Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
This paper explores the various techniques used to authenticate the visual
data recorded by the automatic video surveillance system. Automatic video
surveillance systems are used for continuous and effective monitoring and
reliable control of remote and dangerous sites. Some practical issues must be
taken in to account, in order to take full advantage of the potentiality of VS
system. The validity of visual data acquired, processed and possibly stored by the
VS system, as a proof in front of a court of law is one of such issues. But visual
data can be modified using sophisticated processing tools without leaving any
visible trace of the modification. So digital or image data have no value as legal
proof, since doubt would always exist that they had been intentionally tampered
with to incriminate or exculpate the defendant. Besides, the video data can be
created artificially by computerized techniques such as morphing. Therefore the
true origin of the data must be indicated to use them as legal proof. By data
authentication we mean here a procedure capable of ensuring that data have not
been tampered with and of indicating their true origin.
3. AUTHENTICATION TECHNIQUES
Authentication techniques are performed on visual data to indicate that the
data is not a forgery; they should not damage visual quality of the video data. At
the same time, these techniques must indicate the malicious modifications
include removal or insertion of certain frames, change of faces of individual, time
and background etc. Only a properly authenticated video data has got the value as
legal proof. There are two major techniques for authenticating video data. They
are as follows
4. CRYPTOGRAPHY
Mounting concern over the new threats to privacy and security has lead to
wide spread adoption of cryptography. Cryptography is the science of
transforming documents. It has mainly two functions
♦ Encryption
♦ Decryption
PLAIN
TEXT CIPHER TEXT
DECRYPTION
ENCRYPTION ENCRPTION KEY
KEY ALGORITHEM DECRYPTION
ALGORITHEM
CIPHER
TEXT PLAIN TEXT
Only after decoding the cipher text using the key the content of the
document is revealed to the common people. Encryption schemes are classified
in to
1. Symmetric encryption
In which the same key is used to both encode and decode the document.
It requires a pair of keys: one for encrypting the plain text and the other
for decrypting the cipher text. A file encrypted with one key of a pair can be
decrypted with other key of the same pair.
Before sending the video sequence to the central unit, cameras calculate a
digital summary or digest of the video by means of a proper hash function. The
digest is then encrypted with their private key. Encryption is done by considering
the digitized value of the brightness of each pixel. Digital signal is a sequence of
zeros and ones and it is encrypted with the private key using a proper algorithm.
The signed digest thus obtained is then transmitted to the central unit together
with the acquired visual sequence.
Later the signal digest is used to prove data integrity or to trace back to
their origin. The signed digest is read using the public key of the camera which
produce the video and check if it corresponds to the digest derived from the
decrypted video content using the same hash function.
Any manipulation of the data will change the calculated image digest
derived from the decrypted data. Any discrepancy between the decrypted digest
and calculated image digest indicate that the data has been tampered, with
identical digest indicates that the data is genuine.
Value of the visual data can be added by tying each frame to the particular
label of the instant the frame has been produced yet. This can be achieved by
printing date and time of creation of each frame. Any modification of either the
date or time could be easily revealed since it would change the locally calculated
image digest.
If the manipulator knows the private key of the camera, he can change the
digest to involve the modifications he had made on the actual sequence. But the
possibility of such a thing is very small because the private key is hardwired
within the camera.
To avoid the above discussed problem, the video camera should perform
the compression of the video sequences prior to digest calculation. This requires
the video camera to have high computation as storage requirements.
4. Delay in transmission
A part of the program cannot be removed for privacy reasons since it will
alter the calculated digest.
6. WATERMARKING
1. Fragile watermarking
2. Robust watermarking
WATERMARKING
ROBUST
FRAGILE
WATERMARKIN
WATREMARKING
G
DUAL
INVISIBLE VISIBLE
WATERMARKIN
WATERMARKING WATERMARKING
G
1. The authentication technique must not deteriorate the visual quality of data
quality.
