{"id":"https://openalex.org/W3025916689","doi":"https://doi.org/10.1109/iciot48696.2020.9089523","title":"Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques","display_name":"Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3025916689","doi":"https://doi.org/10.1109/iciot48696.2020.9089523","mag":"3025916689"},"language":"en","primary_location":{"id":"doi:10.1109/iciot48696.2020.9089523","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot48696.2020.9089523","pdf_url":null,"source":{"id":"https://openalex.org/S4306498678","display_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082459059","display_name":"Lina Alsahan","orcid":null},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Lina Al-Sahan","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077763189","display_name":"Fatima Al-Jabiri","orcid":null},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Fatima Al-Jabiri","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016709365","display_name":"Nora Abdelsalam","orcid":null},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Nora Abdelsalam","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021329808","display_name":"Amr Mohamed","orcid":"https://orcid.org/0000-0002-1583-7503"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Amr Mohamed","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089660851","display_name":"Tarek Elfouly","orcid":"https://orcid.org/0000-0002-1688-6163"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Tarek Elfouly","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037234286","display_name":"Mohamed Abdallah","orcid":"https://orcid.org/0000-0002-3261-7588"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohamed Abdallah","raw_affiliation_strings":["Information and Computing Technology Division, Hamad Bin Khalifa University"],"affiliations":[{"raw_affiliation_string":"Information and Computing Technology Division, Hamad Bin Khalifa University","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082459059"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":0.5724,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.73410214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.8226941227912903},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7713407874107361},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7095080018043518},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6434645056724548},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.5613108277320862},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5249590873718262},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44228124618530273},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12097042798995972}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.8226941227912903},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7713407874107361},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7095080018043518},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6434645056724548},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.5613108277320862},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5249590873718262},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44228124618530273},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12097042798995972},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iciot48696.2020.9089523","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iciot48696.2020.9089523","pdf_url":null,"source":{"id":"https://openalex.org/S4306498678","display_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/30102","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/30102","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2096733369","https://openalex.org/W2164598857","https://openalex.org/W2325939864","https://openalex.org/W2523410320","https://openalex.org/W2560122591","https://openalex.org/W2738042021","https://openalex.org/W2748692995","https://openalex.org/W2774492100","https://openalex.org/W2784158897","https://openalex.org/W2946811983","https://openalex.org/W2964350391","https://openalex.org/W3099206234","https://openalex.org/W6694260854","https://openalex.org/W6700903540","https://openalex.org/W6741612533"],"related_works":["https://openalex.org/W3092702943","https://openalex.org/W4297798448","https://openalex.org/W4388131927","https://openalex.org/W4251138110","https://openalex.org/W4388187043","https://openalex.org/W4285161539","https://openalex.org/W2982625131","https://openalex.org/W4320715980","https://openalex.org/W3122124622","https://openalex.org/W3150062897"],"abstract_inverted_index":{"National":[0],"security":[1],"is":[2,67,90],"a":[3,71,91,123,197],"top":[4],"priority":[5],"to":[6,111,132,190],"mitigate":[7],"intrusions":[8],"and":[9,32,40,83,108,138,147,163,179,193],"criminal":[10,33],"acts.":[11],"Governments":[12],"require":[13],"robust":[14],"national":[15],"surveillance":[16,46,102,117,151,156,199],"system":[17,169,188],"that":[18,28,66,104],"can":[19],"cover":[20],"all":[21],"geographical":[22],"areas,":[23],"including":[24],"the":[25,113,134,139,142,168,187],"blind":[26],"spots":[27],"may":[29],"hold":[30],"violence":[31],"incidents'":[34],"triggers":[35],"i.e.":[36],"malls,":[37],"stadiums,":[38],"airports,":[39],"other":[41],"key":[42],"sites.":[43],"Integrating":[44],"existing":[45],"infrastructures":[47],"rather":[48],"than":[49,184],"creating":[50],"centralized":[51],"solutions":[52],"will":[53],"have":[54],"great":[55],"potential":[56],"on":[57],"scalability":[58,162],"as":[59,61,119],"well":[60],"providing":[62],"more":[63],"liberal":[64],"framework":[65],"not":[68],"run":[69],"by":[70],"single":[72],"point":[73],"of":[74,115,136,141,152,182],"control.":[75],"However,":[76],"this":[77,95],"definitely":[78],"requires":[79],"establishing":[80],"secure":[81],"communication":[82],"mutual":[84],"trust":[85],"amongst":[86],"these":[87],"entities,":[88],"which":[89],"real":[92],"challenge.":[93],"Towards":[94],"end,":[96],"we":[97],"propose":[98],"an":[99],"efficient":[100],"smart":[101,198],"architecture":[103,160],"combines":[105],"machine":[106,143],"learning":[107],"Blockchain":[109],"technologies":[110],"facilitate":[112],"exchange":[114],"relevant":[116],"events":[118],"admitted":[120],"transactions":[121],"into":[122],"permissioned":[124],"Hyperledger":[125],"fabric":[126],"Blockchain.":[127],"We":[128],"conducted":[129],"comprehensive":[130],"analysis":[131],"demonstrate":[133],"feasibility":[135],"blockchain":[137],"efficiency":[140],"learning-based":[144],"face":[145],"recognition":[146],"matching":[148,177],"for":[149,196],"real-time":[150,164],"suspects":[153],"using":[154],"heterogeneous":[155],"infrastructure.":[157],"The":[158],"proposed":[159],"proved":[161],"behavior":[165],"after":[166],"putting":[167],"through":[170],"multiple":[171],"test":[172],"cases.":[173],"With":[174],"very":[175],"high":[176],"accuracy,":[178],"end-to-end":[180],"latency":[181],"less":[183],"12.8":[185],"seconds,":[186],"proves":[189],"be":[191],"scalable,":[192],"fast":[194],"enough":[195],"use":[200],"case.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
