Use of Video as Proof When Submitted to a Court of Law

White Paper
Use of Video as Proof When
Submitted to a Court of Law
Copyright © 2004 VisioWave SA
All Rights Reserved
Key facts
Digital video security
Digital technologies have key advantages for the operators of video security networks in
public areas (airports, public transportation, urban environment, … ) :
•
•
•
•
Great flexibility in the deployment thanks to the abundance of transmission
technologies supporting IP or ATM protocols: cable networks, optical fibers,
wireless, ADSL, carrier currents, …
Infinite possibilities of extension and interconnection of networks
Non-degradation over time of the quality of the recorded digital image and of
the recording medium, in spite of rewritings
Broad storage capacities allowing the permanent recording of all the
cameras with a history of several days and a perfect quality.
The digital technology has thus imposed itself replacing the solutions of traditional
analogical transport and recording.
Use of video when submitted to a court of law
Evolution of needs
In parallel, the images from video security cameras are used more and more
systematically as evidence in law-suits of aggressions or offences committed in public
places. The law has recognized the validity of images resulting from recordings of
security cameras on standard VHS magnetic tapes, in so far as they are the original
tapes, and provided, in certain cases, the authentication of the tape to detect possible
attempts at modification of the contents.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
2/ 12
The reluctance facing the digital image
The use of digital images as a substitute of the traditional recordings on magnetic tape
poses a certain number of problems in this context :
•
It is not possible to distinguish the copy from the original in a digital
recording, both being strictly identical. In fact, any digital recording is at the
same time a copy (since the data was copied many times during its
treatment before arriving to the hard disk) and an original (since it is the
most faithful representation available of the signal originally captured by the
camera).
•
The digital tools of image modification are widely diffused and accessible to
the general public by the means of software on PCs. Their increasing
effectiveness and their generalized use – today almost all the photographs
are digitally modified to improve the quality or to remove any type of defect
before printing – cause mistrust as for the authenticity of the images
presented as proof.
•
There is no standardized procedure to prove the authenticity of the images.
This results in a reluctance of the courts to accept images resulting from digital
processes as proof.
A paradoxical situation
This reluctance, due to the act of questioning the practice accumulated during tens of
years is however paradoxical. The digital recordings allow a better conservation, and
thus a better reliability of the proof by the use of an image and are often of a definitely
better quality than the images extracted from magnetic tapes, which are continuously
overwritten. In addition, it should be noted that a VHS cassette is the complete opposite
of a protected media since its access is within the range of a great number of individuals
through the use of common, domestic equipment.
Clearly, this mistrust of the courts is a major obstacle for the extraction of the maximum
benefits of a digital video security system. The deployment of an image authentication
process on such a network makes it possible to overcome this difficulty.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
3/ 12
Choice of authentication process
In order to be effective, the principal qualities that such a process must have, are:
Integration of all the information of identification
To authenticate the origin of an image, it is necessary to have, aside from its timestamping, all of the data which are necessary for the identification of the camera and its
physical angle of image capture. For example, in a mobile environment, the process
must make it possible to associate geo-localization by GPS co-ordinates for each image.
Authentication from beginning to end
The authenticity must be able to be checked from beginning to end of the digital data
processing sequence, independently of the number of transfers on data-processing
networks, recordings or copies of files which have been carried out. A process valid only
on a point-to-point link, like SSL for example, will not make it possible to ensure the
authenticity of an image, which will have been engraved thereafter on a CD-ROM type
media. In particular, the value of the proof should not be weakened by the time it takes
to file the images.
An acceptable, additional administrative workload
The process must at least be based on time-specific manual operations, like the entry of
passwords, or regular operations, like periodic changes of access keys. A process being
based on human interventions will indeed impose the management of training and the
accreditation of the personnel entitled to proceed with these interventions. The
authentication is likely to be questioned, if the proof of the respect of the administrative
procedures for interventions cannot be brought.
