US20180373894A1 - Digital forensic image verification system - Google Patents
Digital forensic image verification system Download PDFInfo
- Publication number
- US20180373894A1 US20180373894A1 US16/062,523 US201616062523A US2018373894A1 US 20180373894 A1 US20180373894 A1 US 20180373894A1 US 201616062523 A US201616062523 A US 201616062523A US 2018373894 A1 US2018373894 A1 US 2018373894A1
- Authority
- US
- United States
- Prior art keywords
- hash value
- image
- verification system
- generate
- images
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G06K9/00926—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/765—Interface circuits between an apparatus for recording and another apparatus
- H04N5/77—Interface circuits between an apparatus for recording and another apparatus between a recording apparatus and a television camera
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G06K2009/00946—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/155—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands use of biometric patterns for forensic purposes
Definitions
- the present disclosure relates to a digital forensic image verification system, and more particularly, to a digital forensic image verification system in which an imaging device which captures an image generates a first hash value and transmits it to an image storage device, and the image storage device generates a second hash value and verifies whether the image has been forged or altered by comparing the first hash value and the second hash value with each other.
- Digital forensics is a branch of security service which is used to verify a fact occurring, based on digital materials stored in a digital medium such as a computer, and is related to collecting and analyzing scientific evidence used in a criminal investigation.
- forgery/alteration verification can be verified but is not performed between an imaging device and an image storage device.
- Korean Patent No. 10-0826266 discloses an electronic document management system for providing authenticity and integrity and a method of managing the same.
- the electronic document management system includes a scan station configured to convert a paper document into an image and convert the image into a submission information package so as to maintain authenticity, integrity, and reliability of the image, a transmission means configured to apply a security protocol to the submission information package from the scan station and transmit the submission information package to an electronic document management server, and the electronic document management server configured to verify the submission information package, convert the verified submission information package into an archival information package, store the archival information package, and produces a distribution information package by applying distribution meta data and a security package to electronic information when a user searches for the electronic device and wants to view the electronic information.
- the prior art described above relates to authenticity and integrity but does not relate to authenticity and integrity verified between an imaging device and an image storage device.
- the present disclosure is directed to verifying whether an image has been forged or altered by generating a first hash value by an imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- the present disclosure is also directed to greatly decreasing load applied in generating a first hash value by an imaging device, when whether an image has been forged or altered is verified by generating the first hash value by the imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- the present disclosure is also directed to greatly decreasing load applied in generating a second hash value by an image storage device, when whether an image has been forged or altered is verified by generating a first hash value by an imaging device, generating the second hash value by the image storage device, and determining whether the first hash value and the second hash value are the same.
- the present disclosure is also directed to obtaining an image having the same authenticity as an original image by verifying whether the image has been forged or altered by generating a first hash value by an imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- a digital forensic image verification system includes an imaging device having a imaging unit configured to produce an image, a first hash value generator configured to generate a first hash value for the image, and a transmitting unit configured to transmit the image and the first hash value; and an image storage device having a receiving unit configured to receive the image and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for the image, and a controller configured to compare the first hash value and the second hash value with each other.
- the imaging device may further include a muxing unit configured to mux the first hash value and the image corresponding to the first hash value.
- the transmitting unit of the imaging device may be configured to transmit the image and the first hash value muxed by the muxing unit.
- the receiving unit of the image storage device may be configured to receive the image and the first hash value muxed by the imaging device.
- the image storage device may further include a demuxing unit configured to demux the muxed image and first hash value.
- the image storage device may further include a storage unit configured to divide and store the demuxed image and first hash value.
- the second hash value generator of the image storage device may be included in the controller.
- a digital forensic image verification system includes an imaging device having a imaging unit configured to produce an image, a first hash value generator configured to generate a first hash value for a part of the image produced by the imaging unit, and a transmitting unit configured to transmit the image and the first hash value; and an image storage device having a receiving unit configured the image and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for the image, and a controller configured to compare the first hash value and the second hash value with each other.
- the first hash value generator may be configured to generate the first hash value for some of frames consisting of the image produced by the imaging unit.
- the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames arranged at intervals of a certain order among frames arranged in a sequential order to form the image.
- the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames arranged at certain time intervals among frames arranged in a sequential order to form the image.
- the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames corresponding to intervals of a certain data size among frames arranged in a sequential order to form the image.
- the first hash value generator may be configured to generate the first hash value for some regions of the image produced by the imaging unit.
- the first hash value generator may be configured to generate the first hash value in units of images produced by the imaging unit.
- a digital forensic image verification system includes an imaging device having a imaging unit configured to generate images, a first hash value generator configured to generate a first hash value for the images, and a transmitting unit configured to transmit the images and the first hash value; and an image storage device having a receiving unit configured to receive the images and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for some of the images received by the receiving unit, and a controller configured to compare the first hash value and the second hash value with each other.
- the second hash value generator may be configured to generate the second hash value for some images backed up among the images received by the receiving unit.
- the first hash value generator may be configured to generate the first hash value for some of the images produced by the imaging unit, and the second hash value generator may be configured to generate the second hash value for the images for which the first hash value is generated among the images produced by the receiving unit.
- the second hash value generator may be configured to generate the second hash value for images requested to be transmitted to the outside among the images received by the receiving unit.
- a digital forensic image verification system includes an imaging device configured to generate an image; a first hash value generation device configured to generate a first hash value for the image received from the imaging device; and an image storage device having a receiving unit configured to receive the image and the first hash value from the first hash value generation device; a second hash value generator configured to generate a second hash value for the image; and a controller configured to compare the first hash value and the second hash value with each other.
- a digital forensic image verification system includes an imaging device having a imaging unit configured to generate an image, a first hash value generator configured to generate a first hash value for the image, and a transmitting unit configured to transmit the image and the first hash value; a second hash value generation device configured to generate a second hash value for the image received from the imaging device; and an image storage device having a receiving unit configured to receive the image and the first hash value from the imaging device, and receive the second hash value from the second hash value generation device; and a controller configured to compare the first hash value and the second hash value with each other.
- whether an image received by an image storage device has been forged or altered may be verified using a first hash value for the image generated by an imaging device and a second hash value for the image generated by the image storage device.
- a load applied in generating a first hash value by an imaging device may be greatly decreased, when whether an image received by an image storage device has been forged or altered is verified using the first hash value for the image generated by the imaging device and a second hash value for the image generated by the image storage device.
