logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

An Android app to validate whether a video file has been tampered to provide additional safety individuals that store home security video files in the cloud.

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Purpose of Application

An Android app to validate whether a video file has been tampered to provide additional safety individuals that store home security video files in the cloud.

Functional Requirement

This table will list the functional requirements which describes what the application should do.

 

 

#

 

Requirements

 

1

 

The user must interact with the application through a Graphical User Interface (GUI)

 

2

 

The application initial loading page shall support the option to login and sign up/register

 

3

 

The application shall provide a forgot password feature to recover a forgotten password based on a username

 

5

The application will integrate with live streaming security cameras which will display the live stream through the app

 

6

 

The application shall support the for ability for a user to record a live stream by clicking a button

 

7

The application shall support adding a digital signature or adding a digital video fingerprint to a video during recording/save

 

9

The application shall support validating the integrity of a video file to see if it has been altered or manipulated by determining whether the signature/digital fingerprint is still present on the video file.

 

11

 

The application must allow the end user to view the stored videos

 

13

 

The application must check the validity of the video

 

14

 

The application shall support displaying the validation progress on the screen

 

15

 

The application shall display 'Valid' or 'Invalid' on the screen after validation has completed for a file.

 

16

 

The application shall support removal of video signature/digital fingerprint from a video file if it has been edited

 

17

 

The application shall provide a logout button to log the user out of the application

 

Table 3.1 Functional Requirement

 

Use Case Descriptions and Scenarios

 

Use Case

Sign Up

Description

The application will display a screen featuring the ability to perform Sign up

Steps

1.      Open registration screen.

2.      Enter user details

3.      create a new user

Actors

User and System

Priority

Core

Table 3.2 Use Case Description

 

 

Use Case

Login

Description

The application will display a screen featuring the ability to perform login

Steps

1.      Open login screen.

2.      Insert user details

3.      Authenticate user

Actors

User and System

Priority

core

Table 3.3 Use Case Description

 

 

 

Use Case

Reset Password

Description

The application will provide a reset password feature to recover a forgotten

password based on a username and emailing

Steps

1.      Open login screen.

2.      Press forget password button

3.      Enter username and email

4.      Update password

Actors

User and system

Priority

Core

Table 3.4 Use Case Description

 

 

 

Use Case

Connect with camera

Description

The application shall support setup screen to integration with live stream

security camera.

Steps

1.      Enter camera details

2.      Authorize connectivity

Actors

User and System

Priority

Core

Table 3.5 Use Case Description

 

 

 

 

Use Case

View live stream

Description

The application shall support the ability for a user to view incoming live

stream footage from a security system which will display on the phone back to the user

Steps

view incoming live stream

Actors

User and system

Priority

Core

Table 3.6 Use Case Description

 

 

 

 

Use Case

Record Video with signature

Description

The application shall support the ability for a user to record a live stream by clicking a button then adding a digital signature or adding a digital video

fingerprint to a video during recording.

Steps

1.      Record video stream

2.      Adding a digital signature or adding a digital video fingerprint

3.      Encrypt video

4.      Store video

Actors

User and System

Priority

Core

Table 3.7 Use Case Description

 

 

 

Use Case

Store Video

Description

The application shall support the ability to integrate to a cloud-based database to upload and store an encrypted video file to the logged in user's

cloud storage

Steps

1.      Save video

2.      Store video to cloud-based database

Actors

User and system

Priority

Core

 

Table 3.8 Use Case Description

 

 

 

 

Use Case

Validate Video

Description

The application shall support validating the integrity of a video file from the user's cloud storage to see if it has been altered or manipulated by determining whether the signature or digital fingerprint is still present on the

video file.

Steps

1.      Retrieve videos

2.      Validate video

Actors

User and system

Priority

Core

Table 3.9 Use Case Description

 

 

 

 

 

In this section, we will explain the Steps of data the flow diagram:

 

 

  1. A user enters user details during the Sign-up process and account details are sent to the

account information database.

  1. A user entered user details during the authenticate user process
  2. A user provides camera details during the connect camera process and the camera details are used in the authorize connectivity process which connect with the Surveillance camera. The Surveillance camera returns authorization results during the authorization process which were performed during the connect camera process and the authorization results are sent back to the
  3. Surveillance camera provides live stream data during the access live stream process which delivers live stream video to the user.
  4. The Surveillance camera provides live stream data during the access live stream process which provides video data during the record video process which also uses the video data during the upload video process delivers live stream video to the user which sends the video file to the video storage database.
  5. The video storage database provides video files during the access video process which are used during the validate video process which returns video validation results to the user.

Interface Design

The design phase should include a prototyping stage. Prototype is “a preliminary visual mock-up that looks like a real app, and that demonstrates an app’s fundamental design and function, but does not contain working code” (Sara, 2018).

This section shows prototype of user interface design for the proposed application depend on the functions and requirements described in chapter3.

Database Design

 

 

Database design involves a model developed to guide how the data can be stored and organized. The Surveillance Video Validator application has a simple database to store the user account information. The Account table will hold the details for each customer’s account. The fields include a unique Account Id (primary key), Name, Email and Username.

(5/5)
Attachments:

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Husnain SaeedComputer science

960 Answers

Hire Me
expert
Atharva PatilComputer science

688 Answers

Hire Me
expert
Chrisantus MakokhaComputer science

620 Answers

Hire Me
expert
AyooluwaEducation

901 Answers

Hire Me

Get Free Quote!

305 Experts Online