Show simple item record

dc.contributor.authorKanwal, Nadia
dc.contributor.authorAsghar, Mamoona Naveed
dc.contributor.authorAnsari, Mhammad Samar
dc.contributor.authorFleury, Martin
dc.contributor.authorLee, Brian
dc.contributor.authorHerbst, Marco
dc.contributor.authorQiao, Yuansong
dc.date.accessioned2020-09-23T09:14:05Z
dc.date.available2020-09-23T09:14:05Z
dc.date.copyright2020
dc.date.issued2020
dc.identifier.citationKanwal, N., Ashgar, M.N., Ansari, M.S., Fleury, M., Lee, B., Herbst, J., Qiao, Y. (2020). Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing," in IEEE Access, vol. 8, pp. 153413-153424, 2020, doi: 10.1109/ACCESS.2020.3016211.en_US
dc.identifier.issn2169-3536
dc.identifier.otherArticles - Software Research Institute AITen_US
dc.identifier.urihttp://research.thea.ie/handle/20.500.12065/3421
dc.description.abstractSurveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. Similarly, video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. This article presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos by means of hashing and steganography. The method conforms to the data protection regulations, which are increasingly adopted by governments, and is applicable to network edge storage. Encryption keys are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored steganographically within video frames themselves, independently of the content. Added protection is provided by hiding information within the two least-valued of pixel bitplanes, using a newly introduced technique that randomizes the pixel storage locations on a per video frame and video-capture device basis. Overall, the proposed method has turned out to not only preserve the integrity of stored video data but also results in minimal degradation of the video data resulting from steganography. Despite the inclusion of hidden information, video frames will still be available for common image-processing tasks such as tracking and classification, as their objective video quality is almost unchanged.en_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofIEEE Accessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Ireland*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ie/*
dc.subjectVideo securityen_US
dc.subjectVideo surveillanceen_US
dc.subjectSteganographyen_US
dc.subjectHashingen_US
dc.subjectInformation sharingen_US
dc.titlePreserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharingen_US
dc.typeArticleen_US
dc.contributor.sponsorThis work was supported in part by the European Union’s Horizon 2020 Research and Innovation Programme through the Marie Sklodowska-Curie under the Project MF-2018-0058 and Grant 713654, in part by the Science Foundation Ireland (SFI) under Grant SFI 16/RC/3918, and in part by the European Regional Development Fund.en_US
dc.description.peerreviewyesen_US
dc.identifier.doidoi: 10.1109/ACCESS.2020.3016211.
dc.identifier.orcidhttps://orcid.org/0000-0002-9732-3126
dc.identifier.orcidhttps://orcid.org/0000-0002-4368-0478
dc.identifier.orcidhttps://orcid.org/0000-0002-8475-4074
dc.identifier.orcidhttps://orcid.org/0000-0002-1543-1589
dc.rights.accessOpen Accessen_US
dc.subject.departmentSoftware Research Institute AITen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Ireland
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Ireland