- a load applied in generating a second hash value by an image storage device may be greatly decreased, when whether an image received by the image storage device has been forged or altered is verified using a first hash value for the image generated by an imaging device and the second hash value for the image generated by the image storage device.
- an image having the same authenticity as an original image may be obtained by verifying whether an image received by an image storage device has been forged or altered by using a first hash value for the image generated by an imaging device and a second hash value for the image generated by the image storage device.
- FIG. 1 is a block diagram of a digital forensic image verification system according to an embodiment of the present disclosure.
- FIG. 2 is a detailed block diagram of a digital forensic image verification system according to an embodiment of the present disclosure.
- FIG. 3 is a diagram illustrating generating a first hash value according to an embodiment of the present disclosure.
- FIG. 4 is a diagram illustrating performing muxing according to an embodiment of the present disclosure.
- FIG. 5 is a diagram illustrating performing demuxing according to an embodiment of the present disclosure.
- FIG. 6 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure.
- FIG. 7 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure.
- FIG. 8 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure.
- FIG. 1 is a block diagram of a digital forensic image verification system according to an embodiment of the present disclosure.
- the digital forensic image verification system includes an imaging device 100 and an image storage device 200 .
- the imaging device 100 includes an imaging unit 110 , a first hash value generator 120 , a muxing unit 130 , and a transmitting unit 140 as illustrated in FIG. 2 .
- the imaging unit 110 of the imaging device 100 produces sound and an image.
- the first hash value generator 120 of the imaging device 100 generates a first hash value for the sound and the image at intervals of a certain time.
- the first hash value generator 120 may generate a 1-1 hash value from 12:01:00 to 12:01:01, a 1-2 hash value from 12:01:01 to 12:01:02, and a 1-3 hash value from 12:01:02 to 12:01:03.
- the 1-1 hash value is generated by combining different hash values for the frames at the intervals of the certain time to prove authenticity.
- the 1-2 and 1-3 hash values are generated according to the same concept as the 1-1 hash value.
- the muxing unit 130 of the imaging device 100 muxes the different first hash values generated at the intervals of the certain time and sound and images corresponding to the intervals of the certain time.
- the muxing unit 130 may mux first sound, a first image, and the 1-1 hash value generated from 12:01:00 to 12:01:01, mux second sound, a second image, and the 1-2 hash value generated from 12:01:01 to 12:01:02, and mux third sound, a third image, and the 1-3 hash value generated from 12:01:02 to 12:01:03.
- the transmitting unit 140 of the imaging device 100 transmits the muxed sound, images, and first hash values.
- the transmitting unit 140 transmits the first, second, and third data muxed as illustrated in FIG. 4 to the image storage device 200 .
- the first, second, and third data are illustrated separately in FIG. 4 but are continuously transmitted.
- the image storage device 200 may include a receiving unit 210 , a demuxing unit 220 , a storage unit 230 , a second hash value generator 240 , and a controller 250 .
- the receiving unit 210 of the image storage device 200 receives the muxed sound, images, and first hash values.
- the receiving unit 210 receives the muxed the first, second, and third data as illustrated in FIG. 4 .
- the demuxing unit 220 of the image storage device 200 demuxes the received sound, images, and first hash values.
- the storage unit 230 of the image storage device 200 divides and stores the demuxed sound, images, and first hash values.
- the storage unit 230 divides and stores the demuxed sound, images, and first hash values such that the sound and images are provided when they are backed up and each of the first hash value is compared with a generated second hash value when each of the first hash values is backed up.
- the second hash value generator 240 of the image storage device 200 generates second hash values for the sound and images stored in the storage unit 230 at intervals of the certain time when the stored sound and images are backed up.
- the second hash value generator 240 when the imaging device 100 generates 1-1, 1-2, and 1-3 hash values for sound and images from 12:01:00 to 12:01:03 as illustrated in FIG. 3 , the second hash value generator 240 generates 2-1, 2-2, and 2-3 hash values for demuxed sound and images from 12:01:00 to 12:01:03 as illustrated in FIG. 5 .
- the 2-1 hash value is generated at the same time as the 1-1 hash value is generated
- the 2-2 hash value is generated at the same time as the 1-2 hash value is generated
- the 2-3 hash value is generated at the same time as the 1-3 hash value is generated.
- the 2-1 hash value is generated by combining different hash values for frames to prove authenticity, since different hash values are generated for sound and images stored in the storage unit 230 from 12:01:00 to 12:01:01.
- the 2-2 and 2-3 hash values are generated according to the same concept as the 2-1 hash value.
- the second hash value generator 240 generates different second hash values for the demuxed sound and images at intervals of a certain time to be compared with the first hash values generated for the sound and images by the imaging device 100 at the same intervals of the certain time.
- the controller 250 of the image storage device 200 compares the stored different first hash values and the generated different second hash values with each other at the same intervals of the certain time when backup is performed.
- the controller 250 may determine that the sound and the images have been forged or altered due to an external intrusion, since it is proved that there is no change in the hash values from 12:01:00 to 12:01:01 and from 12:01:02 to 12:01:03 and thus they are the same but there is a change in the hash values from 12:01:01 to 12:01:02.
- authenticity may be verified using hash values and the hash values may be compared only when backup is performed by the image storage device 200 , thereby improving the CPU performance of the image storage device 200 .
- the first hash value generator 120 of the imaging device 100 may provide the data regarding the place when backup is performed by the image storage device 200 .
- the data regarding the place is generated by the first hash value generator 120 in connection with a positioning module, such as a global positioning system (GPS) or an Internet protocol (IP) and is stored in the image storage device 200 , the data regarding the place is stored in another storage device to verify authenticity when backup is performed.
- a positioning module such as a global positioning system (GPS) or an Internet protocol (IP)
- the imaging device 100 is installed in a place appropriate for a purpose to capture sound and an image, and data regarding the place is generated by the first hash value generator 120 and transmitted to the image storage device 200 to prevent sound and an image captured by the imaging device 100 from being captured by another imaging device by zooming and illegally used.
- the identification number data may be provided when backup is performed by the image storage device 200 .
- the identification number data is generated by the first hash value generator 120 such that a user may identify whether the imaging device 100 is authorized and is stored in the image storage device 200 , the identification number data is stored in another storage device to verify authenticity when backup is performed.
- the identification number data of the authorized imaging device 100 is generated by the first hash value generator 120 and is transmitted to the image storage device 200 .