Recognition and robustness
Finally, since this is a method intended for the identification of people accused by a
court of law, the process must rest on methods whose validity is marked by the
contradictory examination method of the scientific community. The process selected
must thus be based on public algorithms, widely used, and whose solidity has been
proven, preferably by the adoption within official standards.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
4/ 12
Methods of authentication
The different families of processes
Definition
A method of authentication makes it possible to associate to an image a set of data of
identification (hour of the image capture, place...)so as to prove the origin of it, and also
to associate a control of integrity, so as to prove the authenticity, as well as the
authenticity of the associated elements of identification. These two facets of the
authentication are indissociable. Indeed, it is not enough to prove the non-modification
of the contents of an image, if one cannot be certain of its date. Reciprocally, the
association of elements of identification is not enough in itself to prove the authenticity of
the contents. All the processes of authentication satisfy this definition, but are more or
less adapted to the context of proof in digital video security. The two main families of
authentication methods will now be reviewed, and this particularly under the light of the
selection criteria defined in the preceding section.
Watermarking/Watermarks
The methods of the type watermark, or "watermarking", are based on a modification of
the contents of the image, so as to insert:
•
Data of identification
•
A check-code of integrity for the data of identification
•
A pseudo-random spread spectrum noise undetectable to the eye,
in order to highlight a potential modification of the contents.
Inspired by the protection watermarks of royalties, they fundamentally differ from them
by the fragility of the watermark, which must not resist an attempt at deterioration of the
image, whereas in the case of the protection of the royalties, one seeks on the contrary
to resist deteriorations, e.g. of the type of JPEG compression, minor final improvements
or impression on paper medium.
In the field, these methods only function correctly on non-compressed images, in which
it is possible to insert low levels of noise without interfering in a disturbing way with the
contents of the image. The watermark applied to a non-compressed image will
unfortunately disappear if it is compressed so as to be recorded on a digital medium.
Since this is the case in video security, it will thus not be useful.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
5/ 12
If the method uses a robust watermark, it will make it possible to associate the elements
of identification inside the image with a good probability of success, but it will have to
strongly denature the contents of the image so as to avoid being erased by
compression. As a matter of fact, the calculation of the watermark uses a standard
model of the human visual system to insert invisible information in the image, whereas
the algorithm of compression will use this same model to destroy all the invisible details,
which are therefore uninteresting to compress.
Even if the risk of interference with the contents of the image is accepted, the integrity of
the contents cannot be proven in a convincing way, since the image was already
modified by an algorithm of compression without destroying the watermark. Small
deteriorations on details might therefore not be perceived. We can thus conclude that
the processes based upon watermarks do not correspond to the criteria of selection.
Certificates of digital signature
The second major family of authentication methods is derived from the codes of
authentication, known as MAC1algorithms, frequently used for the protection of
messages and electronic documents.
Starting from the image compressed in digital form and from the data of identification,
they produce a certificate of authenticity, attached to the image, and containing the
proof, in the form of a cryptographic footprint, of the bit for bit integrity of the image and
identification data as well as of the association of both. Any modification of the input
data produces therefore a different footprint.
They generally call upon the codes of authentication standardized for securing emails
and commercial transactions in electronic form. The most current codes are MD5 2 and
SHA-1 3.
The great strength of these methods is their capacity to detect the smallest modification
of contents in a direct and non-probabilistic manner. They are also much less complex
than the watermarking method, and are tested by more than 20 years of use for
securing banking transactions.
1
Message Authentication Codes
Message Digest # 5, MAC 128 bits standardized for Internet use by the IETF in the RFC1321
3
Secure Hash Algorithm # 1, MAC 160 bits standardized in 1995 by the American Federal Government (publication
FIPS-180-1) for use in the Digital Signature Standard (DSS).
2
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
6/ 12
Protection keys
Necessity for the protection through a secret key
As effective as they might be, all the processes of authentication must be protected by a
key, whose secrecy will make it possible to show that the process was correctly applied
at the original location and by the original device.
