Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing

Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly, surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. This paper presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos using steganography and hashing. The method conforms to the data protection regulations which are increasingly adopted by governments, and is applicable to network edge storage. Security credentials are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored within video frames themselves, independently of the content. The proposed method has turned out to not only preserve the integrity of the stored video data but also results in very limited degradation of the video data due to steganography. Despite the presence of steganographic information, video frames are still available for common image processing tasks such as tracking and classification.

Original languageEnglish
Title of host publicationProceedings - IEEE 18th International Conference on Dependable, Autonomic and Secure Computing, IEEE 18th International Conference on Pervasive Intelligence and Computing, IEEE 6th International Conference on Cloud and Big Data Computing and IEEE 5th Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages257-264
Number of pages8
ISBN (Electronic)9781728166094
DOIs
Publication statusPublished - Aug 2020
Event18th IEEE International Conference on Dependable, Autonomic and Secure Computing, 18th IEEE International Conference on Pervasive Intelligence and Computing, 6th IEEE International Conference on Cloud and Big Data Computing and 5th IEEE Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020 - Virtual, Calgary, Canada
Duration: 17 Aug 202024 Aug 2020

Publication series

NameProceedings - IEEE 18th International Conference on Dependable, Autonomic and Secure Computing, IEEE 18th International Conference on Pervasive Intelligence and Computing, IEEE 6th International Conference on Cloud and Big Data Computing and IEEE 5th Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020

Conference

Conference18th IEEE International Conference on Dependable, Autonomic and Secure Computing, 18th IEEE International Conference on Pervasive Intelligence and Computing, 6th IEEE International Conference on Cloud and Big Data Computing and 5th IEEE Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020
Country/TerritoryCanada
CityVirtual, Calgary
Period17/08/2024/08/20

Keywords

  • Hashing
  • Information Sharing
  • Steganography
  • Video Security
  • Video Surveillance

Fingerprint

Dive into the research topics of 'Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing'. Together they form a unique fingerprint.

Cite this