Video Authentication Using Elliptic Curve Encryption Algorithm

Abstract

A video record plays a crucial role in providing evidence for crime scenes or road accidents. However, the main problem with the video record is that it is often vulnerable to various video tampering attacks. Although visual evidence is required to conduct an integrity verification before investigations, it is still difficult for human vision to detect a forgery, we suggest applying the feature extraction technique for each frame in the video file (except for the first frame) and then calculating the hash function to find a fixed length and then apply the elliptic curve algorithm to the resulting value from the Hash function and then hide the encoder output in the video itself.

Country : Iraq

1 Rahma Nazar Ibrahim2 Shahd Abdulrhman Hasso

  1. Software Engineering Department, University of Mosul, Mosul, Iraq
  2. Software Engineering Department, University of Mosul, Mosul, Iraq

IRJIET, Volume 6, Issue 9, September 2022 pp. 62-65

doi.org/10.47001/IRJIET/2022.609009

References

  1. Abdulwahab, Hala Bahjat, Khaldoun L. Hameed, and Nawaf Hazim Barnouti. "Video Authentication using PLEXUS Method." (ijacsa) International Journal of Advanced Computer Science and Applications 9.11 (2018).
  2. Echizen, Isao, et al. "Integrity verification system for video content by using digital watermarking." 2006 International Conference on Service Systems and Service Management. Vol. 2. IEEE, 2006.‏
  3. Parmar, Zarna, and Saurabh Upadhyay. "A review on video/image authentication and temper detection techniques." International Journal of Computer Applications 63.10 (2013).‏
  4. Kulkarni, Ajay, et al. "Proposed video encryption algorithm v/s other existing algorithms: A comparative study." arXiv preprint arXiv: 1303.3485 (2013).‏
  5. Kroputaponchai, Teerasak, and Nikom Suvonvorn. "Video authentication using spatio-temporal signature for surveillance system." 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2015.‏
  6. https://aljanbh.yoo7.com/t136-topic
  7. https://prateekvjoshi.com/tag/cryptography/
  8. Nabil, G., Naziha, K., Lamia, F., & Lotfi, K. (2012, July). Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves. In 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP) (pp. 1-6). IEEE.
  9. A Hasso, Shahd, and Taha B Taha. "A New Tamper Detection Algorithm For Video." Journal of Engineering Science and Technology (JESTEC) 15.5 (2020): 3375-3387.‏
  10. PARMAR, Zarna; UPADHYAY, Saurabh. A review on video/image authentication and temper detection techniques. International Journal of Computer Applications, 2013, 63.10.‏