If a forger is in the possession of this key, he could indeed modify the image or falsify
the data of identification, then re-apply the process of authentication after modification
without it being possible to distinguish the forgery from the original.
This point is sometimes neglected in the low cost digital equipment, because of the
complexity of management of these keys, rendering the proof thus unusable when
submitted to a court of law.
Here also, two families of protection keys are largely used and thus reviewed in the light
of the selection criteria.
Processes with a symmetrical key
In a process with a symmetrical key, only one key protects the certificate of authenticity
(or the watermark). This key must be installed on the video capture equipment, and then
preserved by an entrusted person until it is given to the expert who carries out the
verification of authenticity on an image.
At no moment must this key be revealed, but its revelation is essential for the analysis of
the certificate. A new key will thus have to be installed on the equipment before any
request of verification, in order not to weaken the proof of the images taken after the
disclosure of this key for this equipment.
Moreover, it is necessary to install a different key for each video source, so as to limit to
the maximum the impact of a compromised key on the integrity of the system. The
management of these keys must be done by strictly identified people, and according to a
procedure making it possible to trace all the operations to secure against an attack on
the authenticity of the key presented to the expert. This is all the more necessary, as the
operator of the video network is the one who installs and preserves these keys.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
7/ 12
The symmetrical key processes do not require large computing resources and are very
widespread (DES4, AES5). But the great number of keys to be managed and the rigor of
the procedures of installation and conservation were the principal obstacles until now for
the generalized deployment of methods of authentication on digital security networks.
An alternative, used for a long time to secure the most sensitive electronic transactions,
is fortunately available.
Processes with asymmetrical keys
In an asymmetrical process, two keys protect the certificate of authenticity. A first key,
known as the "private" key, is installed on the equipment of capture and allows the
creation of the encrypted certificate. A second key, known as the "public" key, is
preserved so as to be used in the event of an assessment and makes it possible to
decipher the certificate.
The public key does not make it possible to create a fake certificate of authenticity, nor
to guess the private key. It can thus be preserved and handled without particular
protection measures and without weakening the strength of the process of
authentication. The conservation of the private key is not necessary, and it is generally
not even desirable to preserve it outside of the equipment of capture.
Calling upon the arithmetic of large numbers (several hundreds of figures) these
processes are very expensive in computing resources. The recent advances in the
studies of the elliptic curves made it possible to derive from the traditional algorithms
(RSA6, DSA7) less complex versions which are now integrated in the protection
standards of digital documents (EC-DSA8) and which are adapted to be used within the
framework of video.
4
Data Encryption Standard, cryptographic system (per block) developed in the 1970s by IBM and the American
government.
5
Advanced Encryption Standard, substitutes the DES, standardized by the American government in 2002
(publication FIPS-197)
6
Rivest, Shamir and Adleman, after the names of the developers of the first civil system of cryptography with a
public key.
7
DIGITAL Signature Algorithm, algorithm based on the problem of the selected discrete logarithm, chosen for the
American digital signature standard.
8
Elliptic Curve DSA, version using the properties of the elliptic curves of the DSA algorithm.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
8/ 12
VisioWave Solution
We now present the method of authentication implemented in version 2.3 of the
VisioWave Video Operating System.
Chain of image processing
As a logical conclusion, the solution adopted by VisioWave for its digital video
equipment is naturally based on MD5 certificates of authenticity, protected by an
asymmetrical encoding of EC-DSA type. This combination makes it possible to answer
all the criteria exposed in the first part at an optimal cost.
This digital signature is the starting point of a chain of operations which allows, starting
from an extracted file copied from a removable media, to bring the proof of the
authenticity of each image. The typical chain of image processing in a digital video
system is illustrated in Diagram 1.