- the installation purpose attribute data may be provided when backup is performed by the image storage device 200 .
- the installation purpose attribute data is generated by the first hash value generator 120 according to a purpose of installation, e.g., a security purpose, a parking surveillance purpose, a fly-tipping prevention purpose, a children protection zone surveillance purpose, etc., and is stored in the image storage device 200 , the installation purpose attribute data is stored in another storage device to verify authenticity of the purpose of installation when backup is performed.
- a purpose of installation e.g., a security purpose, a parking surveillance purpose, a fly-tipping prevention purpose, a children protection zone surveillance purpose, etc.
- the first hash value generator 120 of the imaging device 100 generates time data managed by the imaging device 100 and imaging device attribute data including a manufacturer name, a model name, a serial number, an installation purpose, a MAC address, and an IP address
- the time data and the imaging device attribute data may be provided when backup is performed by the image storage device 200 .
- the time data and the imaging device attribute data include information regarding a time zone of the imaging device 100 which is being operated and attributes of the imaging device 100 , i.e., the manufacturer name, the model name, the serial number, the installation purpose, the MAC address, and the IP address, and are provided during performing of backup, so that sound or an image obtained or fabricated by an unauthorized imaging device may be prevented from being used as evidence, thereby verifying that an image produced by the imaging device 100 is available as evidence according to forensic requirements.
- attributes of the imaging device 100 i.e., the manufacturer name, the model name, the serial number, the installation purpose, the MAC address, and the IP address
- the image storage device 200 may be configured such that the second hash value generator 240 is included in the controller 250 .
- the hash value generator 240 generates a second hash value only when backup is performed and thus the controller 250 may generate the second hash value and directly compare it with the first hash value in a software manner.
- sound and an image generated by the imaging device 100 may be verified to be originals even when the sound and the image are stored in the image storage device 200 and partially backed up in another storage device.
- the digital forensic image verification system includes an imaging device 300 and an image storage device 400 .
- the imaging device 300 includes an imaging unit 310 , a first hash value generator 320 , and a transmitting unit 340 .
- the imaging unit 310 produces an image. However, embodiments are not limited thereto and the imaging unit 310 may produce sound together with the image.
- the first hash value generator 320 generates a first hash value for a part of the image produced by the imaging unit 310 .
- load applied to the first hash value generator 320 may be more reduced than when a first hash value for the entire image produced by the imaging unit 310 is generated.
- the first hash value generator 320 may generate a first hash value for some frames among a number of frames consisting of the image produced by the imaging unit 310 .
- the frames for which the first hash value is generated by the first hash value generator 320 among the large number of frames consisting of the image produced by the imaging unit 310 may include frames arranged at intervals of a certain order, e.g., a first frame, a twenty-fifth frame, and a forty-ninth frame, or frames arranged at certain time intervals, e.g., at intervals of one second, one minute, or ten minutes, among frames arranged in a sequential order to form the image.
- the frames for which the first hash value is generated by the first hash value generator 320 among the large number of frames consisting of the image produced by the imaging unit 310 may include frames corresponding to intervals of a certain data size, e.g., 10 KB, 100 KB or 1 GB, among the frames arranged in the sequential order to form the image.
- a certain data size e.g. 10 KB, 100 KB or 1 GB
- the first hash value generator 320 may generate a first hash value for some regions, e.g., front and rear regions, of the image produced by the imaging unit 310 .
- the first hash value generator 320 may generate a first hash value in units of the images produced by the imaging unit 310 as individual image data files.
- the transmitting unit 340 transmits the image and the first hash value.
- the image storage device 400 includes a receiving unit 410 , a second hash value generator 420 , and a controller 440 .
- the receiving unit 410 receives the image and the first hash value from the imaging device 300 .
- the second hash value generator 420 generates a second hash value for the image received by the receiving unit 410 .
- the controller 440 compares the first hash value and the second hash value with each other. Thus, the controller 440 may determine whether the first hash value and the second hash value are the same to determine whether the image received by the receiving unit 410 has been forged or altered.
- a digital forensic image verification system is differentiated from the digital forensic image verification system according to the second embodiment, in terms of a first hash value generator and a second hash value generator.
- the present embodiment will be described with reference to FIG. 6 .
- the first hash value generator and the second hash value generator are assigned the same reference numerals as those according to the second embodiment.
- the digital forensic image verification system includes an imaging device 300 and an image storage device 400 .
- the imaging device 300 includes an imaging unit 310 , a first hash value generator 320 , and a transmitting unit 340 .
- the image storage device 400 includes a receiving unit 410 , a second hash value generator 420 , and a controller 440 .
- the imaging unit 310 produces an image. However, embodiments are not limited thereto and the imaging unit 310 may produce sound together with the image.
- the first hash value generator 320 generates a first hash value for the image produced by the imaging unit 310 .
- the transmitting unit 340 transmits the image and the first hash value.
- the image storage device 400 includes the receiving unit 410 , the second hash value generator 420 , and a controller 440 .
- the receiving unit 410 receives the image and the first hash value from the imaging device 300 .
- the second hash value generator 420 generates a second hash value for some of images received by the receiving unit 410 .
- load applied to the second hash value generator 420 may be more reduced than when a second hash value for all the images received by the receiving unit is generated.
- the second hash value generator 420 may generate a second hash value for some of the images received by the receiving unit 410 in various ways. For example, the second hash value generator 420 may generate a second hash value for images backed up among the images received by the receiving unit 410 . When the first hash value generator 320 generates a first hash value for some of images produced by the imaging unit 310 , the second hash value generator 420 may generate a second hash value for the images for which the first hash value is generated among the images received by the receiving unit 410 . Furthermore, the second hash value generator 420 may generate a second hash value for images requested to be transmitted to the outside among the images received by the receiving unit 410 .
- the controller 440 compares the first hash value and the second hash value to each other. Thus, the controller 440 may determine whether the first hash value and the second hash value are the same to determine whether the images received by the receiving unit 410 have been forged or altered.
- a digital forensic image verification system includes an imaging device 500 and an image storage device 600 , and further includes a first hash value generation device 520 configured to generate a first hash value.
- the imaging device 500 includes an imaging unit 510 configured to produce an image, and a transmitting unit 540 configured to transmit the image and the first hash value received from the first hash value generation device 520 .
