How Blockchain can be used for Verifying the Authenticity of Video/Image
Main Article Content
Abstract
With the explosive advancement of modern technology we heavily rely upon digital data in the form of video and image. Digital content has been the norm for quite a few years in all aspects of modern society for ease of use and conveniences. Relevant visual information may be utilised in a range of settings, such as the media, law enforcement, publications, legal procedures, medical imaging, the military, and consumer museums. Though the development of advanced technology with the help of sophisticated artificial intelligence(AI) algorithms have opened the door to temper digital data and contents. [1] This misinterpretation of advanced technology has made the integrity of the video/image file questionable. [2] In the context of using the video/image file in court or any other places for presenting proof have been disputable. In this
research article I present a framework for verifying the authenticity of video/image using blockchain technology. Using this framework the deep-fake problems can be countered and a layer of trust can be established verifying the integrity of the visual contents. The IoT device capturing the image or video file computes a hash before the data leaves the device. Then the hash is stored in a blockchain system to provide a transparent way to check the integrity of the file.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Rashid and Md Mamunur,Lee, Suk-Hwan and Kwon, KiRyong. (2021). Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity. Journal of KoreaMultimedia Society. 24. 1044-1058. 10.9717/kmms.2021.24.8.1044.
Javed, Abdul Rehman, Jalil, Zunera, Zehra, Wisha,Gadekallu, Thippa , Suh, Doug , Jalil Piran, Md. (2021). A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Engineering Applications of Artificial Intelligence. 106. 104456. 10.1016/j.engappai.2021.104456.
Zheng, Zibin and Xie, Shaoan and Dai, Hong-Ning and Chen, Xiangping and Wang, Huaimin. (2017). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. 10.1109/BigDataCongress.2017.85.
Xu, M., Chen, X. Kou, G. A systematic review of blockchain. Finance Innov 5, 27 (2019). https://doi.org/10.1186/s40854-019- 0147-z
Lashkari, Bahareh and Musilek, Petr. (2021). A Comprehensive Review of Blockchain Consensus Mechanisms. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3065880.
Ruihang Huang, Xiaoming Yang, P. Ajay, Consensus mechanism for software-defined blockchain in internet of things, Internet of Things and Cyber-Physical Systems, Volume 3, 2023, Pages 52-60, ISSN 2667-3452,
Golj an, Mi rosl av F ri dri ch, J ess i ca F ill er, To m a´s . (2009). Large scale test of sensor fingerprint camera identification. Proceedings of SPIE Conference on Electronic Imaging, Security and Forensics of Multimedia Contents XI. 7254. 72540. 10.1117/12.805701.
Ngan, King Li, Hongliang. (2011). Video Segmentation and Its Applications. 10.1007/978-1-4419-9482-0.
Macharia, Wahome. (2021). Cryptographic Hash Functions.
Yong, KK Karuppiah, Ettikan. (2013). Hash match on GPU. 2013 IEEE Conference on Open Systems, ICOS 2013. 10.1109/ICOS.2013.6735065.