Kanwal et al., 2020 - Google Patents
Chain-of-evidence in secured surveillance videos using steganography and hashingKanwal et al., 2020
- Document ID
- 11665731656542044056
- Author
- Kanwal N
- Asghar M
- Ansari M
- Lee B
- Fleury M
- Herbst M
- Qiao Y
- Publication year
- Publication venue
- 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
External Links
Snippet
Video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. Similarly, surveillance video recording is a powerful method of deterring unlawful activities. A Solution-by-Design …
- 230000000694 effects 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bartolini et al. | Image authentication techniques for surveillance applications | |
US9094733B2 (en) | Methods and systems for cryptographic access control of video | |
Upadhyay et al. | Video authentication: Issues and challenges | |
KR20020021080A (en) | Method and apparatus for securely transmitting and authenticating biometric data over a network | |
Kanwal et al. | Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing | |
Yang et al. | Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing. | |
Murhty et al. | Methodologies in steganography and cryptography–review | |
Salih et al. | Integrated Digital Signature Based Watermarking Technology for Securing Online Electronic Documents | |
Ashour et al. | Security of multimedia contents: a brief | |
Harba | Advanced password authentication protection by hybrid cryptography & audio steganography | |
Senkyire et al. | Validation of forensic crime scene images using watermarking and cryptographic blockchain | |
Kanwal et al. | Chain-of-evidence in secured surveillance videos using steganography and hashing | |
Sowmya et al. | Video authentication using watermark and digital signature—a study | |
Mohammed | A new approach to hide texts into images and audio files using steganography and cryptography techniques | |
AlRababah | Watermarking implementation on digital images and electronic signatures | |
Kaur et al. | Chaotic Watermarking for Tamper Detection: Enhancing Robustness and Security in Digital Multimedia | |
Malik et al. | ECDSA approach for reliable data sharing and document verification using two level QR code | |
Deepthi et al. | Pre encryption data hiding techniques using reserving room approach | |
Raj et al. | Enhancing Digital Image Forensics and Security: Innovations in Metadata, Watermarking and Blockchain Technology | |
Bajaj et al. | Steganography using HTML Web Pages as a Carrier: A Survey | |
Parmar et al. | A review on video/image authentication and temper detection techniques | |
Sun et al. | Data traceability scheme of industrial control system based on digital watermark | |
Nehra et al. | Review Paper On Image Based Steganography | |
Gupta et al. | A hybrid technique for spatial image steganography | |
Kaur | Chaotic Watermarking for Tamper |