- the first hash value generation device 520 receives the image from the imaging device 500 which generates the image, generates a first hash value for the received image, and transmits the first hash value to the transmitting unit 540 of the imaging device 500 .
- load to be applied to the imaging device 500 when the first hash value is generated may be completely removed, compared to when the imaging device 500 generates a first hash value for the image produced by the imaging device 500 .
- the image storage device 600 includes a receiving unit 610 configured to receive the image and the first hash value from the first hash value generation device 520 , a second hash value generator 620 configured to generate a second hash value for the image, and a controller 640 configured to compare the first hash value and the second hash value with each other, and is substantially the same as the digital forensic image verification system according to the second embodiment.
- a fifth embodiment will be described with reference to FIG. 8 .
- a digital forensic image verification system includes an imaging device 700 and an image storage device 800 , and further includes a second hash value generation device 820 configured to generate a second hash value.
- the imaging device 700 includes an imaging unit 710 configured to produce an image, a first hash value generator 720 configured to generate a first hash value for the image, and a transmitting unit 740 configured to transmit the image and the first hash value, and is substantially the same as the digital forensic image verification system according to the second embodiment.
- the second hash value generation device 820 generates a second hash value for the image received from the imaging device 700 and transmits the second hash value to the image storage device 800 .
- load to be applied to the image storage device 800 when the second hash value is generated may be completely removed, compared to when the second hash value is generated by the image storage device 800 .
- the image storage device 800 includes a receiving unit 810 configured to receive the image and the first hash value from the imaging device 700 and receive the second hash value from the second hash value generation device 820 , and a controller 840 configured to compare the first hash value and the second hash value with each other.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
- Studio Devices (AREA)
Abstract
Description
- The present disclosure relates to a digital forensic image verification system, and more particularly, to a digital forensic image verification system in which an imaging device which captures an image generates a first hash value and transmits it to an image storage device, and the image storage device generates a second hash value and verifies whether the image has been forged or altered by comparing the first hash value and the second hash value with each other.
- Digital forensics is a branch of security service which is used to verify a fact occurring, based on digital materials stored in a digital medium such as a computer, and is related to collecting and analyzing scientific evidence used in a criminal investigation.
- As described above, in digital forensics, evidence cannot be used when it is not objectively proved that the evidence has not been forged or altered in collecting and analyzing the evidence. Thus, techniques for verifying that an evidence material is a clear image evidence material have been developed.
- In the past time, forgery/alteration verification is performed such that an imaging device simply provides sound and images to an image storage device and a system collects the sound and the images from the image storage device and verifies whether the sound and the images have been forged or altered. Thus, it is difficult to verify the authenticity of the sound and the images during the transfer of the sound and the images from the image storage device to the system.
- Furthermore, there is no digital forensic technology whereby authenticity is provided to verify forgery/alteration and conduct a backup using hash values by an imaging device and an image storage device.
- As the prior art related to forgery/alteration, in Korean Patent No. 10-0794890 disclosing an information processing method, a forgery/alteration verification method and apparatus, and a storage medium therefor, an obtaining means for obtaining, from an external device, secret data obtained by performing an arithmetic operation on device unique information and a secret key or seed information which is secretly managed in the external device, a retention means for obtaining key data on the basis of the secret data obtained from the obtaining means and secretly retaining the key data, a generation means for generating authentication data on the basis of data to be protected and the key data retained in the retention means, and a provision means for providing the device unique information and the authentication data, together with the data to be protected are provided as information processing devices for providing data including information for detecting forgery/alteration.
- As described above, according to the prior art, forgery/alteration verification can be verified but is not performed between an imaging device and an image storage device.
- As the prior art related to authenticity and integrity, Korean Patent No. 10-0826266 discloses an electronic document management system for providing authenticity and integrity and a method of managing the same. The electronic document management system includes a scan station configured to convert a paper document into an image and convert the image into a submission information package so as to maintain authenticity, integrity, and reliability of the image, a transmission means configured to apply a security protocol to the submission information package from the scan station and transmit the submission information package to an electronic document management server, and the electronic document management server configured to verify the submission information package, convert the verified submission information package into an archival information package, store the archival information package, and produces a distribution information package by applying distribution meta data and a security package to electronic information when a user searches for the electronic device and wants to view the electronic information.
- The prior art described above relates to authenticity and integrity but does not relate to authenticity and integrity verified between an imaging device and an image storage device.
- To address the aforementioned problems, the present disclosure is directed to verifying whether an image has been forged or altered by generating a first hash value by an imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- The present disclosure is also directed to greatly decreasing load applied in generating a first hash value by an imaging device, when whether an image has been forged or altered is verified by generating the first hash value by the imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- The present disclosure is also directed to greatly decreasing load applied in generating a second hash value by an image storage device, when whether an image has been forged or altered is verified by generating a first hash value by an imaging device, generating the second hash value by the image storage device, and determining whether the first hash value and the second hash value are the same.
- The present disclosure is also directed to obtaining an image having the same authenticity as an original image by verifying whether the image has been forged or altered by generating a first hash value by an imaging device, generating a second hash value by an image storage device, and determining whether the first hash value and the second hash value are the same.
- According to an embodiment of the present disclosure, a digital forensic image verification system includes an imaging device having a imaging unit configured to produce an image, a first hash value generator configured to generate a first hash value for the image, and a transmitting unit configured to transmit the image and the first hash value; and an image storage device having a receiving unit configured to receive the image and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for the image, and a controller configured to compare the first hash value and the second hash value with each other.
- In one embodiment, the imaging device may further include a muxing unit configured to mux the first hash value and the image corresponding to the first hash value.
- In one embodiment, the transmitting unit of the imaging device may be configured to transmit the image and the first hash value muxed by the muxing unit.
- In one embodiment, the receiving unit of the image storage device may be configured to receive the image and the first hash value muxed by the imaging device.
- In one embodiment, the image storage device may further include a demuxing unit configured to demux the muxed image and first hash value.
- In one embodiment, the image storage device may further include a storage unit configured to divide and store the demuxed image and first hash value.
- In one embodiment, the second hash value generator of the image storage device may be included in the controller.
- According to another embodiment of the present disclosure, a digital forensic image verification system includes an imaging device having a imaging unit configured to produce an image, a first hash value generator configured to generate a first hash value for a part of the image produced by the imaging unit, and a transmitting unit configured to transmit the image and the first hash value; and an image storage device having a receiving unit configured the image and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for the image, and a controller configured to compare the first hash value and the second hash value with each other.
