Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge (original) (raw)
Abstract
Large scale Internet of Video Things (IoVT) supports situation awareness for smart cities; however, the rapid development in artificial intelligence (AI) technologies enables fake video/audio streams and doctored images to fool smart city security operators. Authenticating visual/audio feeds becomes essential for safety and security, from which an Electric Network Frequency (ENF) signal collected from the power grid is a prominent authentication mechanism. This paper proposes an ENF-based Video Authentication method using steady Superpixels (EVAS). Video superpixels group the pixels with uniform intensities and textures to eliminate the impacts from the fluctuations in the ENF estimation. An extensive experimental study validated the effectiveness of the EVAS system. Aiming at the environments with interconnected surveillance camera systems at the edge powered by an electricity grid, the proposed EVAS system achieved the design goal of detecting dissimilarities in the image sequences.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (40)
- Liu, B., Chen, Y., Shen, D., Chen, G., Pham, K., Blasch, E. and Rubin, B. (2014) An adaptive process-based cloud infrastructure for space situational awareness applications. In Sensors and Systems for Space Applications VII (International Society for Optics and Photonics), 9085: 90850M.
- Wu, R., Liu, B., Chen, Y., Blasch, E., Ling, H. and Chen, G. (2017) A container-based elastic cloud architecture for pseudo real-time exploitation of wide area motion imagery (wami) stream. Journal of Signal Processing Systems 88(2): 219-231.
- Gebre-Amlak, H., Lee, S., Jabbari, A.M., Chen, Y., Choi, B.Y., Huang, C.T. and Song, S. (2017) Mist: Mobility- inspired software-defined fog system. In 2017 IEEE International Conference on Consumer Electronics (ICCE) (IEEE): 94-99.
- Nikouei, S.Y., Xu, R., Nagothu, D., Chen, Y., Aved, A. and Blasch, E. (2018) Real-time index authentication for event-oriented surveillance video query using blockchain. In 2018 IEEE International Smart Cities Conference (ISC2) (IEEE): 1-8.
- Zhang, J. and Tao, D. (2020) Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things. IEEE Internet of Things Journal .
- Nikouei, S.Y., Chen, Y., Aved, A. and Blasch, E. (2018) Toward an event-oriented indexable and queryable intelligent surveillance system. IEEE COMSOC MMTC Communications -Frontiers 13(4): 33-39.
- Nagothu, D., Chen, Y., Blasch, E., Aved, A. and Zhu, S. (2019) Detecting malicious false frame injection attacks on surveillance systems at the edge using electrical network frequency signals. Sensors 19(11): 2424.
- Nagothu, D., Schwell, J., Chen, Y., Blasch, E. and Zhu, S. (2019) A study on smart online frame forging attacks against video surveillance system. In Sensors and Systems for Space Applications XII (International Society for Optics and Photonics), 11017: 110170L.
- Chen, N. and Chen, Y. (2018) Smart city surveillance at the network edge in the era of iot: opportunities and challenges. In Smart Cities (Springer), 153-176.
- Xu, R., Nikouei, S.Y., Nagothu, D., Fitwi, A. and Chen, Y. (2020) Blendsps: A blockchain-enabled decentralized smart public safety system. Smart Cities 3(3): 928-951.
- Yu, W., Xu, H., Nguyen, J., Blasch, E., Hematian, A. and Gao, W. (2018) Survey of public safety communications: User-side and network-side solutions and future directions. Ieee Access 6: 70397-70425.
- Costin, A. (2013) Poor man's panopticon: Mass cctv surveillance for the masses. PowerOfCommunity, Novem- ber .
- Mowery, K., Wustrow, E., Wypych, T., Singleton, C., Comfort, C., Rescorla, E., Halderman, J.A. et al. (2014) Security analysis of a full-body scanner. In USENIX Security Symposium: 369-384.
- Andrews, G. (2015) Police body cameras pre- installed with worm. https://www.eteknix.com/ police-body-cameras-pre-installed-worm/ .
- Muthusenthil, B. and Kim, H.S. (2018) Cctv surveil- lance system, attacks and design goals. International Journal of Electrical and Computer Engineering (IJECE) 8(4).
- Olson, M. (2016) Beware, even things on amazon come with embedded malware. http: //artfulhacker.com/post/142519805054/ beware-even-things-on-amazon-come .
- Costin, A. (2016) Security of cctv and video surveillance systems: threats, vulnerabilities, attacks, and mitiga- tions. In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices (ACM): 45-54.
- Kharraz, A., Kirda, E., Robertson, W., Balzarotti, D. and Francillon, A. (2014) Optical delusions: A study of malicious qr codes in the wild. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on (IEEE): 192-203.
- Blasch, E.P., Rogers, S.K., Holloway, H., Tierno, J., Jones, E.K. and Hammoud, R.I. (2014) Quest for information fusion in multimedia reports. International Journal of Monitoring and Surveillance Technologies Research (IJMSTR) 2(3): 1-30.
- Grigoras, C. (2005) Digital audio recording analysis- the electric network frequency criterion. International Journal of Speech Language and the Law 12(1): 63-76.
- Garg, R., Varna, A.L., Hajj-Ahmad, A. and Wu, M. (2013) "seeing" enf: power-signature-based timestamp for digital multimedia via optical sensing and signal processing. IEEE Transactions on Information Forensics and Security 8(9): 1417-1432.
- Korycki, R. (2013) Time and spectral analysis methods with machine learning for the authentication of digital audio recordings. Forensic science international 230(1-3): 117-126.
- Liu, Y., Yuan, Z., Markham, P.N., Conners, R.W. and Liu, Y. (2012) Application of power system frequency for digital audio authentication. IEEE Transactions on Power Delivery 27(4): 1820-1828.
- Vidyamol, K. and George, J.P.J.E. (2017) Exploring elec- tric network frequency for joint audio-visual synchro- nization and multimedia authentication. In 2017 Inter- national Conference on Intelligent Computing, Instrumen- tation and Control Technologies (ICICICT) (IEEE): 240- 246. 12 EAI Endorsed Transactions on Security and Safety 06 2020 -03 2021 | Volume 7 | Issue 24 | e4
- Hajj-Ahmad, A., Garg, R. and Wu, M. (2013) Spectrum combining for enf signal estimation. IEEE Signal Processing Letters 20(9): 885-888.
- Rodríguez, D.P.N., Apolinário, J.A. and Biscainho, L.W.P. (2010) Audio authenticity: Detecting enf discon- tinuity with high precision phase analysis. IEEE Transac- tions on Information Forensics and Security 5(3): 534-543.
- Ojowu, O., Karlsson, J., Li, J. and Liu, Y. (2012) Enf extraction from digital recordings using adaptive techniques and frequency tracking. IEEE Transactions on Information Forensics and Security 7(4): 1330-1338.
- Chuang, W.H., Garg, R. and Wu, M. (2013) Anti- forensics and countermeasures of electrical network frequency analysis. IEEE transactions on information forensics and security 8(12): 2073-2088.
- Vatansever, S., Dirik, A.E. and Memon, N. (2019) Factors affecting enf based time-of-recording estimation for video. In ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (IEEE): 2497-2501.
- Su, H., Hajj-Ahmad, A., Garg, R. and Wu, M. (2014) Exploiting rolling shutter for enf signal extraction from video. In Image Processing (ICIP), 2014 IEEE International Conference on (Citeseer): 5367-5371.
- Choi, J. and Wong, C.W. (2019) Enf signal extraction for rolling-shutter videos using periodic zero-padding.
- In ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (IEEE): 2667-2671.
- Vatansever, S., Dirik, A.E. and Memon, N. (2019) Analysis of rolling shutter effect on enf-based video forensics. IEEE Transactions on Information Forensics and Security 14(9): 2262-2275.
- Vatansever, S., Dirik, A.E. and Memon, N. (2017) Detecting the presence of enf signal in digital videos: A superpixel-based approach. IEEE Signal Processing Letters 24(10): 1463-1467.
- Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P. and Süsstrunk, S. (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE transactions on pattern analysis and machine intelligence 34(11): 2274- 2282.
- Wang, S., Lu, H., Yang, F. and Yang, M.H. (2011) Superpixel tracking. In 2011 International Conference on Computer Vision (IEEE): 1323-1330.
- Xu, Z., Min, B. and Cheung, R.C. (2019) A robust back- ground initialization algorithm with superpixel motion detection. Signal Processing: Image Communication 71: 1- 12.
- Zivkovic, Z. and Van Der Heijden, F. (2006) Efficient adaptive density estimation per image pixel for the task of background subtraction. Pattern recognition letters 27(7): 773-780.
- Su, H., Hajj-Ahmad, A., Wong, C.W., Garg, R. and Wu, M. (2014) Enf signal induced by power grid: A new modality for video synchronization. In Proceedings of the 2Nd ACM International Workshop on Immersive Media Experiences (ACM): 13-18.
- 13 EAI Endorsed Transactions on Security and Safety 06 2020 -03 2021 | Volume 7 | Issue 24 | e4