{"title":"Remote Video Surveillance","authors":"L. Deligiannidis","doi":"10.1109/CSCI54926.2021.00064","DOIUrl":null,"url":null,"abstract":"We present a video surveillance solution that requires minimal installation and configuration effort. Video feeds are encrypted and accessible to anyone with the appropriate authentication credentials. The presented solution does not require any router nor firewall reconfiguration and the video feed is accessible even if the camera is behind a firewall and in a private network. Normally, port-forwarding needs to be enabled on the firewall, at minimum, to enable internet clients to access a camera located in a private network. Our solution enables a camera to be placed behind firewalls, in private networks, and still be accessible from the internet or other private networks without reconfiguring any of the existing network infrastructure. We achieve this by initiating a connection from the camera to a public proxy server which serves the role of an intermediary between clients/users and the camera. Clients connect to the proxy server. The proxy server then hands off the video feed of the camera to the client. This way, there is never a connection initiation from the internet to the camera. We provide three different methods of accessing the video feeds: via: a mobile app, a conventional browser, and a Linux command-line interface.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"15 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI54926.2021.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We present a video surveillance solution that requires minimal installation and configuration effort. Video feeds are encrypted and accessible to anyone with the appropriate authentication credentials. The presented solution does not require any router nor firewall reconfiguration and the video feed is accessible even if the camera is behind a firewall and in a private network. Normally, port-forwarding needs to be enabled on the firewall, at minimum, to enable internet clients to access a camera located in a private network. Our solution enables a camera to be placed behind firewalls, in private networks, and still be accessible from the internet or other private networks without reconfiguring any of the existing network infrastructure. We achieve this by initiating a connection from the camera to a public proxy server which serves the role of an intermediary between clients/users and the camera. Clients connect to the proxy server. The proxy server then hands off the video feed of the camera to the client. This way, there is never a connection initiation from the internet to the camera. We provide three different methods of accessing the video feeds: via: a mobile app, a conventional browser, and a Linux command-line interface.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
远程视频监控
我们提出了一个视频监控解决方案,需要最少的安装和配置工作。视频提要是加密的,任何具有适当身份验证凭证的人都可以访问。所提出的解决方案不需要重新配置任何路由器和防火墙,即使摄像机位于防火墙后面和专用网络中,也可以访问视频馈送。通常,端口转发至少需要在防火墙上启用,以使internet客户端能够访问位于专用网络中的摄像机。我们的解决方案使摄像机可以放置在防火墙后面,在专用网络中,并且仍然可以从互联网或其他专用网络访问,而无需重新配置任何现有的网络基础设施。我们通过启动从相机到公共代理服务器的连接来实现这一点,该服务器充当客户端/用户和相机之间的中介角色。客户端连接到代理服务器。然后代理服务器将摄像机的视频馈送交给客户端。这样,就不会有从互联网到相机的连接启动。我们提供了三种不同的访问视频源的方法:通过移动应用程序、传统浏览器和Linux命令行界面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Remote Video Surveillance Effects of Social Distancing Intention, Affective Risk Perception, and Cabin Fever Syndrome on Perceived Value of E-learning : Type of submission: Late Breaking Paper / Most relevant symposium: CSCI-ISED Cybersecurity Integration: Deploying Critical Infrastructure Security and Resilience Topics into the Undergraduate Curriculum Distributed Algorithms for k-Coverage in Mobile Sensor Networks Software Development Methodologies for Virtual Reality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1