A video authentication technique
Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system.
- Research Organization:
- Sandia National Labs., Albuquerque, NM
- OSTI ID:
- 5597146
- Report Number(s):
- CONF-870713-
- Journal Information:
- Nucl. Mater. Manage. Annu. Meet. Proc.; (United States), Journal Name: Nucl. Mater. Manage. Annu. Meet. Proc.; (United States) Vol. 16; ISSN NUMMB
- Country of Publication:
- United States
- Language:
- English
Similar Records
Modular authentication systems
Secure authenticated video equipment
Related Subjects
Inspection
& Accountability-- Technical Aspects
98 NUCLEAR DISARMAMENT, SAFEGUARDS, AND PHYSICAL PROTECTION
99 GENERAL AND MISCELLANEOUS
990220 -- Computers
Computerized Models
& Computer Programs-- (1987-1989)
CAMERAS
COMPUTER ARCHITECTURE
COMPUTERS
DATA PROCESSING
DIGITAL SYSTEMS
ELECTRONIC CIRCUITS
IMAGE PROCESSING
IMAGES
MICROELECTRONIC CIRCUITS
MICROPROCESSORS
NUCLEAR FACILITIES
PHYSICAL PROTECTION DEVICES
PROCESSING
RECORDING SYSTEMS
SECURITY
SURVEILLANCE
TESTING
VALIDATION