{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:20:10Z","timestamp":1753885210957,"version":"3.41.2"},"reference-count":36,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T00:00:00Z","timestamp":1629936000000},"content-version":"vor","delay-in-days":237,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>With the continuous development and application of monitoring technology, which involves increasingly more sensitive information, the global demand for video monitoring systems has surged. As a result, video monitoring technology has received widespread attention both at home and abroad. Traditional video monitoring systems experience security threats, with differing levels of severity, in terms of attack, storage, transmission, etc., which results in different degrees of damage to users\u2019 rights. Therefore, we propose a blockchain\u2010SM\u2010based video monitoring system called BSVMS. For the front\u2010end device invasion risk, internal attack risk, and security storage problem of the monitoring system, we use commercial cryptography algorithms to complete the encryption processing of images through a visual change network in the imaging process, thereby ensuring the security of the video data from the source. To address the problem that the video monitoring application software and data are vulnerable to damage, we use blockchain technologies that are tamper\u2010proof and traceable to build a trustworthy video monitoring system. In the system, no member can query the original monitoring data. To address the security issues in network transmission, we use a commercial cryptography algorithm for multilayer encryption to ensure the security of data during transmission, guarantee the confidentiality of the system, and realize domestic autonomous control. We then conduct tests and security analysis of the encryption and decryption efficiency of the SM4 algorithm used in the system, the blockchain performance, and the overall performance. The experimental results show that in this system environment, the SM4 algorithm encryption and decryption efficiency is better than other algorithms and that the blockchain used meets industry standards.<\/jats:p>","DOI":"10.1155\/2021\/6518743","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T03:49:17Z","timestamp":1630036157000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6520-1319","authenticated-orcid":false,"given":"Xuan","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2202-3030","authenticated-orcid":false,"given":"Jingjing","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4423-2543","authenticated-orcid":false,"given":"Jiaxin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3230-7563","authenticated-orcid":false,"given":"Wei","family":"Ou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2396-9514","authenticated-orcid":false,"given":"Jung Yoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8955-8489","authenticated-orcid":false,"given":"Wenbao","family":"Han","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"e_1_2_8_1_2","first-page":"146","article-title":"Network video monitoring system status and security issues","author":"Wang T.","year":"2020","journal-title":"Network Security Technology and Application"},{"key":"e_1_2_8_2_2","first-page":"31","article-title":"Application of thermal imaging body temperature measurement camera in epidemic prevention and control period","author":"Jiang C.","year":"2020","journal-title":"Electronic production"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3023155"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3067374"},{"key":"e_1_2_8_5_2","first-page":"1093","article-title":"An overview of intelligent video monitoring technology","volume":"38","author":"Huang K.","year":"2015","journal-title":"Journal of Computer Science"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102249"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3057333"},{"key":"e_1_2_8_8_2","first-page":"31","article-title":"Application and development trend of intelligent video monitoring system","volume":"38","author":"Xie Q.","year":"2019","journal-title":"Shanxi Coal Mine"},{"key":"e_1_2_8_9_2","first-page":"178","article-title":"The current situation and development trend of network video monitoring system","volume":"375","author":"Gao W.","year":"2017","journal-title":"Information and Computer (Theory Edition)"},{"key":"e_1_2_8_10_2","first-page":"130","article-title":"Analysis of the key points of the application of new technologies in the security industry in the construction of safe cities","author":"Li S.","year":"2020","journal-title":"Information Communication"},{"key":"e_1_2_8_11_2","first-page":"64","article-title":"Smart cities: connotation, dimensions, evaluation and practice","author":"Ma S.","year":"2020","journal-title":"Frontiers of Foreign Social Sciences"},{"key":"e_1_2_8_12_2","first-page":"1296","article-title":"A brief description of the organization and implementation plan for the construction of \"snow bright\" project","author":"Xu X.","year":"2020","journal-title":"China Cable TV"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01535-1"},{"key":"e_1_2_8_14_2","article-title":"Research on the status and development trend of network video monitoring system","volume":"20","author":"Bo C.","year":"2018","journal-title":"China New Communication"},{"key":"e_1_2_8_15_2","article-title":"Video monitoring system development status and trends","author":"Zhang S.","year":"2018","journal-title":"Electronic Paradise"},{"key":"e_1_2_8_16_2","article-title":"The current situation and development trend of video monitoring system","author":"Duan Y.","year":"2019","journal-title":"Technology Wind"},{"key":"e_1_2_8_17_2","first-page":"106","article-title":"The application and development direction of video monitoring image detection under video monitoring system","author":"Wang S.","year":"2019","journal-title":"China High-Tech"},{"key":"e_1_2_8_18_2","doi-asserted-by":"crossref","unstructured":"Al-MarashdaK. Video security assurance framework based on efficient Joint Cryptography Compression approach Electronics Circuits and Systems (ICECS) IEEE 20th International Conference on 2013 Abu Dhabi 76\u201377.","DOI":"10.1109\/ICECS.2013.6815351"},{"key":"e_1_2_8_19_2","first-page":"182","article-title":"Research on network security assessment technology based on penetration testing","author":"Meng M.","year":"2018","journal-title":"Automation and Instrumentation"},{"key":"e_1_2_8_20_2","first-page":"112","article-title":"Network video monitoring system status and development","volume":"9","author":"Wang X.","year":"2019","journal-title":"Modern Industrial Economy and Informatization"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983835"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3391198"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127499000493"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127499000821"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1137\/080725891"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-011-0246-9"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.030724"},{"key":"e_1_2_8_28_2","unstructured":"HuangH.-Y. YangC.-H. andHsuW.-H. A video watermarking algorithm based on pseudo 3D DCT IEEE Symposium on Computational Intelligence for Image Processing 2009 Nashville TN USA 76\u201381."},{"key":"e_1_2_8_29_2","first-page":"2520","article-title":"Research on video conference encryption technology","volume":"53","author":"Zhang S.","year":"2020","journal-title":"Communications Technology"},{"key":"e_1_2_8_30_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1557-3"},{"key":"e_1_2_8_31_2","first-page":"2049","article-title":"Security audit technology of ultra high definition video content","volume":"53","author":"Zhang J.","year":"2020","journal-title":"Communications Technology"},{"key":"e_1_2_8_32_2","first-page":"2292","article-title":"Research and analysis on security of public security video private network","volume":"53","author":"Chun Y. Y.","year":"2020","journal-title":"Communications Technology"},{"key":"e_1_2_8_33_2","first-page":"68","article-title":"Security risks and technical solutions of video monitoring system","volume":"23","author":"Long T.","year":"2020","journal-title":"Journal of Xi\u2032an College of Arts and Sciences (Natural Science Edition)"},{"key":"e_1_2_8_34_2","first-page":"207","article-title":"Security enforced solution for video monitoring system networking application","volume":"52","author":"Zhang Z.","year":"2019","journal-title":"Communications Technology"},{"key":"e_1_2_8_35_2","first-page":"1224","article-title":"Research of cryptographic application on video monitoring based on 5G edge computing","volume":"53","author":"Yuan-bing S.","year":"2020","journal-title":"Communication Technology"},{"key":"e_1_2_8_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01246-2"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6518743.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6518743.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6518743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:40:58Z","timestamp":1723027258000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6518743"}},"subtitle":[],"editor":[{"given":"Xiaoxian","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6518743"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6518743","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-06-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6518743"}}