Browse > Article
http://dx.doi.org/10.3837/tiis.2016.08.028

Broken Integrity Detection of Video Files in Video Event Data Recorders  

Lee, Choongin (Department of Computer Science and Engineering, Korea University)
Lee, Jehyun (Cyber Security Research Center, Korea Advanced Institute of Science & Technology)
Pyo, Youngbin (Department of Computer Science and Engineering, Korea University)
Lee, Heejo (Department of Computer Science and Engineering, Korea University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.8, 2016 , pp. 3943-3957 More about this Journal
Abstract
As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.
Keywords
Digital Forensics; Multimedia Forensics; Multimedia Security; Computer Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Kim and K. Kim, "Data Forgery Detection for Vehicle Black Box," in Proc. of IEEE Information and Communication Technology Convergence (ICTC), pp.636-637, October 22-24, 2014. Article (CrossRef Link)
2 T. Jayamalar and V. Radha, "Survey on digital video watermarking techniques and attacks on watermarks," International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6963-6967, 2010.
3 J. Wang, G. Liu, Z. Zhang, Z. Wang and Y. Dai, "Detection of forgery in digital video based on pattern noise," Journal of Southeast University (Natural Science Edition), no. S2, 2008.
4 C. Hsu, T. Hung, C. Lin and C. Hsu, "Video Forgery Detection Using Correlation of Noise," in Proc. of 10th IEEE Workshop,of Multimedia Signal Processing, pp.170-174, October 8-10, 2008. Article (CrossRef Link)
5 S. Lee, J. Song, W. Lee, Y. Ko and H. Lee, "Integrity Verification Scheme of Video Contents in Surveillance," IEICE TRANSACTIONS on Information and Systems, vol. 98, no. 1, pp. 95-97, 2015. Article (CrossRef Link)   DOI
6 Microsoft, AVI RIFF file reference.
7 B. Carrier, File System Forensic Analysis, Addison-Wesley Professional, 2005.
8 W. Minnaard, "The Linux FAT32 allocator and file creation order reconstruction," Digital Investigation, vol. 11, no. 3, pp. 224-233, 2014. Article (CrossRef Link)   DOI
9 W. Y. Lee, H. Kwon and H. Lee, "Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11 (4), 224-233]," Digital Investigation, vol. 15, pp. 119-123, 2015. Article (CrossRef Link)   DOI
10 W. Wang and F. Hany, "Exposing digital forgeries in video by detecting duplication," in Proc. of the ACM 9th workshop on Multimedia & Security, pp.35-42, September 20-21, 2007. Article (CrossRef Link)
11 S. Becker, A. Brogi, I. Gorton, S. Overhage, A. Romanovsky and M. Tivoli, Towards an engineering approach to component adaptation, Springer Berlin Heidelberg, 2006. Article (CrossRef Link)
12 D. Billard and R. Hauri, "Making sense of unstructured flash-memory dumps," in Proc. of the ACM Symposium on Applied Computing, pp.1579-1583, March 22-26, 2010. Article (CrossRef Link)
13 V. L. L. Thing, T. W. Chua and M. L. Cheong, "Design of a digital forensics evidence reconstruction system for complex and obscure fragmented file carving," in Proc. of the 7th International Conference on Computational Intelligence and Security, pp.793-797, December 3-4. 2011. Article (CrossRef Link)
14 L. Huston, R. Sukthankar, J. Campbell, and P. Pillai, "Forensic video reconstruction," in Proc. of the ACM 2nd International Workshop on Video Surveillance & Sensor Networks, pp.20-28, October 10-16, 2004. Article (CrossRef Link)
15 G. H. Na, K. S. Sim, K. W. Moon, S. G. Kong, E. S. Kim and J. Lee, "Frame-based recovery of corrupted video files using video codec specifications," IEEE Transactions on Image Processing, vol. 23, no. 2, pp. 517-526. 2014. Article (CrossRef Link)   DOI
16 Fox News, Proposed new federal rule could put 'big brother' in your driver's seat, 2013.
17 Grand View Research, North America car DVR market analysis by product (single channel, dual channel) and segment forecasts to 2016, 2008.
18 Evening Standard, How car's black box trapped speeding Rich List heir who left baby paralysed in Range Rover crash, 2008.
19 M. Kim and M. Rick, Expert: Digital evidence just as important as DNA in solving crimes, 2008.
20 R. Poisel and S. Tjoa, "Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art," in Proc. of 6th IEEE International Conference on IT Security Incident Management and IT Forensics (IMF), pp.48-61, May 10-12, 2011. Article (CrossRef Link)
21 R. Poisel and S. Tjoa, "Roadmap to approaches for carving of fragmented multimedia file," in Proc. of 6th IEEE International Conference on Availability, Reliability and Security (ARES)., pp.752-757, August 22-26, 2011. Article (CrossRef Link)
22 E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press, 2011.
23 S. L. Garfinkel and M. McCarrin, "Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb," Digital Investigation, vol. 14, pp. S95-S105, 2015. Article (CrossRef Link)   DOI