{"title":"Blockchain Solution for Evidence Forgery Detection","authors":"B. Kumar, K. R. Kumar","doi":"10.1166/JCTN.2020.9454","DOIUrl":null,"url":null,"abstract":"Rapidly improving video editing software tools have made video content manipulation feasible. Consequently malicious attackers are trying to manipulate the videos. Detecting video tampering is a major need for many applications. In this paper we propose a model called Evidence chain\n based on Blockchain to ensure the credibility of the video. Unlike bitcoin which is a digital currency the Proposed system documents video hash by using hash based technology and elliptic curve cryptography. Video segments are hashed and stored in chronological order as a chain of blocks which\n are detectable and non-altering guaranteeing the validity of the video information. This research is significant in establishing the trust between any two parties.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5570-5576"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computational and Theoretical Nanoscience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/JCTN.2020.9454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Chemistry","Score":null,"Total":0}
引用次数: 0
Abstract
Rapidly improving video editing software tools have made video content manipulation feasible. Consequently malicious attackers are trying to manipulate the videos. Detecting video tampering is a major need for many applications. In this paper we propose a model called Evidence chain
based on Blockchain to ensure the credibility of the video. Unlike bitcoin which is a digital currency the Proposed system documents video hash by using hash based technology and elliptic curve cryptography. Video segments are hashed and stored in chronological order as a chain of blocks which
are detectable and non-altering guaranteeing the validity of the video information. This research is significant in establishing the trust between any two parties.