{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:07:50Z","timestamp":1760609270410},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"31-32","license":[{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Development of Cloud-based Intelligent Video Security Incubating Platform","award":["2017-0-00207"],"award-info":[{"award-number":["2017-0-00207"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-09016-z","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T18:03:44Z","timestamp":1591725824000},"page":"23461-23481","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["CCTV-RFID enabled multifactor authentication model for secure differential level video access control"],"prefix":"10.1007","volume":"79","author":[{"given":"Jinsu","family":"Kim","sequence":"first","affiliation":[]},{"given":"Donghyeok","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Namje","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,9]]},"reference":[{"key":"9016_CR1","volume-title":"\"Message-locked encryption and secure deduplication\", Annual international conference on the theory and applications of cryptographic techniques","author":"M Bellare","year":"2013","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013) \"Message-locked encryption and secure deduplication\", Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg"},{"key":"9016_CR2","doi-asserted-by":"crossref","unstructured":"Choudhary A, Rekha V (2017) Face recognition using multiresolution wavelet combining discrete cosine transform and Walsh transform. Proceedings of the 2017 International Conference on Biometrics Engineering and Application. ACM","DOI":"10.1145\/3077829.3077835"},{"key":"9016_CR3","doi-asserted-by":"crossref","unstructured":"Hossain MA (2014) Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks (IJDSN) 10(5)","DOI":"10.1155\/2014\/135257"},{"key":"9016_CR4","doi-asserted-by":"crossref","unstructured":"Kaaniche N, Laurent M (2014) A secure client side deduplication scheme in cloud storage environments, New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp.1\u20137","DOI":"10.1109\/NTMS.2014.6814002"},{"issue":"4","key":"9016_CR5","first-page":"129","volume":"12","author":"BK Kim","year":"2014","unstructured":"Kim BK, Ko YW, Lee KM (2014) Performance enhancement for data deduplication server using bloom filter. Journal of KIIT 12(4):129\u2013136","journal-title":"Journal of KIIT"},{"key":"9016_CR6","doi-asserted-by":"crossref","unstructured":"Kim J, et al (2017) Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications. Privacy-Aware Computing (PAC), 2017 IEEE Symposium on. IEEE","DOI":"10.1109\/PAC.2017.22"},{"key":"9016_CR7","unstructured":"La HJ, Park CW, Kim SD (2014) A framework for effectively managing dynamism of IoT devices. Journal of Korea Information Society 41(8):545\u2013556"},{"key":"9016_CR8","doi-asserted-by":"crossref","unstructured":"Lee D, Park N (2016) Teaching book and tools of elementary network security learning using Gamification mechanism. Journal of The Korea Institute of Information Security and Cryptology (JKIISC) 26(3):787\u2013797","DOI":"10.13089\/JKIISC.2016.26.3.787"},{"issue":"3","key":"9016_CR9","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1007\/s11227-017-1967-0","volume":"73","author":"D Lee","year":"2017","unstructured":"Lee D, Park N (2017) Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1119","journal-title":"J Supercomput"},{"issue":"2","key":"9016_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.14801\/jkiit.2017.15.2.79","volume":"15","author":"D Lee","year":"2017","unstructured":"Lee D, Park N (Feb. 2017) A secure almanac synchronization method for open IoT maritime cloud environment. J Korean Inst Inf Technol 15(2):79\u201390","journal-title":"J Korean Inst Inf Technol"},{"key":"9016_CR11","doi-asserted-by":"publisher","unstructured":"Lee D, Park N, Kim G, Jin S, (2018) De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment, Peer Peer Netw Appl 1\u201310, https:\/\/doi.org\/10.1007\/s12083-018-0637-1","DOI":"10.1007\/s12083-018-0637-1"},{"key":"9016_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2012.08.028","volume":"108","author":"L Leng","year":"2013","unstructured":"Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1\u201312","journal-title":"Neurocomputing"},{"key":"9016_CR13","doi-asserted-by":"crossref","unstructured":"Leng L et al (2010) Cancelable palmcode generated from randomized gabor filters for palmprint protection. 2010 25th International Conference of Image and Vision Computing New Zealand. IEEE","DOI":"10.1109\/IVCNZ.2010.6148818"},{"key":"9016_CR14","doi-asserted-by":"crossref","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685\u2013696","DOI":"10.1109\/TCSVT.2019.2896270"},{"key":"9016_CR15","doi-asserted-by":"crossref","unstructured":"Lin, Chia-Feng, et al (2012) A framework for scalable cloud video recorder system in surveillance environment. 2012 9th international conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing. IEEE","DOI":"10.1109\/UIC-ATC.2012.72"},{"key":"9016_CR16","doi-asserted-by":"crossref","unstructured":"Ma J, Wang G, and Liu X (2016) DedupeSwift: object-oriented storage system based on data deduplication, Trustcom\/Big Data SE\/I SPA, 2016 IEEE, pp.1069\u20131076","DOI":"10.1109\/TrustCom.2016.0177"},{"key":"9016_CR17","doi-asserted-by":"crossref","unstructured":"Park N (2013) UHF\/HF dual-band integrated Mobile RFID\/NFC linkage method for mobile device-based business application. Journal of the Korean Institute of Communication 38(10):841\u2013851","DOI":"10.7840\/kics.2013.38C.10.841"},{"issue":"6","key":"9016_CR18","doi-asserted-by":"publisher","first-page":"466","DOI":"10.7840\/kics.2014.39C.6.466","volume":"39C","author":"N Park","year":"2014","unstructured":"Park N (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. J KICS 39C(6):466\u2013475","journal-title":"J KICS"},{"issue":"19","key":"9016_CR19","first-page":"837","volume":"118","author":"N