
Verixa: A Secure Blockchain-Based Video Evidence Verification Framework Using Trusted Hardware and Cryptographic Signatures | IJET â Volume 12 Issue 2 | IJET-V12I2P98

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access ⢠Peer Reviewed ⢠High Citation & Impact Factor ⢠ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: Kirthiga B, Narmadha U, Nandhini D, Harishwaran P, Dinesh S
DOI: https://doi.org/{{doi}} ⢠PDF: Download
Abstract
With the rapid advancement of artificial intelligence and video editing technologies, it has become increasingly easy to manipulate digital videos without leaving visible traces. This creates serious challenges in domains such as journalism, legal investigations, surveillance systems, and digital forensics, where video evidence must be trusted. Existing video verification approaches mainly rely on cryptographic signatures and blockchain storage to detect tampering and maintain an immutable record of video data. However, many current systems verify videos only at the file level and may not provide fine-grained detection of frame-level modifications. This paper proposes Verixa, a secure video proofing architecture designed to ensure the authenticity and integrity of digital videos from the moment of capture. In the proposed system, the recorded video is first divided into frames, and each frame is processed as pixel data to generate a cryptographic hash using the SHA-256 algorithm. These frame hashes are then organized into a Merkle tree, producing a single root hash that represents the entire video sequence. The root hash is digitally signed using the Elliptic Curve Digital Signature Algorithm (ECDSA) within secure hardware environments such as Trusted Platform Modules (TPM) or Trusted Execution Environments (TEE). The generated proof, along with metadata such as timestamp and device ID, is stored on a blockchain ledger, while the actual video is stored in cloud storage. During verification, the video is reprocessed to reconstruct the Merkle tree and validate the signature against the blockchain record. If the values match, the video is confirmed as authentic. The proposed approach
Keywords
Video Integrity Verification, Digital Video Authentication, SHA-256 Hashing, Merkle Tree, Elliptic Curve Digital Signature Algorithm (ECDSA),Trusted Platform, Trusted Execution Environment (TEE), Blockchain-based Verification
Conclusion
The authenticity and integrity of digital video evidence have emerged as critical challenges in contemporary surveillance and forensic investigations. Given the rapid advancement of video editing technologies and artificial intelligence-based media manipulation techniques, ensuring the reliability of digital recordings has gained increasing importance. This paper presents Verixa, a secure video integrity verification framework developed to protect digital evidence from tampering and unauthorized modification. The proposed system employs cryptographic hashing to generate unique digital fingerprints for video frames and organizes these hashes through a Merkle-tree structure to facilitate efficient integrity verification. Additionally, secure hardware modules such as Trusted Platform Modules (TPM) or Trusted Execution Environments (TEE) are utilized to safeguard private cryptographic keys and enable trusted digital signatures. The proposed architecture enhances the reliability of video authentication by providing rapid verification, scalable data handling, and robust tamper detection capabilities. The integration of cryptographic security techniques with structured data verification offers a promising solution for ensuring the authenticity and reliability of digital video recordings.
References
[1]L. Lawrence and S. R. Shreelekshmi, âVECDSigL: Video integrity verification using elliptic curve digital signature links,â Software Impacts, vol. 15, p. 100474, 2023.
[2]S. Mercan, M. Cebe, R. A. Aygun, K. Akkaya, and E. Toussaint, âBlockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices,â Marquette University, 2021.
[3]S. M. Darwish, M. M. Abu-Deif, and S. M. Elkafas, âBlockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function,â PLOS ONE, 2024.
[4]H. H. Pajouh, M. A. Rashid, F. Alam, and S. Demidenko, âIoT big data provenance scheme using blockchain on Hadoop ecosystem,â Journal of Big Data, 2021.
[5]Y. Li, X. Yang, P. Sun, H. Qi, and S. Lyu, âCeleb-DF: A large-scale challenging dataset for deepfake forensics,â Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), 2020.
[6]S. Verdoliva, P. Bestagini, M. Tagliasacchi, and S. Tubaro, âFOCAL: A forgery localization framework based on video coding self-consistency,â arXiv preprint arXiv:2008.10454, 2020.
[7]W. A. Mahrous, M. Farouk, and S. M. Darwish, âAn enhanced blockchain-based IoT digital forensics architecture using fuzzy hash,â IEEE Access, vol. 9, pp. 151327â151342, 2021.
[8]S. Blake, âEmbedded blockchains: A synthesis of blockchains, spread spectrum watermarking, perceptual hashing and digital signatures,â arXiv preprint, 2024.
[9]S. L. Madapati and N. H. Pradhan, âDecentralizing video copyright protection: A novel blockchain-enabled framework with performance evaluation,â Frontiers in Artificial Intelligence, 2025.
[10]
T. B. Ogunseyi and O. M. Adeyodo, âCryptographic techniques for data privacy in digital forensics,â IEEE Access, vol. 11, 2023.
[11]J. Ceron, C. Tinupucla, and P. Shiguihara, âA survey of blockchain for video integrity,â Engineering Proceedings, vol. 42, 2023.
[12]A. Heidari, N. J. Navimipour, H. Dag, S. Talebi, and M. Unal, âA novel blockchain-based deepfake detection method using federated and deep learning models,â Cognitive Computation, 2024.
[13]A. Prathap and B. M. Beena, âBlockchain based deep fake detection and verification,â Journal of Electrical Systems, 2025.
[14]A. Rejeb, J. G. Keogh, and H. Treiblmaier, âLeveraging the Internet of Things and blockchain technology in supply chain management,â Future Internet, vol. 11, no. 7, 2019.
D. Danko, S. Mercan, M. Cebe, and K. Akkaya, âAssuring the integrity of videos from wireless-based IoT devices using blockchain,â Proc. IEEE MASS Workshops,2019
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, â{{title}},â International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
