This article proposes new tools to detect the tampering of video feeds from surveillance cameras. Our proposal illustrates the unique cyber-physical properties that sensor devices can leverage for their cyber-security. While traditional attestation algorithms exchange digital challenges between devices authenticating each other, our work instead proposes challenges that manifest physically in the field of view of the camera (e.g., a QR code in a display). This physical (challenge) and cyber (verification) attestation mechanism can help protect systems even when the sensors (cameras) and actuators (a display, infrared LEDs, color light bulbs) are compromised. In this article, we consider skillful adversaries that can capture the correct chal...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...
Technological advancements are inevitable and the field of IoT is no exception. The utilization of t...
Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, t...
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT)....
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
In the area of the Internet of Things, cloud-based camera surveillance systems are ubiquitously avai...
Few years ago, authentication of visual media has regarded as a crucial research area which concerns...
Multimedia forensics deals with the analysis of multimedia data to gather information on their origi...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
Over the past two decades, society has seen incredible advances in digital technology, resulting in ...
In this article, we verify physical events using data from an ensemble of smart home sensors. This a...
The move from analog to fully digital systems in conjunction with continuous technological advances ...
Criminals often resort to camera tampering to prevent capture of their actions. Real-time automated ...
Over the past two decades, society has seen incredible advances in digital technology, resulting in ...
Nearly every modern mobile device includes two cam-eras. With advances in technology the resolution ...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...
Technological advancements are inevitable and the field of IoT is no exception. The utilization of t...
Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, t...
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT)....
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
In the area of the Internet of Things, cloud-based camera surveillance systems are ubiquitously avai...
Few years ago, authentication of visual media has regarded as a crucial research area which concerns...
Multimedia forensics deals with the analysis of multimedia data to gather information on their origi...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
Over the past two decades, society has seen incredible advances in digital technology, resulting in ...
In this article, we verify physical events using data from an ensemble of smart home sensors. This a...
The move from analog to fully digital systems in conjunction with continuous technological advances ...
Criminals often resort to camera tampering to prevent capture of their actions. Real-time automated ...
Over the past two decades, society has seen incredible advances in digital technology, resulting in ...
Nearly every modern mobile device includes two cam-eras. With advances in technology the resolution ...
Security is a fundamental issue in today's world. In this chapter we discuss various aspects of secu...
Technological advancements are inevitable and the field of IoT is no exception. The utilization of t...
Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, t...