Your browser doesn't support javascript.
loading
Edwards curve digital signature algorithm for video integrity verification on blockchain framework.
Lawrence, Linju; Shreelekshmi, R.
Afiliación
  • Lawrence L; Department of Computer Science and Engineering, College of Engineering Trivandrum, Thiruvananthapuram 695016, Kerala, India. Electronic address: linjulawrence680@cet.ac.in.
  • Shreelekshmi R; Department of Computer Applications, College of Engineering Trivandrum, Thiruvananthapuram 695016, Kerala, India. Electronic address: shreelekshmi@cet.ac.in.
Sci Justice ; 64(4): 367-376, 2024 Jul.
Article en En | MEDLINE | ID: mdl-39025562
ABSTRACT
Within the field of forensic science, video integrity is an essential component that ensures the validity and dependability of visual evidence that is essential for court cases. Maintaining the integrity of justice in a time when digital modification tools are easily accessible requires making sure that video recordings are unaltered. Video footage is carefully inspected by forensic analysts who use advanced tools to look for indications of manipulation or change. This paper presents a novel, lightweight approach for verifying the integrity of video data. The proposed method utilizes the blockchain and the Edwards Curve Digital Signature Algorithm, coupled with the BLAKE2b hash function. Signatures are generated for video clips with a predetermined size called video segments and stored in blocks chronologically. The signature of the previous block is stored in the current block to add another layer of security. At the time of validation, these signatures are verified. Experimental results show that the proposed method outperforms state-of-the-art methods in both speed and security. Our method is capable of identifying any type of forgery on any video file, by anyone, at any given moment, with insignificant additional storage requirements. Furthermore, our security analysis shows that our method is resilient against various types of attacks, including collision attacks, key substitution attacks, side-channel attacks, and chosen message attacks. The proposed lightweight video integrity verification method is better suited for use in resource constrained devices.
Palabras clave

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Idioma: En Revista: Sci Justice Asunto de la revista: JURISPRUDENCIA Año: 2024 Tipo del documento: Article

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Idioma: En Revista: Sci Justice Asunto de la revista: JURISPRUDENCIA Año: 2024 Tipo del documento: Article