SlideShare a Scribd company logo
1
Presented By
“EMAIL SYSTEM FOR BLIND USING VOICE & FACE THROUGH AI”
1. Thanage prasad.G. Roll No:4
2. Markad Sakshi.G Roll No:10
3. Kale Komal.S Roll No:15
4. Ghodechor Saloni.K Roll No:40
SECURING CCTV VIDEO
THROUGH BLOCKCHAIN AND
ALERT SYSTEM
AGENDA
 Abstract
 Problem Statement
 Introduction
 Motivation
 Objective
 Literature survey
 Overview Diagram
 Hardware and Software
 References
3
ABSTRACT
4
 Making of false CCTV video by forging it from the
original ones have become more popular nowadays.
 Also, those CCTV video are stored in their respective
offices in a space which is a Centralized Database.
 Also, these offices are subject to natural disasters like
floods, earthquakes, etc. which if attacked by any of these
calamities will lead to the loss of all the CCTV video
recording permanently.
 The blockchain method serves as a solution for safe
storage of the CCTV video in the form of on a blockchain
network.
PROBLEM STATEMENT
5
To secure the process of CCTV video storage using
the distributed blockchain framework and
maintenance using Integrity management through
Bilinear Pairing.
INTRODUCTION
6
 Need of Securing CCTV Video
 Input CCTV Video
 Block Body formation
 Terminal Key generation
 Bilinear Pairing
MOTIVATION
 To effectively manage and secure the CCTV Video
against tampering.
 To incorporate the distributed blockchain
framework to reinforce the security and provide a
tamper-proof storage.
7
OBJECTIVES
 To efficiently understand the CCTV video byte data
conversion
 To efficiently utilize the data to achieve blockchain
formation
 To improve the security of the stored CCTV Video
8
9
LITERATURE SURVEY
Paper Author Methodology
Efficient Model for
Video Integrity
through blockchain
Nikhil Bhusari,
Tejaswini Kshirsagar,
Akash Chandlekar,
Apurva Borude,
Kiran Gaikwad
The methodology for an effective approach for the purpose of
integrity evaluation has been outlined in detail in this research
article. Videos are highly useful and have been an effective
part of everyday human life in the recent years. While most of
the smartphones are effectively equipped with the state-of-
the-art camera sensors that can effectively capture a video,
most of the videos that are captured are in the form of video
surveillance. Videos are so important that they are used as
evidence in the court of law to achieve effective and useful
incrimination against the criminal. Once the frames of the
video are extracted these frames are effectively encrypted
through the use of RSA encryption system.
LITERATURE SURVEY
10
Paper Author Methodology
Secure and Privacy-
Preserving Stored
Surveillance Video Sharing
atop Permissioned
Blockchain
A. Fitwi and Y.
Chen
Security and privacy are very essential issues in
the world of video surveillance. Hence, this paper
proposes SePriS, a private blockchain based
solution coupled with an efficient video frame
enciphering mechanism for sharing stored
surveillance videos in a secure and privacy-aware
way. It illustrates how the blockchain technology
can be leveraged to prevent abuse and leaking of
stored videos, which have plagued the
surveillance practice for years. The experimental
analysis show that the video frame enciphering
mechanism passes the standard computational and
security parameters.
LITERATURE SURVEY
11
Paper Author Methodology
Video Streaming Based on
Blockchain State Channel
with IoT Camera
Min-Hyuk Jeong and
Sang-Kyun Kim
The IoT camera video streaming scenario was
proposed and was imple mented the IoT camera
video streaming system that operates. With
standard ised APIs and smart contracts in
blockchain 2.0, the DApp can access IoT cameras
on the Internet and receive video streaming
services regardless of platform. We examined off-
chain transactions to overcome a low TPS and
support a proper refund mechanism when service
errors occur. By comparing the three off-chain
transaction methods, we selected the state channel
method as the most suitable off-chain transaction
for the IoT camera video streaming system. A new
video streaming system scenario was proposed by
applying the state channel method to the IoT
camera video streaming system.
OVERVIEW DIAGRAM
12
13
Hardware and Software
Minimum Hardware Specification :
( 1 Machines Required of the Following Configurations)
CPU : core i5
RAM : 8 GB
HDD : 500 GB
Software Specification:
Coding Language : Java
Development Kit : JDK 1.8, JRE
Front End : Java Swing
Development IDE : NetBeans 8.2
Data Base : My SQL 5.0
External API : MySQL Connector
REFERENCES
14
[1] Nikhil Bhusari, Tejaswini Kshirsagar, Akash Chandlekar, Apurva Borude, Kiran
Gaikwad, “Efficient Model for Video Integrity through blockchain,” JETIR ,May 2021,
Volume 8, Issue 5, www.jetir.org (ISSN-2349-5162)
[2] A. Fitwi and Y. Chen, "Secure and Privacy-Preserving Stored Surveillance Video
Sharing atop Permissioned Blockchain," 2021 International Conference on Computer
Communications and Networks (ICCCN), Athens, Greece, 2021, pp. 1-8, doi:
10.1109/ICCCN52240.2021.9522199.
[3] Min-Hyuk Jeong and Sang-Kyun Kim , “Video Streaming Based on Blockchain
State Channel with IoT Camera,” Journal of Web Engineering, Vol. 21 3, 661–676. doi:
10.13052/jwe1540-9589.2134

