dc.contributor.author | Kanwal, Nadia | |
dc.contributor.author | Asghar, Mamoona Naveed | |
dc.contributor.author | Ansari, Mhammad Samar | |
dc.contributor.author | Fleury, Martin | |
dc.contributor.author | Lee, Brian | |
dc.contributor.author | Herbst, Marco | |
dc.contributor.author | Qiao, Yuansong | |
dc.date.accessioned | 2020-09-23T09:14:05Z | |
dc.date.available | 2020-09-23T09:14:05Z | |
dc.date.copyright | 2020 | |
dc.date.issued | 2020 | |
dc.identifier.citation | Kanwal, N., Ashgar, M.N., Ansari, M.S., Fleury, M., Lee, B., Herbst, J., Qiao, Y. (2020). Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing," in IEEE Access, vol. 8, pp. 153413-153424, 2020, doi: 10.1109/ACCESS.2020.3016211. | en_US |
dc.identifier.issn | 2169-3536 | |
dc.identifier.other | Articles - Software Research Institute AIT | en_US |
dc.identifier.uri | http://research.thea.ie/handle/20.500.12065/3421 | |
dc.description.abstract | Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. Similarly, video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. This article presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos by means of hashing and steganography. The method conforms to the data protection regulations, which are increasingly adopted by governments, and is applicable to network edge storage. Encryption keys are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored steganographically within video frames themselves, independently of the content. Added protection is provided by hiding information within the two least-valued of pixel bitplanes, using a newly introduced technique that randomizes the pixel storage locations on a per video frame and video-capture device basis. Overall, the proposed method has turned out to not only preserve the integrity of stored video data but also results in minimal degradation of the video data resulting from steganography. Despite the inclusion of hidden information, video frames will still be available for common image-processing tasks such as tracking and classification, as their objective video quality is almost unchanged. | en_US |
dc.format | PDF | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | IEEE Access | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Ireland | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ie/ | * |
dc.subject | Video security | en_US |
dc.subject | Video surveillance | en_US |
dc.subject | Steganography | en_US |
dc.subject | Hashing | en_US |
dc.subject | Information sharing | en_US |
dc.title | Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing | en_US |
dc.type | Article | en_US |
dc.contributor.sponsor | This work was supported in part by the European Union’s Horizon 2020 Research and Innovation Programme through the Marie Sklodowska-Curie under the Project MF-2018-0058 and Grant 713654, in part by the Science Foundation Ireland (SFI) under Grant SFI 16/RC/3918, and in part by the European Regional Development Fund. | en_US |
dc.description.peerreview | yes | en_US |
dc.identifier.doi | doi: 10.1109/ACCESS.2020.3016211. | |
dc.identifier.orcid | https://orcid.org/0000-0002-9732-3126 | |
dc.identifier.orcid | https://orcid.org/0000-0002-4368-0478 | |
dc.identifier.orcid | https://orcid.org/0000-0002-8475-4074 | |
dc.identifier.orcid | https://orcid.org/0000-0002-1543-1589 | |
dc.rights.access | Open Access | en_US |
dc.subject.department | Software Research Institute AIT | en_US |