How IDIS Prevents Surveillance Footage From Being Manipulated
IDIS developed its patented Chained Fingerprint algorithm to maintain the integrity of video footage being presented as evidence.
COPPELL, Texas — The rise of deepfake videos has resulted in an urgent need of being able to verify the authenticity of surveillance footage.
Deepfake videos, which involve the digital manipulation of video to, for example, seamlessly replace a celebrity’s face with another celebrity’s, put pressure on both video tech users and on prosecutors to demonstrate the integrity of any footage they use, according to video technology manufacturer IDIS.
“As we look ahead, wherever video is presented for use as legal evidence, or as part of internal disciplinary proceedings, we will see more attempts to assert that footage is not genuine. Courts will dismiss evidence where tampering cannot be ruled out,” says Dr. Peter Kim, global technical consultant, IDIS.
He adds, “Any challenge to the integrity of video evidence, if not countered, risks undermining the value of the entire video solution. This is particularly true in applications where investigating and prosecuting wrongdoing is a key function of the camera system. So, it will be vital that users can demonstrate beyond doubt that their footage has not been tampered with in any way.”
IDIS, which supplies end-to-end video solutions for applications ranging from high-risk critical infrastructure to commercial settings, has created protection of video footage integrity through its patented Chained Fingerprint algorithm.
The company’s recorders use Chained Fingerprint to ensure the integrity of the recorded and exported video data. Each frame is assigned a unique numerical ‘fingerprint’, calculated by relating its own pixel value to the fingerprint of the previous frame.
This means that every single image frame of the video is linked by an encryption “chain” with its neighboring image frames. The encrypted chain is stored as part of the video data when the video is recorded or exported as a video clip using the IDIS ClipPlayer.
Before playback, the ClipPlayer scans video and recalculates the fingerprint chains of the video data. If any part of the image frame is tampered with, the fingerprint chain will be broken and will not match the chain value calculated at the time of video export, prompting a flag.
“As organizations look to upgrade or invest in new video solutions, protecting themselves against claims of video evidence tampering should be high on their priority list,” Kim says.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Leave a Reply