveillance data during transfer to and from servers. For this reason, establishing a reliable and secure system for transferring video surveillance data to servers has become a high priority. This paper presents a lightweight security system to protect data generated in the crime detection process, both from video surveillance cameras and the servers that store these data. The challenges related to IoT-based video surveillance cameras and monitoring and control centers have been considered, turning the system primarily into a decentralized system. In this paper, a lightweight blockchain system based on a proof of secret share consensus algorithm technology is proposed, along with the encryption of surveillance data via modified Okamoto–Uchiyama homomorphic encryption technology. The proposed system is evaluated via standard blockchain and security evaluation metrics, demonstrating efficient utilization of computational costs and realization of security, with a high scalability rate. The VGG16 deep learning model is employed in the proposed system to detect and classify criminal activities in surveillance videos. Owing to its ability to identify patterns and anomalies, the model achieved an accuracy of 94%, demonstrating a high level of performance in crime detection and prevention. Overall, the use of VGG16 provides an efficient and reliable approach for improving the security of public spaces and reducing the risk of criminal activity.

Article Details

Section

Articles

How to Cite

Enhancing Crime Detection in Video Surveillance via a Lightweight Blockchain and Homomorphic Encryption-based Computer Vision System (T. A. . Jaber , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(1), 121-146. https://doi.org/10.58496/MJCS/2025/009

References

[1] W. Al Saidi and A. M. Zeki, "The use of data mining techniques in crime prevention and prediction," in 2nd Smart Cities Symposium (SCS 2019), pp. 1-4, IET, 2019.

[2] R. F. Ghani, A. A. Salman, A. B. Khudhair, and L. Aljobouri, "Blockchain-based student certificate management and system sharing using hyperledger fabric platform," Periodicals of Engineering and Natural Sciences, vol. 10, no. 2, pp. 207-218, 2022.DOI: 10.21533/pen.v10i2.1953

[3] M. Z. Mohammed, H. B. A. Wahab, and A. M. J. A. Hossen, "Proposed Image Encryption Algorithm based on Paillier and Elliptic Curve Algebra," in 2021 14th International Conference on Developments in eSystems Engineering (DeSE), pp. 302-306, 2021.

[4] T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring," in Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings, vol. 17, pp. 308-318, Springer Berlin Heidelberg, 1998, doi: 10.1007/BFb0055716.

[5] M. Soliman, M. Kamal, M. Nashed, Y. Mostafa, B. Chawky, and D. Khattab, "Violence Recognition from Videos using Deep Learning Techniques," in Proc. 9th International Conference on Intelligent Computing and Information Systems (ICICIS'19), Cairo, Egypt, 2019, pp. 79-84.

[6] M. A. Mohammed and H. B. Abdul Wahab, "Proposed New Blockchain Consensus Algorithm," JIM, vol. 16, no. 20, pp. 162-167, Mar. 2022.

[7] T. A. Jaber, "Security Risks of the Metaverse World," Int. J. Interact. Mobile Technol., vol. 16, no. 13, pp. 1-7, Feb. 2022.

[8] A. Singh, G. Kumar, R. Saha, M. Conti, M. Alazab, and R. Thomas, "A survey and taxonomy of consensus protocols for blockchains," J. Syst. Archit., vol. 125, pp. 102503, Feb. 2022.

[9] A. Wood, K. Najarian, and D. Kahrobaei, "Homomorphic encryption for machine learning in medicine and bioinformatics," ACM Comput. Surv., vol. 53, no. 4, pp. 1-35, Nov. 2020.

[10] B. Alaya, L. Laouamer, and N. Msilini, "Homomorphic encryption systems statement: Trends and challenges," Comput. Sci. Rev., vol. 36, pp. 100235, Dec. 2020.

[11] M. R. Suma and P. Madhumathy, "Brakerski-Gentry-Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow-worm swarm optimization," Trans. Emerg. Telecommun. Technol., vol. 33, no. 12, pp. e4641, Dec. 2022.

[12] G. Xu, J. Zhang, U. G. O. Cliff, and C. Ma, "An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption," Int. J. Intell. Syst., pp. 1-18, Feb. 2022.

[13] T. A. Jaber and M. A. Hussein, "Study on known models of NB-IoT Applications in Iraqi environments," in IOP Conf. Ser. Mater. Sci. Eng., vol. 518, no. 5, p. 052013, 2019.

[14] T. A. Jaber, "Artificial intelligence in computer networks," Period. Eng. Nat. Sci., vol. 10, no. 1, pp. 309-322, 2022.

