A data integrity verification method for surveillance video system

被引:6
|
作者
Ghimire, Sarala [1 ]
Lee, Bumshik [1 ]
机构
[1] Chosun Univ, Dept Informat & Commun Engn, Gwangju, South Korea
关键词
Decryption; ECC; Encryption; Hash; Integrity; Randomization; Video; CRYPTOGRAPHIC HASH FUNCTION;
D O I
10.1007/s11042-020-09482-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the massive popularity and consciousness towards requirements in evidence, the usage of the surveillance system has tremendously increased. Although video data recorded by the surveillance system contains important information and provides crucial evidence, it is susceptible to malicious alterations. Thus, the authenticity and integrity of the visual evidence need to be examined before the investigation proceeding. In this paper, we propose an integrity verification method for surveillance videos. The proposed method utilizes a randomized hashing method in combination with the elliptic curve cryptography (ECC) for video data integrity verification. In the proposed approach, the video content with a predefined size (segment) is randomized with the unique random value, and then a hash algorithm is applied. The hash algorithm here utilizes the random initialization vector, which is generated with a secret key. Besides, the combination of the randomized hash output and the key is encrypted with the ECC encryption algorithm that ensures the additional security of the data. The experimental results obtained from computer simulation and accident data recorder (ADR)-embedded system show that the proposed method achieves perfect forgery detection for various kinds of tampering such as copy-move, insert, and delete. A complexity analysis based on the execution time for different sized videos shows the minimal overhead of less than 4% for each segment and consumes less memory than the conventional method that utilizes individual frames for hashing.
引用
收藏
页码:30163 / 30185
页数:23
相关论文
共 50 条
  • [1] A data integrity verification method for surveillance video system
    Sarala Ghimire
    Bumshik Lee
    [J]. Multimedia Tools and Applications, 2020, 79 : 30163 - 30185
  • [2] Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
    Liu, Ruoshui
    Liu, Jianghui
    Zhang, Jingjie
    Zhang, Moli
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2018, 2018
  • [3] Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations
    Lee, Sangwook
    Song, Ji Eun
    Lee, Wan Yeon
    Ko, Young Woong
    Lee, Heejo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (01): : 95 - 97
  • [4] Integrity verification of the ordered data structures in manipulated video content
    Song, Jieun
    Lee, Kiryong
    Lee, Wan Yeon
    Lee, Heejo
    [J]. DIGITAL INVESTIGATION, 2016, 18 : 1 - 7
  • [5] Integrity verification method for video content using robust watermarking
    Yamada, Takaaki
    Takahashi, Yoshiyasu
    Fujii, Yasuhiro
    Ebisawa, Ryu
    Yoshiura, Hiroshi
    Echizen, Isao
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2009, 13 (3-4) : 141 - 153
  • [6] Integrity verification system for video content by using digital watermarking
    Echizen, Isao
    Singh, Stephan
    Yamada, Takaaki
    Tanimoto, Koichi
    Tezuka, Satoru
    Huet, Benoit
    [J]. 2006 INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1619 - 1624
  • [7] Evaluation of Integrity Verification System for Video Content Using Digital Watermarking
    Yamada, Takaaki
    Takahashi, Yoshiyasu
    Fujii, Yasuhiro
    Ebisawa, Ryu
    Yoshiura, Hiroshi
    Echizen, Isao
    [J]. NEW DIRECTIONS IN INTELLIGENT INTERACTIVE MULTIMEDIA, 2008, 142 : 363 - +
  • [8] Test method of railway video surveillance system
    Zhang, Zhenyu
    Qin, Yong
    [J]. Computer Modelling and New Technologies, 2014, 18 (10): : 163 - 167
  • [9] Effect evaluation method of video surveillance system
    Zhu Tao
    Du Zhiguo
    Hong Weijun
    [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 2301 - +
  • [10] An improved data integrity verification scheme in cloud storage system
    Zhou, En-Guang
    Li, Zhou-Jun
    Guo, Hua
    Jia, Yang-Li
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (01): : 150 - 154