Surveillance Video Authentication System

نویسندگان

  • D. Taskovski
  • D. K. Roberts
چکیده

This paper describes the operation of a demonstrator of the authentication/tamper detection system proposed in [1] for surveillance systems. The demonstrator consists of three parts. The first captures images, calculates and embeds authentication data, then compresses and records the images to hard disk. The second provides means to tamper a selection of recorded images, and the third checks the authenticity of recorded images. The demonstrator shows the authentication algorithms of [1] working in a realistic scenario, and permits error rates to be measured.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

A Video-analysis-based Level Crossing Using Microcontroller

Safety and security are the most discussed topics in the road and railway transportation field. Latest security initiatives in the field of railway transportation propose to implement video surveillance at level crossing(LC)environments. In this paper we explore the possibility of implementing a smart video surveillance security system that is tuned toward detecting and evaluating abnormal situ...

متن کامل

Preserving and Managing Privacy Information in Video Surveillance Systems

Recent widespread deployment and increased sophistication of video surveillance systems have raised apprehension of their threat to individuals’ right of privacy. Privacy protection technologies developed thus far have focused mostly on subject detection and visual obfuscation techniques. In this chapter, we discuss a prototype system for privacy-protected video surveillance that is capable of ...

متن کامل

Technique for Authenticating H.264/svc Codestreams in Video Surveillance Applications

Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to in...

متن کامل

Watermarking-Based Content Authentication of Motion-JPEG Sequences

Content authentication has become an important issue for surveillance video. This paper presents a watermarking system based on Discrete Cosine Transform (DCT) for Motion-JPEG video authentication. To protect the integrity of the video object, a content-based watermark is embedded into the frames of the video. Robust watermark and semi-fragile watermark are used for temporal authentication and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003