Surveillance Video Authentication System
نویسندگان
چکیده
This paper describes the operation of a demonstrator of the authentication/tamper detection system proposed in [1] for surveillance systems. The demonstrator consists of three parts. The first captures images, calculates and embeds authentication data, then compresses and records the images to hard disk. The second provides means to tamper a selection of recorded images, and the third checks the authenticity of recorded images. The demonstrator shows the authentication algorithms of [1] working in a realistic scenario, and permits error rates to be measured.
منابع مشابه
overview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملA Video-analysis-based Level Crossing Using Microcontroller
Safety and security are the most discussed topics in the road and railway transportation field. Latest security initiatives in the field of railway transportation propose to implement video surveillance at level crossing(LC)environments. In this paper we explore the possibility of implementing a smart video surveillance security system that is tuned toward detecting and evaluating abnormal situ...
متن کاملPreserving and Managing Privacy Information in Video Surveillance Systems
Recent widespread deployment and increased sophistication of video surveillance systems have raised apprehension of their threat to individuals’ right of privacy. Privacy protection technologies developed thus far have focused mostly on subject detection and visual obfuscation techniques. In this chapter, we discuss a prototype system for privacy-protected video surveillance that is capable of ...
متن کاملTechnique for Authenticating H.264/svc Codestreams in Video Surveillance Applications
Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to in...
متن کاملWatermarking-Based Content Authentication of Motion-JPEG Sequences
Content authentication has become an important issue for surveillance video. This paper presents a watermarking system based on Discrete Cosine Transform (DCT) for Motion-JPEG video authentication. To protect the integrity of the video object, a content-based watermark is embedded into the frames of the video. Robust watermark and semi-fragile watermark are used for temporal authentication and ...
متن کامل