2. The authentication technique should be able to identify any unauthorized
processing acquired to visual data.
3. The authentication technique should not consider innocuous manipulation,
e.g., image compression and zooming, as valid authentication attacks.
4. It should be difficult for unauthorized person to forge an authenticated image.
5. The authentication checking procedure should be easily performed by
authorized persons.
6. The authentication checking procedure should localize data tampering.
Since water marking is performed inside the video camera, water mark
embedding should not have high computational demands and should be
compressing resistant.
To ensure data integrity, the video sequence is tied to the time and date it
has been produced. The easiest way to detect the removal of one or more frames
although alternation of the original frame order is to embed on each image a
serial number before authenticating tools are applied. In fact such a number can
neither be removed nor modified without affecting the authentication check, this
making it impossible to remove or change the position of any frame of the
sequence.
By embedding in each frame the time and date of its creation in dissoluble
link is created between the sequence content and the time instant, so that legal
value of the sequence is completely preserved.
The embedded water mark can be made to depend on the frame number
and to bear time information. Frame exchange or substitution would thus be
easily detected and acquisition time can be reliably extracted.
7. WATERMARKING ALGORITHM
The function g1g2 are called embedding function and are selected so as to
detect the inverse detection function. D (fw(x), n(x)). The detection function,
when applied to the watermarked image fw(x), produces the watermark w(x).
D (fw(x), N(x)) = w(x)
If the first level decision test indicates that the image is somehow altered
but authentic, a second level decision test should be performed. This test
indicates whether the alternations made on the image are concentrated in certain
regions (Malicious tampering) or one spread on the image (innocuous
alternations).
8. OTHER APPLICATIONS
2. It can be used for everything from sending e-mail and storing medical
records and legal contracts to conducting on-line transactions.
9. ADVANTATGES
10. DISADVANTAGES
1. Frame independent watermark can be easily found by comparative analysis of
all image sequence frames and then could be easily added again to fake frames.
2. The detector should know the frame number in order to perform authenticity
check.
11. CONCLUSION
12. REFERENCES
5. www.ctr.columbia.edu
6. citeseer.nj.nec.com/wolfgang96watermark.html
ABSTRACT
Automatic video surveillance (AVS) systems are used for continuous and
effective monitoring of dangerous and remote sites. Video data acquired by the
automatic video surveillance system can be recorded and presented as a proof in
front of court law. But digital video data lacks legal validity due to the ease to
manipulate them without leaving any trace of modification. Image authentication
is the process of giving a legal validity to the video data. By authentication
technique content tampering can be detected and we can indicate the true origin
of the data. There are two types of authentication schemes, which are
2. Watermarking-based authentication.
ACKNOWLEDGEMENT
I express my thanks to Mr. Muhammed Kutty our group tutor and also
to our staff advisors Ms. Biji Paul, Mr. Noushad V Moosa, Mr. Baiju Karan
for their kind co-operation and guidance for preparing and presenting this
seminar.
I also thank all the other faculty members of AEI department and my
friends for their help and support.
CONTENTS
1. INTRODUCTION
2. AUTOMATIC VISUAL SURVEILLANCE SYSTEM
3. AUTHENTICATION TECHNIQUES
4. CRYPTOGRAPHY
5. CRYPTOGRAPHIC DATA AUTHENTICATION
5.1 DRAWBACKS OF CRYPTOGRAPHIC AUTHENTICATION
6. WATERMARKING
6.1 CLASSIFICATION OF WATERMARKING AUTHENTICATION
SCHEMS
6.2 REQIREMENTS OF WATERMARKING BASED VS DATA
AUTHENTICATION
7. WATERMARKING ALGORITHM
7.1 WATERMARK GENERATION AND EMBEDDING
7.2 WATERMARK DETECTION
7.3 AUTHENTICATION CHECK
8. OTHER APPLICATIONS
9. ADVANTATGES
10. DISADVANTAGES
11. CONCLUSION
12. REFERENCES