Video Authentication Using Elliptic Curve Encryption Algorithm

Rahma Nazar IbrahimSoftware Engineering Department, University of Mosul, Mosul, IraqShahd Abdulrhman HassoSoftware Engineering Department, University of Mosul, Mosul, Iraq

Vol 6 No 9 (2022): Volume 6, Issue 9, September 2022 | Pages: 62-65

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 18-09-2022

doi Logo doi.org/10.47001/IRJIET/2022.609009

Abstract

A video record plays a crucial role in providing evidence for crime scenes or road accidents. However, the main problem with the video record is that it is often vulnerable to various video tampering attacks. Although visual evidence is required to conduct an integrity verification before investigations, it is still difficult for human vision to detect a forgery, we suggest applying the feature extraction technique for each frame in the video file (except for the first frame) and then calculating the hash function to find a fixed length and then apply the elliptic curve algorithm to the resulting value from the Hash function and then hide the encoder output in the video itself.

Keywords

Video tampering detection, video integrity, elliptic curve cryptography (ECC), Digital Media


Citation of this Article

Rahma Nazar Ibrahim, Shahd Abdulrhman Hasso, “Video Authentication Using Elliptic Curve Encryption Algorithm” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 6, Issue 9, pp 62-65, September 2022. Article DOI https://doi.org/10.47001/IRJIET/2022.609009

References
  1. Abdulwahab, Hala Bahjat, Khaldoun L. Hameed, and Nawaf Hazim Barnouti. "Video Authentication using PLEXUS Method." (ijacsa) International Journal of Advanced Computer Science and Applications 9.11 (2018).
  2. Echizen, Isao, et al. "Integrity verification system for video content by using digital watermarking." 2006 International Conference on Service Systems and Service Management. Vol. 2. IEEE, 2006.‏
  3. Parmar, Zarna, and Saurabh Upadhyay. "A review on video/image authentication and temper detection techniques." International Journal of Computer Applications 63.10 (2013).‏
  4. Kulkarni, Ajay, et al. "Proposed video encryption algorithm v/s other existing algorithms: A comparative study." arXiv preprint arXiv: 1303.3485 (2013).‏
  5. Kroputaponchai, Teerasak, and Nikom Suvonvorn. "Video authentication using spatio-temporal signature for surveillance system." 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2015.‏
  6. https://aljanbh.yoo7.com/t136-topic
  7. https://prateekvjoshi.com/tag/cryptography/
  8. Nabil, G., Naziha, K., Lamia, F., & Lotfi, K. (2012, July). Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves. In 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP) (pp. 1-6). IEEE.
  9. A Hasso, Shahd, and Taha B Taha. "A New Tamper Detection Algorithm For Video." Journal of Engineering Science and Technology (JESTEC) 15.5 (2020): 3375-3387.‏
  10. PARMAR, Zarna; UPADHYAY, Saurabh. A review on video/image authentication and temper detection techniques. International Journal of Computer Applications, 2013, 63.10.‏