Abstract
The network video surveillance system is the latest trend in surveillance technology and has been rapidly surpassing the older analogue cameras used in most surveillance systems nowadays. The network surveillance system is mostly similar to contemporary computer systems such as personal computer, server system, and embedded system. In means, acquiring or recovering video evidence in network surveillance are quite similar to traditional evidence collection techniques in digital forensics and these operations are needed to be considered proving the integrity of evidence. However, a lack of research on evidential video management in network surveillance system is able to damage reliability and admissibility in a court of law. In this paper, we defines forensic artifacts for performing video evidence retrieval in network surveillance systems. The purpose of this work is to provide reliable video evidence collection from each network surveillance systems with admissibility and integrity of evidence.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chung RHY, Chin FYL, Wong KYK, Chow KP, Luo T, Fung HSK (2005) Efficient block-based motion segmentation method using motion vector consistency. In: Proceedings on IAPR conference on machine vision applications, pp 550–553
Kalman RE (1960) A new approach to linear filtering and prediction problems. Trans ASME J Basic Eng 82:35–45
Hwang T, Cho S, Park J, Choi K (2006) Object tracking for a video sequence from a moving vehicle: a multi-modal approach. ETRI J 28(3):367–370
Perrott AJ, Lindsay AT, Parkes AP (2002) Real-time multimedia tagging and content-based retrieval for CCTV surveillance systems. In: Proceeding on SPIE, vol 4862
Brown LM (2008) Color retrieval for video surveillance. In: IEEE international conference on AVSS 2008, pp 283–290
Tian Y, Hampapur A, Brow L, Feris R, Lu M, Senior A (2009) Event detection query and retrieval for video surveillance. In: Artificial intelligence for maximizing content based image retrieval
Montcalm T, Boufama B (2010) Object inter-camera tracking with non-overlapping views: a new dynamic approach. In: Proceedings of the 2010 Canadian conference on computer and robot vision, pp 354–361
Park S, Lim K-S, Han JW (2012) Videos analytic retrieval system for CCTV surveillance. In: LNEE future information technology, application, and service, FutureTech 2012, vol 2
Yuk JS-C, Wong K-Y, Chung RH-Y, Chow KP, Chin FY-L, Tsang KS-HT (2007) Object-based surveillance video retrieval system with real-time indexing methodology. In: International conference on image analysis and recognition (ICIAR), pp 626–637
Lim KS, Choi YS, Kim JS, Lee CH, Lee SJ (2009) CFES: comprehensive framework for forensic analysis of embedded systems. J Int Technol 10(5):523–536
Lim KS, Savold A, Lee CH, Lee SJ (2012) On-the-spot digital investigation by means of LDFS: live data forensic system. Math Comput Model 55:223–240
Lim K-S, Park S, Han JW (2012) EVM: a new methodology for evidential video management in digital CCTV systems. In: LNEE future information technology, application, and service, FutureTech 2012, vol 2
Lee SH, Savoldi A, Lima KS, Park JH, Lee SJ (2010) A proposal for automating investigations in live forensics. Comput Stand Interfaces 32:246–255
Lim KS, Lee CH, Park JH, Lee SJ (2012) Test-driven forensic analysis of satellite automotive navigation systems. J Intell Manuf 25:689–690
Lipton AJ, Clark JI, Brewer P, Venetianer PL, Chosak AJ (2004) Object video forensics: activity-based video indexing and retrieval for physical security applications. In: IEEE IDSE ’04, Feb 2004
Lim KS, Lee CH (2013) A framework for unified digital evidence management in security convergence. Electr Commer Res 13(3):371–398. http://link.springer.com/article/10.1007/s10660-013-9119-y
Acknowledgments
Foundation item: This work was supported by the IT R&D program (10043959, Development of EAL 4 level military fusion security solution for protecting against unauthorized accesses and ensuring a trusted execution environment in mobile devices) of KEIT/MOTIE/MSIP (Ministry of Science, ICT and Future Planning), Korea.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Lim, KS., Kim, JN., Lee, DG. (2015). Forensic Artifacts in Network Surveillance Systems. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_32
Download citation
DOI: https://doi.org/10.1007/978-94-017-9618-7_32
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9617-0
Online ISBN: 978-94-017-9618-7
eBook Packages: EngineeringEngineering (R0)