Park","year":"2018","unstructured":"Park N (Jan. 2018) The Core competencies of SEL-based innovative creativity education. Int J Pure Appl Math 118(19):837\u2013849","journal-title":"Int J Pure Appl Math"},{"issue":"19","key":"9016_CR20","first-page":"819","volume":"118","author":"N Park","year":"2018","unstructured":"Park N (Jan. 2018) STEAM education program : training program for financial engineering career. Int J Pure Appl Math 118(19):819\u2013835","journal-title":"Int J Pure Appl Math"},{"key":"9016_CR21","doi-asserted-by":"crossref","unstructured":"Park N, Bang H-C (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Journal of Security and Communication Networks 9(6):500\u2013512","DOI":"10.1002\/sec.1108"},{"issue":"1","key":"9016_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s16010020","volume":"16","author":"N Park","year":"2015","unstructured":"Park N, Kang N (2015) Mutual authentication scheme in secure internet of things Technology for Comfortable Lifestyle. Sensors 16(1):1\u201316","journal-title":"Sensors"},{"issue":"3","key":"9016_CR23","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s10586-014-0367-y","volume":"17","author":"N Park","year":"2014","unstructured":"Park N, Kim M (Sep. 2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653\u2013664","journal-title":"Clust Comput"},{"key":"9016_CR24","doi-asserted-by":"publisher","unstructured":"Park N, Lee D (2017) Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Pers Ubiquit Comput:1\u20138. https:\/\/doi.org\/10.1007\/s00779-017-1017-1","DOI":"10.1007\/s00779-017-1017-1"},{"key":"9016_CR25","doi-asserted-by":"crossref","unstructured":"Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI Mobile platform with secure Service for Mobile RFID network environment. Advanced Web and Network Technologies, and Applications 3842:741\u2013748","DOI":"10.1007\/11610496_100"},{"key":"9016_CR26","unstructured":"Park N, Park J, Kim H (Jan. 2015) Inter-authentication and session key sharing procedure for secure M2M\/IoT environment. Information: an international internal journal 18(1):261\u2013266"},{"key":"9016_CR27","doi-asserted-by":"crossref","unstructured":"Park N, Hu H, Jin Q (2016) Security and privacy mechanisms for sensor middleware and application in internet of things (IoT), International Journal of Distributed Sensor Networks (IJDSN)","DOI":"10.1155\/2016\/2965438"},{"key":"9016_CR28","doi-asserted-by":"crossref","unstructured":"Park C, Hong D, Seo C (2016) A secure and practical encrypted data De-duplication with proof of ownership in cloud storage. Journal of the Korea Information Science Society 43(10):1165\u20131172","DOI":"10.5626\/JOK.2016.43.10.1165"},{"key":"9016_CR29","doi-asserted-by":"crossref","unstructured":"Penhaker M et al (2012) Cloud computing environments for biomedical data services. Intelligent Data Engineering and Automated Learning -- IDEAL 2012:336\u2013343","DOI":"10.1007\/978-3-642-32639-4_41"},{"key":"9016_CR30","doi-asserted-by":"crossref","unstructured":"Puzio P, Molva R, Onen M, Loureiro S (2013) ClouDedup: secure deduplication with encrypted data for cloud storage, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, pp. 363\u2013370","DOI":"10.1109\/CloudCom.2013.54"},{"key":"9016_CR31","doi-asserted-by":"crossref","unstructured":"Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surveys (CSUR) 50(1)","DOI":"10.1145\/3038924"},{"key":"9016_CR32","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad K, Hamza R, Yan H (2019) Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7:86384\u201386393","journal-title":"IEEE Access"},{"key":"9016_CR33","unstructured":"Robertson DJ (2018) Face recognition: security contexts, super-recognizers, and sophisticated fraud. Homeland Defense and Security Information Analysis Center (HDIAC) 5(1):6\u201310"},{"key":"9016_CR34","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez-Silva DA, et al (2012) Video surveillance based on cloud storage. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE","DOI":"10.1109\/CLOUD.2012.44"},{"key":"9016_CR35","unstructured":"Tang Y, Yang J, (2015) Secure deduplication of general computations, USENIX Annual Technical Conference, pp.319\u2013331"},{"key":"9016_CR36","unstructured":"Wang Y, et al (2017) Face recognition in real-world surveillance videos with deep learning method. Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. IEEE"},{"issue":"1","key":"9016_CR37","first-page":"173","volume":"38","author":"Y-L Wu","year":"2017","unstructured":"Wu Y-L, Tao Y-H, Chang C-J (2017) A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom. J Inf Optim Sci 38(1):173\u2013196","journal-title":"J Inf Optim Sci"},{"key":"9016_CR38","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.patcog.2016.12.028","volume":"66","author":"M Yang","year":"2017","unstructured":"Yang M et al (2017) Joint and collaborative representation with local adaptive convolution feature for face recognition with single sample per person. Pattern Recogn 66:117\u2013128","journal-title":"Pattern Recogn"},{"key":"9016_CR39","doi-asserted-by":"crossref","unstructured":"Yoo Y-J, Kim S-J, Ko YW (2014) Cloud file synchronization scheme using bidirectional data Deduplication. Journal of Korean Institute of Information Technology (JKIIT) 12(1):103\u2013110","DOI":"10.14801\/kiitr.2014.12.1.103"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09016-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09016-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T23:50:00Z","timestamp":1623196200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09016-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,9]]},"references-count":39,"journal-issue":{"issue":"31-32","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["9016"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09016-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,9]]},"assertion":[{"value":"24 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}