Broken Integrity Detection of Video Files in Video Event Data Recorders |
Lee, Choongin
(Department of Computer Science and Engineering, Korea University)
Lee, Jehyun (Cyber Security Research Center, Korea Advanced Institute of Science & Technology) Pyo, Youngbin (Department of Computer Science and Engineering, Korea University) Lee, Heejo (Department of Computer Science and Engineering, Korea University) |
1 | M. Kim and K. Kim, "Data Forgery Detection for Vehicle Black Box," in Proc. of IEEE Information and Communication Technology Convergence (ICTC), pp.636-637, October 22-24, 2014. Article (CrossRef Link) |
2 | T. Jayamalar and V. Radha, "Survey on digital video watermarking techniques and attacks on watermarks," International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6963-6967, 2010. |
3 | J. Wang, G. Liu, Z. Zhang, Z. Wang and Y. Dai, "Detection of forgery in digital video based on pattern noise," Journal of Southeast University (Natural Science Edition), no. S2, 2008. |
4 | C. Hsu, T. Hung, C. Lin and C. Hsu, "Video Forgery Detection Using Correlation of Noise," in Proc. of 10th IEEE Workshop,of Multimedia Signal Processing, pp.170-174, October 8-10, 2008. Article (CrossRef Link) |
5 | S. Lee, J. Song, W. Lee, Y. Ko and H. Lee, "Integrity Verification Scheme of Video Contents in Surveillance," IEICE TRANSACTIONS on Information and Systems, vol. 98, no. 1, pp. 95-97, 2015. Article (CrossRef Link) DOI |
6 | Microsoft, AVI RIFF file reference. |
7 | B. Carrier, File System Forensic Analysis, Addison-Wesley Professional, 2005. |
8 | W. Minnaard, "The Linux FAT32 allocator and file creation order reconstruction," Digital Investigation, vol. 11, no. 3, pp. 224-233, 2014. Article (CrossRef Link) DOI |
9 | W. Y. Lee, H. Kwon and H. Lee, "Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11 (4), 224-233]," Digital Investigation, vol. 15, pp. 119-123, 2015. Article (CrossRef Link) DOI |
10 | W. Wang and F. Hany, "Exposing digital forgeries in video by detecting duplication," in Proc. of the ACM 9th workshop on Multimedia & Security, pp.35-42, September 20-21, 2007. Article (CrossRef Link) |
11 | S. Becker, A. Brogi, I. Gorton, S. Overhage, A. Romanovsky and M. Tivoli, Towards an engineering approach to component adaptation, Springer Berlin Heidelberg, 2006. Article (CrossRef Link) |
12 | D. Billard and R. Hauri, "Making sense of unstructured flash-memory dumps," in Proc. of the ACM Symposium on Applied Computing, pp.1579-1583, March 22-26, 2010. Article (CrossRef Link) |
13 | V. L. L. Thing, T. W. Chua and M. L. Cheong, "Design of a digital forensics evidence reconstruction system for complex and obscure fragmented file carving," in Proc. of the 7th International Conference on Computational Intelligence and Security, pp.793-797, December 3-4. 2011. Article (CrossRef Link) |
14 | L. Huston, R. Sukthankar, J. Campbell, and P. Pillai, "Forensic video reconstruction," in Proc. of the ACM 2nd International Workshop on Video Surveillance & Sensor Networks, pp.20-28, October 10-16, 2004. Article (CrossRef Link) |
15 | G. H. Na, K. S. Sim, K. W. Moon, S. G. Kong, E. S. Kim and J. Lee, "Frame-based recovery of corrupted video files using video codec specifications," IEEE Transactions on Image Processing, vol. 23, no. 2, pp. 517-526. 2014. Article (CrossRef Link) DOI |
16 | Fox News, Proposed new federal rule could put 'big brother' in your driver's seat, 2013. |
17 | Grand View Research, North America car DVR market analysis by product (single channel, dual channel) and segment forecasts to 2016, 2008. |
18 | Evening Standard, How car's black box trapped speeding Rich List heir who left baby paralysed in Range Rover crash, 2008. |
19 | M. Kim and M. Rick, Expert: Digital evidence just as important as DNA in solving crimes, 2008. |
20 | R. Poisel and S. Tjoa, "Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art," in Proc. of 6th IEEE International Conference on IT Security Incident Management and IT Forensics (IMF), pp.48-61, May 10-12, 2011. Article (CrossRef Link) |
21 | R. Poisel and S. Tjoa, "Roadmap to approaches for carving of fragmented multimedia file," in Proc. of 6th IEEE International Conference on Availability, Reliability and Security (ARES)., pp.752-757, August 22-26, 2011. Article (CrossRef Link) |
22 | E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press, 2011. |
23 | S. L. Garfinkel and M. McCarrin, "Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb," Digital Investigation, vol. 14, pp. S95-S105, 2015. Article (CrossRef Link) DOI |