Checking the Integrity of CCTV Footage in Real Time at Nuclear Facilities
Video surveillance has become an important constituent part of the integrated security system of nuclear power plants. Due to this, the integrity and authenticity of the video transmitted by the surveillance camera are extremely important, and so is the possibility to identify violations of these ca...
Збережено в:
Дата: | 2016 |
---|---|
Автори: | , , , |
Формат: | Стаття |
Мова: | English |
Опубліковано: |
Державне підприємство "Державний науково-технічний центр з ядерної та радіаційної безпеки" Держатомрегулювання України та НАН України
2016
|
Назва видання: | Ядерна та радіаційна безпека |
Онлайн доступ: | http://dspace.nbuv.gov.ua/handle/123456789/129810 |
Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
Назва журналу: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
Цитувати: | Checking the Integrity of CCTV Footage in Real Time at Nuclear Facilities / I. Bobok, A. Kobozeva, M. Maksymov, O. Maksymova // Ядерна та радіаційна безпека. — 2016. — № 2. — С. 68-72. — Бібліогр.: 11 назв. — англ. |
Репозитарії
Digital Library of Periodicals of National Academy of Sciences of UkraineРезюме: | Video surveillance has become an important constituent part of the integrated security system of nuclear power plants. Due to this, the integrity and authenticity of the video transmitted by the surveillance camera are extremely important, and so is the possibility to identify violations of these categories of information in real time. The authors propose a new method to detect one way of violating the integrity of the video sequence — “camera loop” hijacking. The proposed method based on identifying the perturbation in matrix of the current frame of the original video sequence in transition to the next frame ensures the efficiency of the method that is not dependent on the specifics and characteristics of the analyzed video sequence. The high efficiency of the method is confirmed by results of a computational experiment, under which type I and type II errors were not found. The practical value of the proposed method is the possibility of its work in real time because it is a polynomial of degree 1, as well as the simplicity and multiplatform implementation. |
---|