- In one embodiment, the first hash value generator may be configured to generate the first hash value for some of frames consisting of the image produced by the imaging unit.
- In one embodiment, the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames arranged at intervals of a certain order among frames arranged in a sequential order to form the image.
- In one embodiment, the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames arranged at certain time intervals among frames arranged in a sequential order to form the image.
- In one embodiment, the frames for which the first hash value is generated among the frames consisting of the image produced by the imaging unit may include frames corresponding to intervals of a certain data size among frames arranged in a sequential order to form the image.
- In one embodiment, the first hash value generator may be configured to generate the first hash value for some regions of the image produced by the imaging unit.
- In one embodiment, the first hash value generator may be configured to generate the first hash value in units of images produced by the imaging unit.
- According to another embodiment of the present disclosure, a digital forensic image verification system includes an imaging device having a imaging unit configured to generate images, a first hash value generator configured to generate a first hash value for the images, and a transmitting unit configured to transmit the images and the first hash value; and an image storage device having a receiving unit configured to receive the images and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for some of the images received by the receiving unit, and a controller configured to compare the first hash value and the second hash value with each other.
- In one embodiment, the second hash value generator may be configured to generate the second hash value for some images backed up among the images received by the receiving unit.
- In one embodiment, the first hash value generator may be configured to generate the first hash value for some of the images produced by the imaging unit, and the second hash value generator may be configured to generate the second hash value for the images for which the first hash value is generated among the images produced by the receiving unit.
- In one embodiment, the second hash value generator may be configured to generate the second hash value for images requested to be transmitted to the outside among the images received by the receiving unit.
- According to another embodiment of the present disclosure, a digital forensic image verification system includes an imaging device configured to generate an image; a first hash value generation device configured to generate a first hash value for the image received from the imaging device; and an image storage device having a receiving unit configured to receive the image and the first hash value from the first hash value generation device; a second hash value generator configured to generate a second hash value for the image; and a controller configured to compare the first hash value and the second hash value with each other.
- According to another embodiment of the present disclosure, a digital forensic image verification system includes an imaging device having a imaging unit configured to generate an image, a first hash value generator configured to generate a first hash value for the image, and a transmitting unit configured to transmit the image and the first hash value; a second hash value generation device configured to generate a second hash value for the image received from the imaging device; and an image storage device having a receiving unit configured to receive the image and the first hash value from the imaging device, and receive the second hash value from the second hash value generation device; and a controller configured to compare the first hash value and the second hash value with each other.
- As described above, according to the present disclosure, whether an image received by an image storage device has been forged or altered may be verified using a first hash value for the image generated by an imaging device and a second hash value for the image generated by the image storage device.
- According to the present disclosure, a load applied in generating a first hash value by an imaging device may be greatly decreased, when whether an image received by an image storage device has been forged or altered is verified using the first hash value for the image generated by the imaging device and a second hash value for the image generated by the image storage device.
- According to the present disclosure, a load applied in generating a second hash value by an image storage device may be greatly decreased, when whether an image received by the image storage device has been forged or altered is verified using a first hash value for the image generated by an imaging device and the second hash value for the image generated by the image storage device.
- According to the present disclosure, an image having the same authenticity as an original image may be obtained by verifying whether an image received by an image storage device has been forged or altered by using a first hash value for the image generated by an imaging device and a second hash value for the image generated by the image storage device.
-
FIG. 1 is a block diagram of a digital forensic image verification system according to an embodiment of the present disclosure. -
FIG. 2 is a detailed block diagram of a digital forensic image verification system according to an embodiment of the present disclosure. -
FIG. 3 is a diagram illustrating generating a first hash value according to an embodiment of the present disclosure. -
FIG. 4 is a diagram illustrating performing muxing according to an embodiment of the present disclosure. -
FIG. 5 is a diagram illustrating performing demuxing according to an embodiment of the present disclosure. -
FIG. 6 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure. -
FIG. 7 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure. -
FIG. 8 is a detailed block diagram of a digital forensic image verification system according to another embodiment of the present disclosure. - Hereinafter, a structure and effects of an embodiment of the present disclosure will be described with reference to the accompanying drawings.
-
FIG. 1 is a block diagram of a digital forensic image verification system according to an embodiment of the present disclosure. The digital forensic image verification system includes animaging device 100 and animage storage device 200. - In more detail, the
imaging device 100 includes animaging unit 110, a firsthash value generator 120, amuxing unit 130, and a transmittingunit 140 as illustrated inFIG. 2 . - The
imaging unit 110 of theimaging device 100 produces sound and an image. - The first
hash value generator 120 of theimaging device 100 generates a first hash value for the sound and the image at intervals of a certain time. - For example, as illustrated in
FIG. 3 , when it is assumed that sound and an image are produced from 12:01:00 to 12:01:03 and the certain time is 1 second, the firsthash value generator 120 may generate a 1-1 hash value from 12:01:00 to 12:01:01, a 1-2 hash value from 12:01:01 to 12:01:02, and a 1-3 hash value from 12:01:02 to 12:01:03. - Since a hash value for sound and an image received from 12:01:00 to 12:01:01 is changed in units of frames, the 1-1 hash value is generated by combining different hash values for the frames at the intervals of the certain time to prove authenticity.
- Similarly, the 1-2 and 1-3 hash values are generated according to the same concept as the 1-1 hash value.
- Accordingly, different first hash values are generated at the intervals of the certain time.