[15] Z. A. Kamal and R. Fareed, "Data retrieval based on the smart contract within the blockchain," Periodicals of Engineering and Natural Sciences, vol. 9, no. 4, pp. 491-507, Oct. 2021.

[16] R. M. Zaki and H. B. A. Wahab, "A novel of substitution-box design using PLL algorithms in magic cube," Period. Eng. Nat. Sci., vol. 9, no. 4, pp. 674-684, 2021.

[17] Zaki, Rana Mohammed. "SNOW3G Modified by using PLL Algorithms in Magic Cube." Iraqi Journal of Computers, Communications, Control and Systems Engineering 22, no. 3 (2022): 1-8.

[18] Hussein, M. A. (2023). A Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks. International Journal of Interactive Mobile Technologies, 17(2).

[19] W. G. Yass and M. Faris , Trans., “Integrating computer vision, web systems and embedded systems to develop an intelligent monitoring system for violating vehicles”, BJIoT, vol. 2023, pp. 69–73, Sep. 2023, doi: 10.58496/BJIoT/2023/009.

[20] C. K. Koç, F. Özdemir, and Z. Ödemiş Özger, "Okamoto-Uchiyama Algorithm," in Partially Homomorphic Encryption, Cham, Switzerland: Springer, 2021, pp. 83-93.

[21] L. Zhou, L. Wang, Y. Sun and P. Lv, "Beekeeper: A blockchain-based iot system with secure storage and homomorphic computation," in IEEE Access, vol. 6, pp. 43472-43488, 2018.

[22] F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A.-N. Benharkat, "Privacy-preserving IoT data aggregation based on blockchain and homomorphic encryption," Sensors, vol. 21, no. 7, pp. 2452, Apr. 2021.

[23] She, W.E.I., Gu, Z.H., Lyu, X.K., Liu, Q.I., Tian, Z. and Liu, W., 2019. Homomorphic consortium blockchain for smart home system sensitive data privacy preserving. IEEE Access, 7, pp.62058-62070.

[24] L. Hussain, “Fortifying AI Against Cyber Threats Advancing Resilient Systems to Combat Adversarial Attacks”, EDRAAK, vol. 2024, pp. 26–31, Mar. 2024, doi: 10.70470/EDRAAK/2024/004.

[25] W. Qu, L. Wu, W. Wang, Z. Liu and H. Wang, "A electronic voting protocol based on blockchain and homomorphic signcryption," Concurrency and Computation: Practice and Experience, vol. 34, no. 16, e5817, 2022.

[26] C. Sravani and G. Murali, "Secure electronic voting using blockchain and homomorphic encryption," Int. J. Recent Technol. Eng, vol. 8, no. 2, pp. 1002-1007, 2019.

[27] H. Kim, K. E. Kim, S. Park, and J. Sohn, "E-voting System Using Homomorphic Encryption and Blockchain Technology to Encrypt Voter Data," arXiv preprint arXiv:2111.05096, Nov. 2021.

[28] F.N.S. Vanin, L.M. Policarpo, R.D.R. Righi, S.M. Heck, V.F. da Silva, J. Goldim and C.A. da Costa, "A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach," Sensors, vol. 23, no. 1, pp. 14, Jan. 2022.

[29] T. A. Jaber, "Sensor based human action recognition and known public datasets a comprehensive survey," in AIP Conference Proceedings, vol. 2591, no. 1, 2023, p. 020031.

[30] Ezzeldin, Mustafa, Amr Ghoneim, Laila Abdelhamid, and Ayman Atia. "Survey on Multimodal Complex Human Activity Recognition." FCI-H Informatics Bulletin 7, no. 1 (2025): 26-44.

[31] Hephzipah, J. Jasmine, Ranadheer Reddy Vallem, M. Sahaya Sheela, and G. Dhanalakshmi. "An efficient cyber security system based on flow-based anomaly detection using Artificial neural network." Mesopotamian Journal of Cybersecurity 2023 (2023): 48-56.

[32] Y. L. Khaleel, M. A. Habeeb, and H. Alnabulsi , Trans., “Adversarial Attacks in Machine Learning: Key Insights and Defense Approaches ”, Applied Data Science and Analysis, vol. 2024, pp. 121–147, Aug. 2024, doi: 10.58496/ADSA/2024/011.

[33] S. Q. Y. Al-Hashemi, M. S. Naghmash, and A. Ghandour, “Development of Smart Video Surveillance Systems: Technical and Security Challenges in Urban Environments”, SHIFRA, vol. 2024, pp. 24–38, Mar. 2024, doi: 10.70470/SHIFRA/2024/004.

Similar Articles

You may also start an advanced similarity search for this article.