Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps

  • Suash Deb
  • Simon Fong
  • Sabu M. Thampi
Part of the Communications in Computer and Information Science book series (CCIS, volume 467)


Law enforcement officers nowadays are usually equipped with some camera device which captures real time visuals on their duties. The footages would be used as evidence and they carry legal effects. However in the near future, civilians are encouraged to use their smart phone in recording footages in critical scenes; how could the video or pictures recorded by a normal cell phone from the hand of a civilian (that can be anybody) carried the same legal effect when it comes to authentication? In this paper we explore the possibility of an image processing technology which can hidden a secret message in each video frame for verification purpose – to prove that the footage is indeed taken by or belong to a particular user. In our design, the algorithm must be lightweight enough to be embedded into the use of a cell phone or compact camera device, the secrecy must be secured known to only the authenticator, and the watermarking process must be simple. Such digital water-marking technique is presented in this paper, backed with simulation experiments.


Video Security Digital Watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BMRC]
    Berkeley Multimedia Research Center Web Site,
  2. [CMYY98]
    Craver, S., Memon, N., Yeo, B., Yeung, M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16 (May 1998)Google Scholar
  3. [Gall91]
    Le Gall, D.: MPEG: A Video Compression Standard for Multimedia Applications. Communication of the ACM 34(4), 46–58 (1991)CrossRefGoogle Scholar
  4. [GR94]
    Gong, K.L., Rowe, L.A.: Parallel MPEG-1 Video Encoding. In: Proceedings of the 1994 Picture Coding Symposium (1994)Google Scholar
  5. [HW96]
    Hsu, C.T., Wu, J.L.: Hidden Signatures in Images. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 223–226 (1996)Google Scholar
  6. [ISO/IEC93]
    ISO/IEC 11172-2, Information Technology – Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s – Part 2: VideoGoogle Scholar
  7. [MW98]
    Memon, N., Wong, P.W.: Protecting Digital Media Content. Communications of the ACM, 35–43 (1998)Google Scholar
  8. [PSR93]
    Patel, K., Smith, B., Rowe, L.: Performance of a Software MPEG Video Decoder. In: Proceedings of ACM Multimedia, vol. 93 (August 1993)Google Scholar
  9. [QN98]
    Qiao, L., Nahrstedt, K.: Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership. In: Proceedings of the International Conference on Multimedia Computing and Systems, pp. 276–285. IEEE (1998)Google Scholar
  10. [STO94]
    Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Digital Watermark. In: Proceedings of the IEEE International Conference on Image Processing, pp. 86–90 (1994)Google Scholar
  11. [VP99]
    Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proceedings of the IEEE, 1197–1207 (July 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Suash Deb
    • 1
  • Simon Fong
    • 2
  • Sabu M. Thampi
    • 3
  1. 1.Cambridge Institute of TechnologyRanchiIndia
  2. 2.University of MacauTaipaMacau SAR
  3. 3.Indian Institute of Information Technology & ManagementIndia

Personalised recommendations