February 26, 2019 | video technology

Protecting Video From Manipulation

Protect Videos

Video from security cameras, body cams and many other sources is important evidence for law enforcement.

But this once sacrosanct medium is easily manipulated. Right now you can download free software that uses machine learning to perform a convincing digital video face-swap. See Changing Faces.This free software utilizes deep learning to recognize and swap faces in pictures and videos. And the software is getting better.

This presents a real problem for legal matters. Is the video true or false?
There’s a new tool that can tell for sure. It’s called Amber Authenticate./ The application runs in the background on any video capturing device. At regular intervals, it generates “hashes” which are cryptographically scrambled representations of the video data. These hashes are indelibly recorded on a public blockchain. If you run that same video clip through the algorithm again, the hashes will be different if anything has changed in the file’s audio or video data—tipping you off to possible manipulation.

The interval between hashes is a critical aspect of the technology. If, for instance, you set the interval to every second on a small business surveillance camera that would be overkill. But if the interval were set to every 30 seconds on a police body camera, there is too much that could be changed to mislead people. So the operator must choose the interval carefully.

When a video is entered into evidence it’s really hard to say what’s a fake. Just look at computer generated imagery in feature films. It’s pretty hard to tell what’s real and what’s not. Detection is not a sure thing. But with Amber Authenticate either the hash matches or it doesn’t, and it’s all publicly verifiable through the blockchain.
The technology has attracted the interest of the Department of Homeland Security and many others.

Amber Authenticate is built on the open-source blockchain platform Ethereum. It includes a web platform that makes it visually simple to determine if a video clip has been manipulated. A green frame appears around footage that matches its hashes. A red frame appears around any part that does not match the hash. Amber Authenticate also shows a detailed audit trail that lists when a file was originally created, uploaded, hashed, and submitted to the blockchain.

Now it’s up to manufacturer’s of security cameras and body cams to license the technology and install it on their video devices.


Keep Reading...

"; echo get_the_post_thumbnail( $a->ID, 'tiny' ); if(get_the_post_thumbnail( $a->ID)==false) { main_image($a->ID); } echo "
"; echo "

".$a->post_title."

"; $page_data = get_page( $a->ID ); $excerpt = strip_tags($page_data->post_excerpt); echo $excerpt; echo "Read More"; echo "
"; echo "
"; echo "
"; /* WP_Post Object ( [ID] => 4061 [post_title] [post_excerpt] [guid] => https://www.videouniversity.com/?p=4061 ) */ endwhile; else : // no rows found endif; $needed= 4-$count; if($needed>=1) { $cat=array(); $categories = get_categories( $args ); //echo "
"; print_r($categories); echo "
"; foreach($categories as $c) { $term_id= $c->term_id; if($term_id!=1){ array_push($cat, $term_id); } } // WP_Query arguments $args = array ( 'post_type' => array('post','page','shop','article'), 'orderby' => 'rand', 'posts_per_page' => $needed, 'cat'=>$cat, 'meta_query' => array(array('key' => '_thumbnail_id')) ); // The Query $query = new WP_Query( $args ); // The Loop if ( $query->have_posts() ) { while ( $query->have_posts() ) { $query->the_post(); ?>




Leave a Reply


Subscribe to Video Entrepreneur, our weekly free email newsletter