{"title":"Digital and analogue watermarking of video recordings","authors":"O. D'Souza","doi":"10.1109/CCST.1997.626241","DOIUrl":null,"url":null,"abstract":"The security industry is increasingly using video as a tool to support the fight against crime. The volume of video recordings and image data that is being stored is growing at an alarming rate and may soon become unmanageable and/or unusable as evidence as a result of the current poor management of this valuable resource. Digital Video and/or Images are now clearly identified as valuable \"DATA\" by security personnel, clients, law enforcement authorities and the legal profession. However, the current authenticity of most of this \"data\" is questionable because there are no formal \"secure tagging\" and handling guidelines and/or standards. As an example, the formal methods in place to issue and secure the issue of keys have established unique tracing systems and databases in the lock and safe industry. Information maintained generally helps to identify origins and establish some uniqueness that improves the management and traceability of something as small as a key.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1997.626241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The security industry is increasingly using video as a tool to support the fight against crime. The volume of video recordings and image data that is being stored is growing at an alarming rate and may soon become unmanageable and/or unusable as evidence as a result of the current poor management of this valuable resource. Digital Video and/or Images are now clearly identified as valuable "DATA" by security personnel, clients, law enforcement authorities and the legal profession. However, the current authenticity of most of this "data" is questionable because there are no formal "secure tagging" and handling guidelines and/or standards. As an example, the formal methods in place to issue and secure the issue of keys have established unique tracing systems and databases in the lock and safe industry. Information maintained generally helps to identify origins and establish some uniqueness that improves the management and traceability of something as small as a key.