TY - GEN
T1 - Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
AU - Kanwal, Nadia
AU - Asghar, Mamoona Naveed
AU - Samar Ansari, Mohammad
AU - Lee, Brian
AU - Fleury, Martin
AU - Herbst, Marco
AU - Qiao, Yuansong
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/8
Y1 - 2020/8
N2 - Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly, surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. This paper presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos using steganography and hashing. The method conforms to the data protection regulations which are increasingly adopted by governments, and is applicable to network edge storage. Security credentials are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored within video frames themselves, independently of the content. The proposed method has turned out to not only preserve the integrity of the stored video data but also results in very limited degradation of the video data due to steganography. Despite the presence of steganographic information, video frames are still available for common image processing tasks such as tracking and classification.
AB - Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly, surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. This paper presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos using steganography and hashing. The method conforms to the data protection regulations which are increasingly adopted by governments, and is applicable to network edge storage. Security credentials are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored within video frames themselves, independently of the content. The proposed method has turned out to not only preserve the integrity of the stored video data but also results in very limited degradation of the video data due to steganography. Despite the presence of steganographic information, video frames are still available for common image processing tasks such as tracking and classification.
KW - Hashing
KW - Information Sharing
KW - Steganography
KW - Video Security
KW - Video Surveillance
UR - http://www.scopus.com/inward/record.url?scp=85097638887&partnerID=8YFLogxK
U2 - 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00053
DO - 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00053
M3 - Conference contribution
AN - SCOPUS:85097638887
T3 - Proceedings - IEEE 18th International Conference on Dependable, Autonomic and Secure Computing, IEEE 18th International Conference on Pervasive Intelligence and Computing, IEEE 6th International Conference on Cloud and Big Data Computing and IEEE 5th Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020
SP - 257
EP - 264
BT - Proceedings - IEEE 18th International Conference on Dependable, Autonomic and Secure Computing, IEEE 18th International Conference on Pervasive Intelligence and Computing, IEEE 6th International Conference on Cloud and Big Data Computing and IEEE 5th Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 18th IEEE International Conference on Dependable, Autonomic and Secure Computing, 18th IEEE International Conference on Pervasive Intelligence and Computing, 6th IEEE International Conference on Cloud and Big Data Computing and 5th IEEE Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020
Y2 - 17 August 2020 through 24 August 2020
ER -