- The
muxing unit 130 of theimaging device 100 muxes the different first hash values generated at the intervals of the certain time and sound and images corresponding to the intervals of the certain time. - For example, as illustrated in
FIG. 4 , themuxing unit 130 may mux first sound, a first image, and the 1-1 hash value generated from 12:01:00 to 12:01:01, mux second sound, a second image, and the 1-2 hash value generated from 12:01:01 to 12:01:02, and mux third sound, a third image, and the 1-3 hash value generated from 12:01:02 to 12:01:03. - The transmitting
unit 140 of theimaging device 100 transmits the muxed sound, images, and first hash values. - For example, the transmitting
unit 140 transmits the first, second, and third data muxed as illustrated inFIG. 4 to theimage storage device 200. To help understand the present disclosure, the first, second, and third data are illustrated separately inFIG. 4 but are continuously transmitted. - As illustrated in
FIG. 2 , theimage storage device 200 may include a receivingunit 210, ademuxing unit 220, astorage unit 230, a secondhash value generator 240, and acontroller 250. - The receiving
unit 210 of theimage storage device 200 receives the muxed sound, images, and first hash values. - For example, the receiving
unit 210 receives the muxed the first, second, and third data as illustrated inFIG. 4 . - The
demuxing unit 220 of theimage storage device 200 demuxes the received sound, images, and first hash values. - The
storage unit 230 of theimage storage device 200 divides and stores the demuxed sound, images, and first hash values. - That is, the
storage unit 230 divides and stores the demuxed sound, images, and first hash values such that the sound and images are provided when they are backed up and each of the first hash value is compared with a generated second hash value when each of the first hash values is backed up. - The second
hash value generator 240 of theimage storage device 200 generates second hash values for the sound and images stored in thestorage unit 230 at intervals of the certain time when the stored sound and images are backed up. - For example, when the
imaging device 100 generates 1-1, 1-2, and 1-3 hash values for sound and images from 12:01:00 to 12:01:03 as illustrated inFIG. 3 , the secondhash value generator 240 generates 2-1, 2-2, and 2-3 hash values for demuxed sound and images from 12:01:00 to 12:01:03 as illustrated inFIG. 5 . - Thus, the 2-1 hash value is generated at the same time as the 1-1 hash value is generated, the 2-2 hash value is generated at the same time as the 1-2 hash value is generated, and the 2-3 hash value is generated at the same time as the 1-3 hash value is generated.
- Similar to the first hash value, the 2-1 hash value is generated by combining different hash values for frames to prove authenticity, since different hash values are generated for sound and images stored in the
storage unit 230 from 12:01:00 to 12:01:01. - Similarly, the 2-2 and 2-3 hash values are generated according to the same concept as the 2-1 hash value.
- Accordingly, different second hash values are generated at intervals of the certain time and are compared with the first hash values at the same intervals of the certain time.
- That is, the second
hash value generator 240 generates different second hash values for the demuxed sound and images at intervals of a certain time to be compared with the first hash values generated for the sound and images by theimaging device 100 at the same intervals of the certain time. - The
controller 250 of theimage storage device 200 compares the stored different first hash values and the generated different second hash values with each other at the same intervals of the certain time when backup is performed. - For example, as illustrated in
FIGS. 3 and 5 , when the 1-1 hash value and the 2-1 hash value from 12:01:00 to 12:01:01 are the same, the 1-2 hash value and the 2-2 hash value from 12:01:01 to 12:01:02 are different, and the 1-3 hash value and the 2-3 hash value from 12:01:02 to 12:01:03 are the same, thecontroller 250 may determine that the sound and the images have been forged or altered due to an external intrusion, since it is proved that there is no change in the hash values from 12:01:00 to 12:01:01 and from 12:01:02 to 12:01:03 and thus they are the same but there is a change in the hash values from 12:01:01 to 12:01:02. - Thus, according to the present disclosure, authenticity may be verified using hash values and the hash values may be compared only when backup is performed by the
image storage device 200, thereby improving the CPU performance of theimage storage device 200. - If the first
hash value generator 120 of theimaging device 100 generates and stores data regarding a place in which theimaging device 100 is installed, the firsthash value generator 120 may provide the data regarding the place when backup is performed by theimage storage device 200. - That is, when the data regarding the place is generated by the first
hash value generator 120 in connection with a positioning module, such as a global positioning system (GPS) or an Internet protocol (IP) and is stored in theimage storage device 200, the data regarding the place is stored in another storage device to verify authenticity when backup is performed. - For example, the
imaging device 100 is installed in a place appropriate for a purpose to capture sound and an image, and data regarding the place is generated by the firsthash value generator 120 and transmitted to theimage storage device 200 to prevent sound and an image captured by theimaging device 100 from being captured by another imaging device by zooming and illegally used. - Furthermore, if the first
hash value generator 120 of theimaging device 100 generates identification number data identifying whether theimaging device 100 is authorized, the identification number data may be provided when backup is performed by theimage storage device 200. - That is, when the identification number data is generated by the first
hash value generator 120 such that a user may identify whether theimaging device 100 is authorized and is stored in theimage storage device 200, the identification number data is stored in another storage device to verify authenticity when backup is performed. - For example, since sound and images captured by the
imaging device 100 are available as evidence only when theimaging device 100 is authorized and sound and images captured by an unauthorized device are unavailable as evidence, the identification number data of the authorizedimaging device 100 is generated by the firsthash value generator 120 and is transmitted to theimage storage device 200. - Furthermore, if the first
hash value generator 120 of theimaging device 100 generates installation purpose attribute data regarding a purpose of installation of theimaging device 100, the installation purpose attribute data may be provided when backup is performed by theimage storage device 200. - That is, when the installation purpose attribute data is generated by the first
hash value generator 120 according to a purpose of installation, e.g., a security purpose, a parking surveillance purpose, a fly-tipping prevention purpose, a children protection zone surveillance purpose, etc., and is stored in theimage storage device 200, the installation purpose attribute data is stored in another storage device to verify authenticity of the purpose of installation when backup is performed. - In addition, if the first
hash value generator 120 of theimaging device 100 generates time data managed by theimaging device 100 and imaging device attribute data including a manufacturer name, a model name, a serial number, an installation purpose, a MAC address, and an IP address, the time data and the imaging device attribute data may be provided when backup is performed by theimage storage device 200. - That is, the time data and the imaging device attribute data include information regarding a time zone of the
imaging device 100 which is being operated and attributes of theimaging device 100, i.e., the manufacturer name, the model name, the serial number, the installation purpose, the MAC address, and the IP address, and are provided during performing of backup, so that sound or an image obtained or fabricated by an unauthorized imaging device may be prevented from being used as evidence, thereby verifying that an image produced by theimaging device 100 is available as evidence according to forensic requirements. - In particular, it is preferable that the
image storage device 200 may be configured such that the secondhash value generator 240 is included in thecontroller 250. - That is, the
hash value generator 240 generates a second hash value only when backup is performed and thus thecontroller 250 may generate the second hash value and directly compare it with the first hash value in a software manner. - Accordingly, according to the present disclosure, sound and an image generated by the
imaging device 100 may be verified to be originals even when the sound and the image are stored in theimage storage device 200 and partially backed up in another storage device. - Another embodiment of the present disclosure will be described with reference to