Video Security
Network
Extraction
Storage
Removable
Media
Video
Assessment
Station
Diagram 1: Chain of image processing
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
9/ 12
Individual digital signature of the images
Each image is digitally signed through the creation of a certificate of authenticity as of its
compression on the equipment of capture. This certificate is attached to the image and
follows it when it is transferred on the network, recorded and copied. The certificates are
thus present in the extracted files which one wishes to use as proof.
The process of creation of the certificate is illustrated in Diagram 2.
bitstream
Compression
configuration
Administrator
0110100 10
identifier
"CAMERA 2"
control word
101100101001
MAC
MD5
serial number
#42146876851
GPS
system
clock
private
key
timestamping
15:41:23 GMT
Diagram 2: Creation of the certificate of authenticity
Verification
The verification, always carried out on an image extracted from a recording, consists of
the automatic verification of the control word and the posting of the data of identification
for visual verification. The process is illustrated in Diagram 3.
bitstream
0110100 10
identifier
"CAMERA 2"
MAC
MD5
serial number
Extraction
recalculated control word
101100101001
#42146876851
YES
Authentic
time stamp
15:41:23 GMT
=?
NO
False
certified control word
101100101001
public key
Diagram 3: Verification of the authenticity
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
10/ 12
Transparent creation of the keys and certificates
To facilitate the management of the public keys, the extracted files contain a copy of the
public key used for securing the certificates. The user is thus not obliged to maintain an
up-to-date data base of the public keys. To be ensured of the authenticity of the key
provided in the file, this one itself is attached to a certificate of authenticity secured by
the key of VisioWave and which is created at the time of the installation of the key at the
production site.
The public key of VisioWave, essential for the verification of the certificate, is widely
available via the authorities of international certifications where it is recorded. Upon
request, these authorities provide a certificate signed by their private key to attest of the
public key’s authenticity.
Thus, an operation without an administrative workload of filing of the public keys is
possible, and this without weakening the level of proof, through the use of this chain of
certification, according to the traditional diagram used in all the infrastructures of digital
signature.
Flexibility in the choice of the authenticity chain
As can be seen, this policy by default allows a "plug & play" authentication from
beginning to end, thanks to the flexibility of the cryptography algorithms using public
keys.
The operator of the video network remains of course free to define another chain of
authentication if he wishes an integration within an infrastructure that already has an
existing public key. In this case, he will have to generate and install the keys of
authentication and associated certificates on each equipment, according to the local
policy.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
11/ 12
Confidentiality of data
The system of authentication presented here exclusively relates to the verification of the
authenticity of the images presented in an extracted file. It does not allow, in itself, to
protect the confidentiality of these images (encrypting), nor to trace who the operators
were who made copies.
It is however often desirable, in the context of the presentation of images in front of the
courts, to control the access to the images during the investigation. The VisioWave
Video Operating System provides these services thanks to the integration with the
encoding software PGP. At the time of the images’ extraction via the primary storage
server, it is possible to protect the extracted file with a password. According to the way
in which this password is allotted, the operator will thus be able to:
•
Prove who carried out the copy and when, if he generates a single password
for each copy and notes it in a log.
•
Limit the images’ access to individuals who received a password from him.
The encryption of the extracted files thus provides an effective tool to the procedures of
image capture, by providing a "virtual seal" according to the standard format for the
protection of data files.
The choice of the encryption algorithm and the type of key (symmetrical or
asymmetrical) for this operation is left to the user, since PGP supports a broad selection
of standard algorithms.
Conclusion
Version 2.3 of the VisioWave Video Operating System provides a complete solution to
meet the needs arising from the use of digital images in legal proceedings. This solution
is given in the form of tools, based on international standards, whose flexibility makes it
possible to be integrated in a locally defined policy.
The deployment of the authentication process is done with a minimum effort, thanks to
the use of a system with a public key.
Complementary tools are provided for the additional needs for protection of the data
confidentiality and for the control of the creation of copies.
Use of Video as Proof When Submitted to a Court of Law - White Paper
Copyright © 2004 VisioWave SA - All Rights Reserved
12/ 12