18-10-2010, 10:19 AM
[attachment=6369]
AUTOMATIC VISUAL SURVEILLANCE SYSTEM
INTRODUCTION
This paper explores the various techniques used to authenticate the visual
data recorded by the automatic video surveillance system. Automatic video
surveillance systems are used for continuous and effective monitoring and
reliable control of remote and dangerous sites. Some practical issues must be
taken in to account, in order to take full advantage of the potentiality of VS
system. The validity of visual data acquired, processed and possibly stored by the
VS system, as a proof in front of a court of law is one of such issues. But visual
data can be modified using sophisticated processing tools without leaving any
visible trace of the modification. So digital or image data have no value as legal
proof, since doubt would always exist that they had been intentionally tampered
with to incriminate or exculpate the defendant. Besides, the video data can be
created artificially by computerized techniques such as morphing. Therefore the
true origin of the data must be indicated to use them as legal proof. By data
authentication we mean here a procedure capable of ensuring that data have not
been tampered with and of indicating their true origin.