Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 314))

  • 380 Accesses

Abstract

In recent decades, surveillance cameras are widely deployed in populous areas for secretly consideration. The connection to the Internet, however, has brought lots of illegal intruding behaviors to these IoT (Internet of Things) devices. More precisely, the surveillance camera has become the rank one IoT target suffered from malicious attacks. As the recorded video is an important evidence for investigation, any suspicious disruption on surveillance camera must lower down the credibility of video. Thus, we aim to integrate the blockchain concept for developing a critical evidence custody system (CECS). In particular, a critical motion detection (CMD) technique is designed to reduce the video storage overhead on blockchain. Simulations have demonstrated that CECS is able to efficiently preserve the video credibility of surveillance camera.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Circo, G.: Edmund McGarrell, Estimating the impact of an integrated CCTV program on crime. J. Exp. Criminol. 17, 129–150 (2021)

    Article  Google Scholar 

  2. Paul Bischoff, Surveillance camera statistics: which cities have the most CCTV cameras ?, Comparitech Available online (2021) https://www.comparitech.com/blog/vpn-privacy/the-worlds-most-surveilled-cities/

  3. Priya, M., Surya, D., Diana Josephine, P., Abinaya: IoT based smart and secure surveillance system using video summarization, Advances in Computing and Network Communications. 423–435 (2021)

    Google Scholar 

  4. Taipei City Government, Statistical data on the time series of cases detected by the surveillance video system in taipei city, Government Information Open Platform Available online (2020). https://data.gov.tw/ dataset/133399

  5. Steve Hilton, What to expect from security and surveillance monitoring solutions in an IoT world, Available online: https://blog.bosch-si.com/internetofthings/what-to-expect-from-security-and-surveillance-monitoring-solutions-in-an-iot-world/

  6. Terry He, Rhoda-Mae Aronce, Lalith Dampanaboina, Justin Jose, Michael King, Edward Cohen, Sonicwall cyber threat report, SonicWall (2021) Available online: https://www.sonicwall.com/medialibrary/en/white-paper/2021-cyber-threat-report.pdf

  7. Berdik, D., Otoum, S., Schmidt, N., Porter, D., Jararweh, Y.: A survey on blockchain for information systems management and security. Inf. Process. Manage. 58, 1–28 (2021)

    Article  Google Scholar 

  8. Liang, W., Fan, Y.-K., Li, K.-C., Zhang, D.-F., Gaudiot, J.-L.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Industr. Inf. 16, 6543–6552 (2020)

    Article  Google Scholar 

  9. Nazanin Zahed Benisi., Mehdi Aminian., Bahman Javadi.: Blockchain-based decentralized storage networks: A survey. J. Netw. Comput. Appl. 162, 1-10 (2020)

    Google Scholar 

  10. Hossein Shafagh., Lukas Burkhalter., Anwar Hithnawi., Simon Duquennoy.: Towards blockchain-based auditable storage and sharing of IoT data, Proceedings of the 2017 on Cloud Computing Security Workshop, 45–50 (2017)

    Google Scholar 

  11. Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M.: Ismaeel Al Ridhawi, An incentive-aware blockchain-based solution for internet of fake media things. Inf. Process. Manage. 57, 1–16 (2020)

    Article  Google Scholar 

  12. Liu, L., Zhang, W., Han, C.: A survey for the application of blockchain technology in the media. Peer-To-Peer Netw. Appl. 14, 3143–3165 (2021)

    Article  Google Scholar 

  13. Chang, Y.-F.: Research on de-motion blur image processing based on deep learning. J. Vis. Commun. Image Represent. 60, 371–379 (2019)

    Article  Google Scholar 

  14. Lissner, I., Preiss, J., Urban, P.: Matthias Scheller Lichtenauer, Peter Zolliker, Image-difference prediction: From grayscale to color. IEEE Trans. Image Process. 22, 435–446 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  15. Li, F.-Y., Zhang, L.-M., Wei, W.-M.: Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression. EURASIP J. Image Video Process. 33, 1–21 (2020)

    Google Scholar 

  16. Mondal, R.: Moni Shankar Dey. Bhabatosh Chanda, Image restoration by learning morphological opening-closing network, Mathematical Morphology-Theory and Applications 4, 87–107 (2020)

    Google Scholar 

  17. Satoshi Nakamoto.:Bitcoin: A peer-to-peer electronic cash system, Available online (2008): http://bitcoin.org/bitcoin.pdf

  18. Fanning, K., Centers, D.P.: Blockchain and its coming impact on financial services. J. Corp. Account. & Financ. 27, 53–57 (2016)

    Article  Google Scholar 

  19. Jie-Wu Leng., Guo-Lei Ruan., Ping-Yu Jiang., Kai-Lin Xu., Qiang Liu., Xue-Liang Zhou., Chao Liu.: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey, Renewable and Sustainable Energy Reviews 132, 1–20 (2020)

    Google Scholar 

  20. Matthias Mettler.: Blockchain technology in healthcare: The revolution starts here, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom) Munich Germany, 1–3 (2016)

    Google Scholar 

  21. Hasselgren, A., Kralevska, K., Gligoroski, D., Pedersen, S.A., Faxvaag, A.: Blockchain in healthcare and health sciences - a scoping review. Int. J. Med. Informatics 134, 1–10 (2020)

    Article  Google Scholar 

  22. Seyoung Huh., Sangrae Cho., Soohyung Kim.: Managing IoT devices using blockchain platform, 2017 19th International Conference on Advanced Communication Technology (ICACT) PyeonyChang Korea, 464–467 (2017)

    Google Scholar 

  23. Ralph , C.: Merkle, One way hash functions and DES, Conference on the Theory and Application of Cryptology New York, 428–446 (1989)

    Google Scholar 

  24. Neal Krawetz, Kind of like that, Available online (2013). http://www.hackerfactor.com/blog/?/archives/529-Kind-of-Like-That.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-San Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hung, WC., Chew, CJ., Chen, YC., Fan, YY., Lee, JS. (2023). A Blockchain-Based Custody System for Preserving Critical Video Evidence. In: Tsihrintzis, G.A., Wang, SJ., Lin, IC. (eds) 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Smart Innovation, Systems and Technologies, vol 314. Springer, Cham. https://doi.org/10.1007/978-3-031-05491-4_35

Download citation

Publish with us

Policies and ethics