Abstract
Law enforcement officers nowadays are usually equipped with some camera device which captures real time visuals on their duties. The footages would be used as evidence and they carry legal effects. However in the near future, civilians are encouraged to use their smart phone in recording footages in critical scenes; how could the video or pictures recorded by a normal cell phone from the hand of a civilian (that can be anybody) carried the same legal effect when it comes to authentication? In this paper we explore the possibility of an image processing technology which can hidden a secret message in each video frame for verification purpose – to prove that the footage is indeed taken by or belong to a particular user. In our design, the algorithm must be lightweight enough to be embedded into the use of a cell phone or compact camera device, the secrecy must be secured known to only the authenticator, and the watermarking process must be simple. Such digital water-marking technique is presented in this paper, backed with simulation experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berkeley Multimedia Research Center Web Site, http://bmrc.berkeley.edu/frame/research/mpeg/
Craver, S., Memon, N., Yeo, B., Yeung, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16 (May 1998)
Le Gall, D.: MPEG: A Video Compression Standard for Multimedia Applications. Communication of the ACM 34(4), 46–58 (1991)
Gong, K.L., Rowe, L.A.: Parallel MPEG-1 Video Encoding. In: Proceedings of the 1994 Picture Coding Symposium (1994)
Hsu, C.T., Wu, J.L.: Hidden Signatures in Images. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 223–226 (1996)
ISO/IEC 11172-2, Information Technology – Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s – Part 2: Video
Memon, N., Wong, P.W.: Protecting Digital Media Content. Communications of the ACM, 35–43 (1998)
Patel, K., Smith, B., Rowe, L.: Performance of a Software MPEG Video Decoder. In: Proceedings of ACM Multimedia, vol. 93 (August 1993)
Qiao, L., Nahrstedt, K.: Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership. In: Proceedings of the International Conference on Multimedia Computing and Systems, pp. 276–285. IEEE (1998)
Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Digital Watermark. In: Proceedings of the IEEE International Conference on Image Processing, pp. 86–90 (1994)
Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proceedings of the IEEE, 1197–1207 (July 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deb, S., Fong, S., Thampi, S.M. (2014). Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)