Broken Integrity Detection of Video Files in Video Event Data Recorders

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 229
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Choonginko
dc.contributor.authorLee, Jehyunko
dc.contributor.authorPyo, Youngbinko
dc.contributor.authorLee, Heejoko
dc.date.accessioned2017-02-02T01:48:12Z-
dc.date.available2017-02-02T01:48:12Z-
dc.date.created2017-01-16-
dc.date.created2017-01-16-
dc.date.issued2016-08-
dc.identifier.citationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.10, no.8, pp.3943 - 3957-
dc.identifier.issn1976-7277-
dc.identifier.urihttp://hdl.handle.net/10203/220213-
dc.description.abstractAs digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.-
dc.languageEnglish-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.subjectCREATION ORDER RECONSTRUCTION-
dc.subjectLINUX FAT32 ALLOCATOR-
dc.titleBroken Integrity Detection of Video Files in Video Event Data Recorders-
dc.typeArticle-
dc.identifier.wosid000389588700028-
dc.identifier.scopusid2-s2.0-84984868312-
dc.type.rimsART-
dc.citation.volume10-
dc.citation.issue8-
dc.citation.beginningpage3943-
dc.citation.endingpage3957-
dc.citation.publicationnameKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.identifier.doi10.3837/tiis.2016.08.028-
dc.contributor.nonIdAuthorLee, Choongin-
dc.contributor.nonIdAuthorPyo, Youngbin-
dc.contributor.nonIdAuthorLee, Heejo-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorDigital Forensics-
dc.subject.keywordAuthorMultimedia Forensics-
dc.subject.keywordAuthorMultimedia Security-
dc.subject.keywordAuthorComputer Security-
dc.subject.keywordPlusCREATION ORDER RECONSTRUCTION-
dc.subject.keywordPlusLINUX FAT32 ALLOCATOR-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0