More Related Content

PPTX
Introduction to blockchain_technology
 
PDF
A Thorough Study on Video Integrity using Blockchain
PDF
E-VOTING SYSTEM USING BLOCKCHAIN
PDF
IRJET- Secure Online Voting Systems using Block of Chunks
PPTX
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
PPTX
220943-RSP.pptx
PDF
The Microsoft vision for Blockchain
PPTX
BLOCKCHAIN-ENABLED-INTELLECTUAL-PROPERTY-PROTECTION
Introduction to blockchain_technology
 
A Thorough Study on Video Integrity using Blockchain
E-VOTING SYSTEM USING BLOCKCHAIN
IRJET- Secure Online Voting Systems using Block of Chunks
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
220943-RSP.pptx
The Microsoft vision for Blockchain
BLOCKCHAIN-ENABLED-INTELLECTUAL-PROPERTY-PROTECTION

Similar to human system for basic knoladge and etc.ppt (20)

PDF
IMAGE RETRIVAL BASED ON BLOCK CHAIN IMAGE RETRIVAL BASED ON BLOCK CHAIN.pdf
PDF
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
PDF
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
PDF
Blockchain Security and Privacy
PPTX
Bruno Lowagie (iText) #cfoconferenz
PDF
Blockchain for IoT - Smart Home
PDF
How blockchain will defend iot
PPTX
Safe remote purchase by private smart contract on public blockchain
PPTX
blockchain introduction for computer engineering students
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
IRJET- Secure E-Documents Storage using Blockchain
PDF
Blockchain based electronic voting system
PDF
Blockchains for trusted data and unstoppable code
PPTX
Data Integrity Using Blockchain with case studies
PDF
International Journal of Advance Robotics & Expert Systems (JARES)
PDF
Online Voting System Using Blockchain Technology
PPTX
IoT and Blockchain Challenges and Risks
PDF
Blockchain and Cyber Defense Strategies in new genre times
PDF
Dissertation
PDF
Blockchain technology and internet of things: review, challenge and security...
IMAGE RETRIVAL BASED ON BLOCK CHAIN IMAGE RETRIVAL BASED ON BLOCK CHAIN.pdf
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
Blockchain Security and Privacy
Bruno Lowagie (iText) #cfoconferenz
Blockchain for IoT - Smart Home
How blockchain will defend iot
Safe remote purchase by private smart contract on public blockchain
blockchain introduction for computer engineering students
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Secure E-Documents Storage using Blockchain
Blockchain based electronic voting system
Blockchains for trusted data and unstoppable code
Data Integrity Using Blockchain with case studies
International Journal of Advance Robotics & Expert Systems (JARES)
Online Voting System Using Blockchain Technology
IoT and Blockchain Challenges and Risks
Blockchain and Cyber Defense Strategies in new genre times
Dissertation
Blockchain technology and internet of things: review, challenge and security...
Ad

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
composite construction of structures.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Artificial Intelligence
PPTX
UNIT 4 Total Quality Management .pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Well-logging-methods_new................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Geodesy 1.pptx...............................................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
III.4.1.2_The_Space_Environment.p pdffdf
composite construction of structures.pdf
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Safety Seminar civil to be ensured for safe working.
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Artificial Intelligence
UNIT 4 Total Quality Management .pptx
737-MAX_SRG.pdf student reference guides
Operating System & Kernel Study Guide-1 - converted.pdf
Well-logging-methods_new................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Geodesy 1.pptx...............................................
Ad