FIG. 6 . The digital forensic image verification system according to the present embodiment includes animaging device 300 and animage storage device 400. - The
imaging device 300 includes animaging unit 310, a firsthash value generator 320, and a transmittingunit 340. - The
imaging unit 310 produces an image. However, embodiments are not limited thereto and theimaging unit 310 may produce sound together with the image. - The first
hash value generator 320 generates a first hash value for a part of the image produced by theimaging unit 310. Thus, load applied to the firsthash value generator 320 may be more reduced than when a first hash value for the entire image produced by theimaging unit 310 is generated. - As a method of generating a first hash value for a part of the image, which is produced by the
imaging unit 310, by the firsthash value generator 320, the firsthash value generator 320 may generate a first hash value for some frames among a number of frames consisting of the image produced by theimaging unit 310. - For example, the frames for which the first hash value is generated by the first
hash value generator 320 among the large number of frames consisting of the image produced by theimaging unit 310 may include frames arranged at intervals of a certain order, e.g., a first frame, a twenty-fifth frame, and a forty-ninth frame, or frames arranged at certain time intervals, e.g., at intervals of one second, one minute, or ten minutes, among frames arranged in a sequential order to form the image. Alternatively, the frames for which the first hash value is generated by the firsthash value generator 320 among the large number of frames consisting of the image produced by theimaging unit 310 may include frames corresponding to intervals of a certain data size, e.g., 10 KB, 100 KB or 1 GB, among the frames arranged in the sequential order to form the image. - As another method of generating a first hash value for a part of the image, which is produced by the
imaging unit 310, by the firsthash value generator 320, the firsthash value generator 320 may generate a first hash value for some regions, e.g., front and rear regions, of the image produced by theimaging unit 310. - As another method of generating a first hash value for some of images, which are produced by the
imaging unit 310, by the firsthash value generator 320, the firsthash value generator 320 may generate a first hash value in units of the images produced by theimaging unit 310 as individual image data files. - The transmitting
unit 340 transmits the image and the first hash value. - The
image storage device 400 includes a receivingunit 410, a secondhash value generator 420, and acontroller 440. - The receiving
unit 410 receives the image and the first hash value from theimaging device 300. - The second
hash value generator 420 generates a second hash value for the image received by the receivingunit 410. - The
controller 440 compares the first hash value and the second hash value with each other. Thus, thecontroller 440 may determine whether the first hash value and the second hash value are the same to determine whether the image received by the receivingunit 410 has been forged or altered. - A digital forensic image verification system according to the present embodiment is differentiated from the digital forensic image verification system according to the second embodiment, in terms of a first hash value generator and a second hash value generator. The present embodiment will be described with reference to
FIG. 6 . In the following description regarding the present embodiment, the first hash value generator and the second hash value generator are assigned the same reference numerals as those according to the second embodiment. - The digital forensic image verification system according to the present embodiment includes an
imaging device 300 and animage storage device 400. - The
imaging device 300 includes animaging unit 310, a firsthash value generator 320, and a transmittingunit 340. Theimage storage device 400 includes a receivingunit 410, a secondhash value generator 420, and acontroller 440. - The
imaging unit 310 produces an image. However, embodiments are not limited thereto and theimaging unit 310 may produce sound together with the image. - The first
hash value generator 320 generates a first hash value for the image produced by theimaging unit 310. - The transmitting
unit 340 transmits the image and the first hash value. - The
image storage device 400 includes the receivingunit 410, the secondhash value generator 420, and acontroller 440. - The receiving
unit 410 receives the image and the first hash value from theimaging device 300. - The second
hash value generator 420 generates a second hash value for some of images received by the receivingunit 410. Thus, load applied to the secondhash value generator 420 may be more reduced than when a second hash value for all the images received by the receiving unit is generated. - The second
hash value generator 420 may generate a second hash value for some of the images received by the receivingunit 410 in various ways. For example, the secondhash value generator 420 may generate a second hash value for images backed up among the images received by the receivingunit 410. When the firsthash value generator 320 generates a first hash value for some of images produced by theimaging unit 310, the secondhash value generator 420 may generate a second hash value for the images for which the first hash value is generated among the images received by the receivingunit 410. Furthermore, the secondhash value generator 420 may generate a second hash value for images requested to be transmitted to the outside among the images received by the receivingunit 410. - The
controller 440 compares the first hash value and the second hash value to each other. Thus, thecontroller 440 may determine whether the first hash value and the second hash value are the same to determine whether the images received by the receivingunit 410 have been forged or altered. - A fourth embodiment will be described with reference to
FIG. 7 . A digital forensic image verification system according to the present embodiment includes animaging device 500 and animage storage device 600, and further includes a first hashvalue generation device 520 configured to generate a first hash value. - The
imaging device 500 includes animaging unit 510 configured to produce an image, and a transmittingunit 540 configured to transmit the image and the first hash value received from the first hashvalue generation device 520. - The first hash
value generation device 520 receives the image from theimaging device 500 which generates the image, generates a first hash value for the received image, and transmits the first hash value to the transmittingunit 540 of theimaging device 500. Thus, load to be applied to theimaging device 500 when the first hash value is generated may be completely removed, compared to when theimaging device 500 generates a first hash value for the image produced by theimaging device 500. - The
image storage device 600 includes a receivingunit 610 configured to receive the image and the first hash value from the first hashvalue generation device 520, a secondhash value generator 620 configured to generate a second hash value for the image, and acontroller 640 configured to compare the first hash value and the second hash value with each other, and is substantially the same as the digital forensic image verification system according to the second embodiment. - A fifth embodiment will be described with reference to
FIG. 8 . A digital forensic image verification system according to the present embodiment includes animaging device 700 and animage storage device 800, and further includes a second hashvalue generation device 820 configured to generate a second hash value. - The
imaging device 700 includes animaging unit 710 configured to produce an image, a firsthash value generator 720 configured to generate a first hash value for the image, and a transmittingunit 740 configured to transmit the image and the first hash value, and is substantially the same as the digital forensic image verification system according to the second embodiment. - The second hash
value generation device 820 generates a second hash value for the image received from theimaging device 700 and transmits the second hash value to theimage storage device 800. Thus, load to be applied to theimage storage device 800 when the second hash value is generated may be completely removed, compared to when the second hash value is generated by theimage storage device 800. - The
image storage device 800 includes a receivingunit 810 configured to receive the image and the first hash value from theimaging device 700 and receive the second hash value from the second hashvalue generation device 820, and acontroller 840 configured to compare the first hash value and the second hash value with each other. - Exemplary embodiments according to the present disclosure described above are set forth in the drawings and the detailed description, and the terminology used herein are merely provided to describe the present disclosure and should not be understood as limiting the meaning or the scope of the present disclosure defined in the claims.
