What follows is a treatise on the use of block chain technology to authenticate
video and pictures to avoid the fake news problem that seems so pervasive of
late. I already published this on LinkedIn, but would like your thoughts on it
to flesh it out further. Who knows, even publish a full paper on it and really
become a published citizen researcher. :)
***
How to determine if a video or picture is real or fake?
The question seems simple enough, doesn't it? However, with today's
advancing computer technology in image manipulation, you can no longer be
absolutely sure that the photo you are viewing, or the video being broadcast is
the "real McCoy". There have already been examples, courtesy of the Russian
Internet Research Agency, of video that appears real, yet has been entirely
faked. This is called False Evidence Appearing real and it can be a real
problem when trying to sort out real documented events from those which have
been faked. So, how do you certify that a picture or video is real and
unaltered? The answer is a recent technological advancement called "Block
Chain".
What is Block Chain?
Block Chain technology is an outgrowth of cryptographic hashing in
combination with cryptocurrencies. It is a method by which you can certify and
reference a given event as real using the P.O.W. of the block chain itself.
P.O.W. refers to the Proof of Work crypt-graphic hash function used to certify
that a particular job was completed using a specific set of rules and other
criterian. This model is used in cryptocurrencies to certify, by consensus,
that a given chain of crypto hashes was done correctly and completed before
anyone else did the same function.
OK, So how does this relate to using block chain to certify video or picture
images as real?
Lately, there has been a number of incidents where the press (or some
third party) has tried to claim that a given video (or picture) has been
altered or is not as presented. This has created a situation where you cannot
always take the evidence of your eyes and ears at face value. This is the
problem of perception being reality, and as we all know, perception can be
altered in a myriad of ways to make reality appear different than it really is.
How do we overcome this conundrum? We use the concept of block chain to certify
that a picture or video has been unaltered by taking a digest of information
found in the picture, combined with external references (such as GPS, local
clock, etc) and create a cryptographic block that represents the picture (or
each frame of a video). With video, this would also include the sound track.
Once done, the block chain would then be embedded within the picture or video
in question as an integrated data stream that can be read by an external
program. This program would take the exif data from the picture (or video) and
use that to decrypt and certify the picture (or video or frame therein) by
comparing the decrypted output to the exif data along with the digest of the
image(s) involved. Of necessity, this would be both computationally complex and
intensive, but the result would be a certified image (or set of images).
How to implement this in a real world scenario.
implementation is rather simple from a layman's point of view. The
entire process would be hidden from the end user. The imaging device would have
2 additional components installed and running in background. The first is a gps
receiver that provides location index data as well as a certified time code.
The second device would be an ASIC (Application Specific integrated circuit
that would handle hashing the images and generating the block chain. The
second item in this case has yet to be incorporated into the latest smart
electronics, but given the need for certification of video or images as real,
the justification of it being installed is clear enough.
Implementation
Now, part of this has already been implemented. The use of GPS for
location services is built into just about every modern imaging device on the
market these days (except for the "low end cheap stuff"). This means that some
of the data is already setup to be used. Now, until ASIC's are actually
installed in hardware, a handoff to an external device can be implemented in
the cloud. That device would read the image and the exif data included (GPS
location, time, image size, color bit range, brightness, etc.) and generate a
block chain of that image based on those criteria. There are several methods
that can be used depending on the level of certification one chooses to use.
Level 1 certification would involve a simple direct sample of the image
(or video stream) reading the exif data and calculating a block chain based on
image size, number of pixels, color bit range, brightness and a random sample
of pixels in the entire image (or image frame of a video) combined with the
time code and GPS coordinates to create a simple block chain. This would
minimally certify the image as unaltered in any way and would also be the
fastest method.
The second level of certification would involve the fast method of
level 1, but would break the image (or image frame of a stream) into sectors
and create a block chain of each sector. This would be a sub chain to the
primary chain built for the image itself (level 1) It would, by necessity,
include more data (including line count, number of pixels per sector, etc.) and
could be used to compute the equivalent of a level 1 chain, but vastly more
detailed.
Level three would involve doing a line by line hashing of the pixels in
the image, using the number of pixels in each line, number of color or
brightness changes, bit rate of the image itself and then combine with the GPS
and timing info to create a block, each line would be it's own block and would
be used to compute a complete chain of the image (or audio/video streaming
frame). This method would be the most computationally intensive and complex,
but the level of certification would mean that it could be verified as
authentic under rules of evidence in a court of law or when used in a news item
to certify that the data stream was shot on location or is otherwise authentic
in content.
A nice additional feature of this set of methods, especially in a video stream,
it can be used to reference specific areas of the stream (much like a built in
time code was being used on old video formats for over the air transmission)
Also, because each "Frame" in the stream has it's own block chain, a single
frame or series of frames can be used independent of the others or as a single
stream/picture in multimedia content (such as presentations). Since the data,
itself would not be visible to the end user (unless a program designed to read
it were used, or that feature were included in the multimedia playback
program), the user wouldn't be concerned too much. As
Security and authenticity
a security model, there are benefits that become immediately apparent.
The first of these is determining if the stream or frame had been altered. This
could be done by computing a new block chain from the existing video/audio or
picture content and comparing it to the existing. Any differences would result
in a failure and even show where the alterations took place. For evidence
certification, this would be a definite requirement to insure authenticity in
chain of custody. This very same block chain could also be used to encrypt the
data stream (audio/video or picture frame) for secure storage, or also allow
recovery should the data be otherwise corrupted. Something like this is already
in use today in the guise of bittorrent. The function is similar in that the
original file is hashed, broken into chunks, transmitted and then reassembled
using a provided key. Only block chain would take this a step further and allow
certification of the data as well. I must point out that the differences
between torrent and block chain make a 1 to 1 comparison irrelevant and is only
used to show simple comparative use.
In conclusion
Block chain shows promise as a method to authenticate, in real time,
events being recorded in audio/video or as pictures at a given time and
location. It also shows promise as a method for preserving evidence and chain
of custody where multimedia content might be used in a court of law or during
an investigation leading up to a court proceeding. Block chain Also shows
promise as a protection and recovery mechanism that could be used concurrent to
other methods for data preservation and recovery. In short, this technology has
a wide range of uses that has not yet been explored and shows promise in being
used in everyday life. This technology would effectively remove the conundrum
of flawed perception being made reality and would effectively nullify some
elements of propaganda currently in use.
---------------------------------------------------
PLUG-discuss mailing list - [email protected]
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss