DocumentCode :
1760804
Title :
Authenticating Lossy Surveillance Video
Author :
Ren, Y.J. ; O´Gorman, L. ; Wu, L.J. ; Fangzhe Chang ; Wood, T.L. ; Zhang, J.R.
Author_Institution :
Alcatel-Lucent Bell Labs., Murray Hill, NJ, USA
Volume :
8
Issue :
10
fYear :
2013
fDate :
Oct. 2013
Firstpage :
1678
Lastpage :
1687
Abstract :
Public camera feeds are increasingly being opened to use by multiple authorities (e.g., police, fire, traffic) as well as to the public. Because of the difficulty and insecurity of sharing cryptographic keys, these data are available in the clear. However, authorities must have a mechanism to assure trust in the video, that is, to authenticate it. While lossless video is straightforward to authenticate by cryptographic means, lossy video as may result from UDP, wireless, or transcoded transmissions, is more difficult to authenticate. We describe a method that combines a concise and efficiently computed video fingerprint with public key cryptography. Essential components of our approach are: the procedure to combine inexact video fingerprint with exact digital signature to enable lossy authentication, and matching for misaligned video via a major incline approach. Experimental results relate video fingerprint length to authentication accuracy and latency (time to authentication).
Keywords :
digital signatures; public key cryptography; video surveillance; authentication accuracy; computed video fingerprint; cryptographic keys; digital signature; lossy authentication; lossy surveillance video; public camera feeds; public key cryptography; Authentication; Cameras; Digital signatures; Feature extraction; Fingerprint recognition; Robustness; Time series analysis; Video surveillance; authentication; data privacy; lossy video transmission; pattern analysis;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2013.2279542
Filename :
6585783
Link To Document :
بازگشت