Digital compression of video images is a common occurrence. There are legitimate and laudatory reasons for such compression. Among those reasons are the fact that more data can be stored…
Editing of Images: When Do You Cross the Line?
Related to concerns with authentication, one of the most pervasive suspicions regarding digital image evidence is that the images have been surreptitiously edited in such a manner as to present…
Image Clarification: Not a Bar to Admissibility
One of the most commonly litigated issues regarding digital image evidence is the propriety of and limits to image clarification. Parties who tender clarified images argue that the clarified images…
Expert Witnesses: The Need to Remain Current
Expert witnesses are professionally and ethically obligated to remain current in their field of expertise. Parties who retain experts and the courts that rely upon their testimony are entitled to…
Using Digital Signatures to Authenticate Video Images
Watermarks were discussed in an earlier post as a method of authenticating video images or showing that image alteration has occurred. Watermarks come with limitations. A more commonly used method…
Using Watermarks to Authenticate Video Images
Another method of authenticating video images is to show scientifically that an image has not been altered or conversely that alteration has occurred. One such method has been the use…
Authentication and the Use of Audit Trails
In order for video evidence to be admitted at trial, the tendering party must prove that the images are authentic. There are a number of technical approaches that are available…
Date and Time Stamp Accuracy
Date and time stamps are superimposed on video images for the laudatory purpose of indicating the time the events depicted actually occurred. In reality, date and time stamps are often…
Evidence Required to Authenticate Surveillance Video: Part 1
Most serious cases have surveillance video evidence that may prove to be valuable. When I have such a case, my first task is to ascertain how I will authenticate the…
Evidence Required to Authenticate Surveillance Video: Part 2
In an earlier post, I set out the evidence that was required in order to properly authenticate surveillance video, namely evidence about the system that captured the images, exporting and…
- « Previous Page
- 1
- …
- 5
- 6
- 7
You must be logged in to post a comment.