Authentication is a prerequisite for the admissibility of video evidence. As discussed in several articles on this website, failure by the tendering party to lead sufficient reliable evidence to prove…
Image Accuracy: Why the Correct Aspect Ratio Matters
Part of the process of authenticating a video image is to show that the image is an accurate depiction of what the camera recorded. One important technical issue bearing upon…
Social Media Images: Authentication Challenges
The widespread use of handheld cameras and the penchant for posting video to social media have created significant evidentiary challenges from an authentication perspective. For example, cameras mounted on motorcycles…
Using Digital Signatures to Authenticate Video Images
Watermarks were discussed in an earlier post as a method of authenticating video images or showing that image alteration has occurred. Watermarks come with limitations. A more commonly used method…
Using Watermarks to Authenticate Video Images
Another method of authenticating video images is to show scientifically that an image has not been altered or conversely that alteration has occurred. One such method has been the use…
Authentication and the Use of Audit Trails
In order for video evidence to be admitted at trial, the tendering party must prove that the images are authentic. There are a number of technical approaches that are available…
Authenticating Monitor Photographs
The proper method of presenting surveillance video evidence at trial is to show all relevant authenticated images that have been exported from the DVR or server. Occasionally, the only evidence…
Date and Time Stamp Accuracy
Date and time stamps are superimposed on video images for the laudatory purpose of indicating the time the events depicted actually occurred. In reality, date and time stamps are often…
Evidence Required to Authenticate Surveillance Video: Part 1
Most serious cases have surveillance video evidence that may prove to be valuable. When I have such a case, my first task is to ascertain how I will authenticate the…
Evidence Required to Authenticate Surveillance Video: Part 2
In an earlier post, I set out the evidence that was required in order to properly authenticate surveillance video, namely evidence about the system that captured the images, exporting and…
You must be logged in to post a comment.