human system for basic knoladge and etc.ppt

  • 1. 1 Presented By “EMAIL SYSTEM FOR BLIND USING VOICE & FACE THROUGH AI” 1. Thanage prasad.G. Roll No:4 2. Markad Sakshi.G Roll No:10 3. Kale Komal.S Roll No:15 4. Ghodechor Saloni.K Roll No:40
  • 2. SECURING CCTV VIDEO THROUGH BLOCKCHAIN AND ALERT SYSTEM
  • 3. AGENDA  Abstract  Problem Statement  Introduction  Motivation  Objective  Literature survey  Overview Diagram  Hardware and Software  References 3
  • 4. ABSTRACT 4  Making of false CCTV video by forging it from the original ones have become more popular nowadays.  Also, those CCTV video are stored in their respective offices in a space which is a Centralized Database.  Also, these offices are subject to natural disasters like floods, earthquakes, etc. which if attacked by any of these calamities will lead to the loss of all the CCTV video recording permanently.  The blockchain method serves as a solution for safe storage of the CCTV video in the form of on a blockchain network.
  • 5. PROBLEM STATEMENT 5 To secure the process of CCTV video storage using the distributed blockchain framework and maintenance using Integrity management through Bilinear Pairing.
  • 6. INTRODUCTION 6  Need of Securing CCTV Video  Input CCTV Video  Block Body formation  Terminal Key generation  Bilinear Pairing
  • 7. MOTIVATION  To effectively manage and secure the CCTV Video against tampering.  To incorporate the distributed blockchain framework to reinforce the security and provide a tamper-proof storage. 7
  • 8. OBJECTIVES  To efficiently understand the CCTV video byte data conversion  To efficiently utilize the data to achieve blockchain formation  To improve the security of the stored CCTV Video 8
  • 9. 9 LITERATURE SURVEY Paper Author Methodology Efficient Model for Video Integrity through blockchain Nikhil Bhusari, Tejaswini Kshirsagar, Akash Chandlekar, Apurva Borude, Kiran Gaikwad The methodology for an effective approach for the purpose of integrity evaluation has been outlined in detail in this research article. Videos are highly useful and have been an effective part of everyday human life in the recent years. While most of the smartphones are effectively equipped with the state-of- the-art camera sensors that can effectively capture a video, most of the videos that are captured are in the form of video surveillance. Videos are so important that they are used as evidence in the court of law to achieve effective and useful incrimination against the criminal. Once the frames of the video are extracted these frames are effectively encrypted through the use of RSA encryption system.
  • 10. LITERATURE SURVEY 10 Paper Author Methodology Secure and Privacy- Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain A. Fitwi and Y. Chen Security and privacy are very essential issues in the world of video surveillance. Hence, this paper proposes SePriS, a private blockchain based solution coupled with an efficient video frame enciphering mechanism for sharing stored surveillance videos in a secure and privacy-aware way. It illustrates how the blockchain technology can be leveraged to prevent abuse and leaking of stored videos, which have plagued the surveillance practice for years. The experimental analysis show that the video frame enciphering mechanism passes the standard computational and security parameters.
  • 11. LITERATURE SURVEY 11 Paper Author Methodology Video Streaming Based on Blockchain State Channel with IoT Camera Min-Hyuk Jeong and Sang-Kyun Kim The IoT camera video streaming scenario was proposed and was imple mented the IoT camera video streaming system that operates. With standard ised APIs and smart contracts in blockchain 2.0, the DApp can access IoT cameras on the Internet and receive video streaming services regardless of platform. We examined off- chain transactions to overcome a low TPS and support a proper refund mechanism when service errors occur. By comparing the three off-chain transaction methods, we selected the state channel method as the most suitable off-chain transaction for the IoT camera video streaming system. A new video streaming system scenario was proposed by applying the state channel method to the IoT camera video streaming system.
  • 13. 13 Hardware and Software Minimum Hardware Specification : ( 1 Machines Required of the Following Configurations) CPU : core i5 RAM : 8 GB HDD : 500 GB Software Specification: Coding Language : Java Development Kit : JDK 1.8, JRE Front End : Java Swing Development IDE : NetBeans 8.2 Data Base : My SQL 5.0 External API : MySQL Connector
  • 14. REFERENCES 14 [1] Nikhil Bhusari, Tejaswini Kshirsagar, Akash Chandlekar, Apurva Borude, Kiran Gaikwad, “Efficient Model for Video Integrity through blockchain,” JETIR ,May 2021, Volume 8, Issue 5, www.jetir.org (ISSN-2349-5162) [2] A. Fitwi and Y. Chen, "Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain," 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 2021, pp. 1-8, doi: 10.1109/ICCCN52240.2021.9522199. [3] Min-Hyuk Jeong and Sang-Kyun Kim , “Video Streaming Based on Blockchain State Channel with IoT Camera,” Journal of Web Engineering, Vol. 21 3, 661–676. doi: 10.13052/jwe1540-9589.2134