Idis highlights the importance of video footage integrity

Rapid advances in digital video manipulation techniques, and a rise in alleged deep-fake celebrity videos being reported in the news are putting pressure on video technology users as well as prosecutors to demonstrate the integrity of any footage they use. Idis believes demonstrating that footage is genuine is a key challenge for the future.

“As we look ahead, wherever video is presented for use as legal evidence, or as part of internal disciplinary proceedings, we will see more attempts to assert that footage is not genuine,” noted Dr Peter Kim, Global Technical Consultant for Idis. “Courts will dismiss evidence where tampering cannot be ruled out. Any challenge to the integrity of video evidence, if not countered, risks undermining the value of the entire video solution. This is particularly true in applications where investigating and prosecuting wrongdoing is a key function of the camera system. So, it will be vital that users can demonstrate beyond doubt that their footage has not been tampered with in any way.”

The manufacturer is pointing to its Chained Fingerprint algorithm as a way to prove that footage has not been tampered with. With Chained Fingerprint each frame is assigned a unique numerical ‘fingerprint’, calculated by relating its own pixel value to the fingerprint of the previous frame. This means that every single image frame of the video is linked by an encryption ‘chain’ with its neighbouring image frames. The encrypted chain is stored as part of the video data when the video is recorded or exported as a video clip using the Idis ClipPlayer. Before playback, the ClipPlayer scans video and recalculates the fingerprint chains of the video data. If any part of the image frame is tampered with, the fingerprint chain will be broken and will not match the chain value calculated at the time of video export, prompting a flag.

“As organisations look to upgrade or invest in new video solutions, protecting themselves against claims of video evidence tampering should be high on their priority list,” concluded Kim.


Related posts

Scroll to Top