A data integrity verification method for surveillance video system

被引:6
|
作者
Ghimire, Sarala [1 ]
Lee, Bumshik [1 ]
机构
[1] Chosun Univ, Dept Informat & Commun Engn, Gwangju, South Korea
关键词
Decryption; ECC; Encryption; Hash; Integrity; Randomization; Video; CRYPTOGRAPHIC HASH FUNCTION;
D O I
10.1007/s11042-020-09482-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the massive popularity and consciousness towards requirements in evidence, the usage of the surveillance system has tremendously increased. Although video data recorded by the surveillance system contains important information and provides crucial evidence, it is susceptible to malicious alterations. Thus, the authenticity and integrity of the visual evidence need to be examined before the investigation proceeding. In this paper, we propose an integrity verification method for surveillance videos. The proposed method utilizes a randomized hashing method in combination with the elliptic curve cryptography (ECC) for video data integrity verification. In the proposed approach, the video content with a predefined size (segment) is randomized with the unique random value, and then a hash algorithm is applied. The hash algorithm here utilizes the random initialization vector, which is generated with a secret key. Besides, the combination of the randomized hash output and the key is encrypted with the ECC encryption algorithm that ensures the additional security of the data. The experimental results obtained from computer simulation and accident data recorder (ADR)-embedded system show that the proposed method achieves perfect forgery detection for various kinds of tampering such as copy-move, insert, and delete. A complexity analysis based on the execution time for different sized videos shows the minimal overhead of less than 4% for each segment and consumes less memory than the conventional method that utilizes individual frames for hashing.
引用
收藏
页码:30163 / 30185
页数:23
相关论文
共 50 条
  • [31] The Research of The Method of Moving Object Detecting in Video Surveillance System
    Wu, Hongxia
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON MULTIMEDIA TECHNOLOGY (ICMT-13), 2013, 84 : 1259 - 1265
  • [32] A fast moving object recognition method for video surveillance system
    Lei, Bo
    Fan, Qiang
    Tan, Hai
    [J]. REAL-TIME PHOTONIC MEASUREMENTS, DATA MANAGEMENT, AND PROCESSING IV, 2019, 11192
  • [33] Range Query Integrity in the Cloud: the Case of Video Surveillance
    Buccafurri, Francesco
    Lax, Gianluca
    Nicolazzo, Serena
    Nocera, Antonino
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 170 - 175
  • [34] Data fusion privacy protection method with low energy consumption and integrity verification
    Wang J.
    Xu Y.-H.
    Li L.
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (07): : 1657 - 1665
  • [35] Organizing Multimedia Data in Video Surveillance Systems Based on Face Verification with Convolutional Neural Networks
    Sokolova, Anastasiia D.
    Kharchevnikova, Angelina S.
    Savchenko, Andrey V.
    [J]. ANALYSIS OF IMAGES, SOCIAL NETWORKS AND TEXTS, AIST 2017, 2018, 10716 : 223 - 230
  • [36] Data Protection Method with Blockchain against Fabrication of Video by Surveillance Cameras
    Uda, Ryuya
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2020), 2020, : 29 - 33
  • [37] On the Design and Implementation of the External Data Integrity Tracking and Verification System for Stream Computing System in IoT
    Wang, Hongyuan
    Zu, Baokai
    Zhu, Wanting
    Li, Yafang
    Wu, Jingbang
    [J]. SENSORS, 2022, 22 (17)
  • [38] On-water video surveillance: data management for a ship identification system
    Popik, Adrian
    Zaniewicz, Grzegorz
    Wawrzyniak, Natalia
    [J]. SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2019, 60 (132): : 56 - 63
  • [39] VIDEO AND SENSOR DATA INTEGRATION IN A SERVICE-ORIENTED SURVEILLANCE SYSTEM
    Mierzwinski, Damian
    Walczak, Dariusz
    Wolski, Marcin
    Wrzos, Marcin
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2011, 12 (01): : 93 - 103
  • [40] Video Surveillance System Effectivity Optimization AOI Data Model Proposal
    Sevcik, Jiri
    Lukas, Ludek
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2015), PT 1, 2015, 80 : 81 - +