An Android app to validate whether a video file has been tampered to provide additional safety individuals that store home security video files in the cloud.
This table will list the functional requirements which describes what the application should do.
# |
Requirements |
1 |
The user must interact with the application through a Graphical User Interface (GUI) |
2 |
The application initial loading page shall support the option to login and sign up/register |
3 |
The application shall provide a forgot password feature to recover a forgotten password based on a username |
5 |
The application will integrate with live streaming security cameras which will display the live stream through the app |
6 |
The application shall support the for ability for a user to record a live stream by clicking a button |
7 |
The application shall support adding a digital signature or adding a digital video fingerprint to a video during recording/save |
9 |
The application shall support validating the integrity of a video file to see if it has been altered or manipulated by determining whether the signature/digital fingerprint is still present on the video file. |
11 |
The application must allow the end user to view the stored videos |
13 |
The application must check the validity of the video |
14 |
The application shall support displaying the validation progress on the screen |
15 |
The application shall display 'Valid' or 'Invalid' on the screen after validation has completed for a file. |
16 |
The application shall support removal of video signature/digital fingerprint from a video file if it has been edited |
17 |
The application shall provide a logout button to log the user out of the application |
Table 3.1 Functional Requirement
Use Case |
Sign Up |
Description |
The application will display a screen featuring the ability to perform Sign up |
Steps |
1. Open registration screen. 2. Enter user details 3. create a new user |
Actors |
User and System |
Priority |
Core |
Table 3.2 Use Case Description
Use Case |
Login |
Description |
The application will display a screen featuring the ability to perform login |
Steps |
1. Open login screen. 2. Insert user details 3. Authenticate user |
Actors |
User and System |
Priority |
core |
Table 3.3 Use Case Description
Use Case |
Reset Password |
Description |
The application will provide a reset password feature to recover a forgotten password based on a username and emailing |
Steps |
1. Open login screen. 2. Press forget password button 3. Enter username and email 4. Update password |
Actors |
User and system |
Priority |
Core |
Table 3.4 Use Case Description
Use Case |
Connect with camera |
Description |
The application shall support setup screen to integration with live stream security camera. |
Steps |
1. Enter camera details 2. Authorize connectivity |
Actors |
User and System |
Priority |
Core |
Table 3.5 Use Case Description
Use Case |
View live stream |
Description |
The application shall support the ability for a user to view incoming live stream footage from a security system which will display on the phone back to the user |
Steps |
view incoming live stream |
Actors |
User and system |
Priority |
Core |
Table 3.6 Use Case Description
Use Case |
Record Video with signature |
Description |
The application shall support the ability for a user to record a live stream by clicking a button then adding a digital signature or adding a digital video fingerprint to a video during recording. |
Steps |
1. Record video stream 2. Adding a digital signature or adding a digital video fingerprint 3. Encrypt video 4. Store video |
Actors |
User and System |
Priority |
Core |
Table 3.7 Use Case Description
Use Case |
Store Video |
Description |
The application shall support the ability to integrate to a cloud-based database to upload and store an encrypted video file to the logged in user's cloud storage |
Steps |
1. Save video 2. Store video to cloud-based database |
Actors |
User and system |
Priority |
Core |
Table 3.8 Use Case Description
Use Case |
Validate Video |
Description |
The application shall support validating the integrity of a video file from the user's cloud storage to see if it has been altered or manipulated by determining whether the signature or digital fingerprint is still present on the video file. |
Steps |
1. Retrieve videos 2. Validate video |
Actors |
User and system |
Priority |
Core |
Table 3.9 Use Case Description
In this section, we will explain the Steps of data the flow diagram:
account information database.
The design phase should include a prototyping stage. Prototype is “a preliminary visual mock-up that looks like a real app, and that demonstrates an app’s fundamental design and function, but does not contain working code” (Sara, 2018).
This section shows prototype of user interface design for the proposed application depend on the functions and requirements described in chapter3.
Database design involves a model developed to guide how the data can be stored and organized. The Surveillance Video Validator application has a simple database to store the user account information. The Account table will hold the details for each customer’s account. The fields include a unique Account Id (primary key), Name, Email and Username.
DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma
Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t
Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th
1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of
1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of