A data integrity verification method for surveillance video system

  • PDF / 1,745,606 Bytes
  • 23 Pages / 439.37 x 666.142 pts Page_size
  • 81 Downloads / 209 Views

DOWNLOAD

REPORT


A data integrity verification method for surveillance video system Sarala Ghimire 1 & Bumshik Lee 1 Received: 14 October 2019 / Revised: 3 July 2020 / Accepted: 28 July 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Due to the massive popularity and consciousness towards requirements in evidence, the usage of the surveillance system has tremendously increased. Although video data recorded by the surveillance system contains important information and provides crucial evidence, it is susceptible to malicious alterations. Thus, the authenticity and integrity of the visual evidence need to be examined before the investigation proceeding. In this paper, we propose an integrity verification method for surveillance videos. The proposed method utilizes a randomized hashing method in combination with the elliptic curve cryptography (ECC) for video data integrity verification. In the proposed approach, the video content with a predefined size (segment) is randomized with the unique random value, and then a hash algorithm is applied. The hash algorithm here utilizes the random initialization vector, which is generated with a secret key. Besides, the combination of the randomized hash output and the key is encrypted with the ECC encryption algorithm that ensures the additional security of the data. The experimental results obtained from computer simulation and accident data recorder (ADR)-embedded system show that the proposed method achieves perfect forgery detection for various kinds of tampering such as copy-move, insert, and delete. A complexity analysis based on the execution time for different sized videos shows the minimal overhead of less than 4% for each segment and consumes less memory than the conventional method that utilizes individual frames for hashing. Keywords Decryption . ECC . Encryption . Hash . Integrity . Randomization . Video

* Bumshik Lee [email protected] Sarala Ghimire [email protected]

1

Department of Information and Communication Engineering, Chosun University, Gwangju, South Korea

Multimedia Tools and Applications

1 Introduction In recent years, the rapid development of digital technology has resulted in increased use of video applications. The videos recorded by such applications provide critical information and witness that play a vital role in criminal investigation and dispute examinations. For instance, the surveillance camera for automobiles can provide crucial evidence of the site and traces of vehicles that make easy identification of the cause and victim of the circumstances in car accidents. However, it is easy to tamper the video with a certain incident by simply removing some frames from the video [35]. In addition, objects, vehicles, or people from the same or other videos can be inserted. Unlike public surveillance cameras such as Closed Circuit Television (CCTV), the probable attacker in the vehicle accident data record (ADR) system, called vehicle black-box inside a car, is typically the driver or the owner of the car. Thus, the ADR video