- Accordingly, it will be apparent to those of ordinary skill in the art that various changes may be made in the embodiments, and other embodiments equivalent thereto may be implemented. The scope of the present disclosure should be defined by the technical ideal defined in the claims.
Claims (18)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150178101A KR101687989B1 (en) | 2015-12-14 | 2015-12-14 | System for verifying digital forensic image and photographing device and image storing device used in the system |
KR10-2015-0178101 | 2015-12-14 | ||
KR10-2016-0168271 | 2016-12-12 | ||
KR1020160168271A KR101818118B1 (en) | 2016-12-12 | 2016-12-12 | System for verifying digital forensic image |
PCT/KR2016/014561 WO2017105049A1 (en) | 2015-12-14 | 2016-12-13 | Digital forensic image verification system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2016/014561 A-371-Of-International WO2017105049A1 (en) | 2015-12-14 | 2016-12-13 | Digital forensic image verification system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/985,955 Continuation US20230074748A1 (en) | 2015-12-14 | 2022-11-14 | Digital forensic image verification system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180373894A1 true US20180373894A1 (en) | 2018-12-27 |
Family
ID=59057117
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/062,523 Abandoned US20180373894A1 (en) | 2015-12-14 | 2016-12-13 | Digital forensic image verification system |
US17/985,955 Pending US20230074748A1 (en) | 2015-12-14 | 2022-11-14 | Digital forensic image verification system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/985,955 Pending US20230074748A1 (en) | 2015-12-14 | 2022-11-14 | Digital forensic image verification system |
Country Status (4)
Country | Link |
---|---|
US (2) | US20180373894A1 (en) |
EP (1) | EP3393123A4 (en) |
CN (2) | CN108781270A (en) |
WO (1) | WO2017105049A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210110201A1 (en) * | 2019-10-10 | 2021-04-15 | Samsung Electronics Co., Ltd. | Computing system performing image backup and image backup method |
US11347787B2 (en) * | 2018-03-12 | 2022-05-31 | Tencent Technology (Shenzhen) Company Limited | Image retrieval method and apparatus, system, server, and storage medium |
US20230024682A1 (en) * | 2021-07-21 | 2023-01-26 | Electronics And Telecommunications Research Institute | Logical imaging apparatus and method for digital forensic triage |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101897987B1 (en) * | 2017-11-24 | 2018-09-12 | 주식회사 포드림 | Method, apparatus and system for managing electronic fingerprint of electronic file |
CN113191380B (en) * | 2020-01-14 | 2022-12-13 | 天津工业大学 | Image evidence obtaining method and system based on multi-view features |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030012487A (en) * | 2001-08-01 | 2003-02-12 | 주식회사 마크애니 | Moving picture transmitting/receiving apparatus and method using watermarking and hash function technique |
JP3893970B2 (en) * | 2001-12-28 | 2007-03-14 | キヤノン株式会社 | Image verification system and image verification apparatus |
JP2003198540A (en) * | 2001-12-28 | 2003-07-11 | Canon Inc | Image generator and verification data generating method |
JP2008118627A (en) * | 2006-10-13 | 2008-05-22 | Computer Image Laboratory Co Ltd | Video recording and reproducing system |
US20150334257A1 (en) * | 2007-03-06 | 2015-11-19 | Capture Lock Inc. | Real time transmission of photographic images from portable handheld devices |
KR101175187B1 (en) * | 2008-12-08 | 2012-08-20 | 한국전자통신연구원 | Apparatus and method for image recording and reproducing |
JP2011097486A (en) * | 2009-11-02 | 2011-05-12 | Hitachi Kokusai Electric Inc | Video signature system |
JP2011170540A (en) * | 2010-02-17 | 2011-09-01 | Fujifilm Corp | Inspection system and method, management server, mobile terminal, program, and memory medium |
US9495601B2 (en) * | 2013-12-09 | 2016-11-15 | Mirsani, LLC | Detecting and reporting improper activity involving a vehicle |
US9003143B1 (en) * | 2014-04-30 | 2015-04-07 | Storagecraft Technology Corporation | Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage |
-
2016
- 2016-12-13 US US16/062,523 patent/US20180373894A1/en not_active Abandoned
- 2016-12-13 EP EP16875991.8A patent/EP3393123A4/en active Pending
- 2016-12-13 WO PCT/KR2016/014561 patent/WO2017105049A1/en active Application Filing
- 2016-12-13 CN CN201680073198.3A patent/CN108781270A/en active Pending
- 2016-12-13 CN CN202211033022.9A patent/CN115412696A/en active Pending
-
2022
- 2022-11-14 US US17/985,955 patent/US20230074748A1/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11347787B2 (en) * | 2018-03-12 | 2022-05-31 | Tencent Technology (Shenzhen) Company Limited | Image retrieval method and apparatus, system, server, and storage medium |
US20210110201A1 (en) * | 2019-10-10 | 2021-04-15 | Samsung Electronics Co., Ltd. | Computing system performing image backup and image backup method |
US12235731B2 (en) * | 2019-10-10 | 2025-02-25 | Samsung Electronics Co., Ltd. | Computing system performing image backup and image backup method |
US20230024682A1 (en) * | 2021-07-21 | 2023-01-26 | Electronics And Telecommunications Research Institute | Logical imaging apparatus and method for digital forensic triage |
Also Published As
Publication number | Publication date |
---|---|
WO2017105049A1 (en) | 2017-06-22 |
US20230074748A1 (en) | 2023-03-09 |
CN108781270A (en) | 2018-11-09 |
CN115412696A (en) | 2022-11-29 |
EP3393123A1 (en) | 2018-10-24 |
EP3393123A4 (en) | 2019-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230074748A1 (en) | Digital forensic image verification system | |
US11550935B2 (en) | Method, apparatus, and electronic device for blockchain-based recordkeeping | |
CN110995673B (en) | Case evidence management method and device based on block chain, terminal and storage medium | |
US11868509B2 (en) | Method and arrangement for detecting digital content tampering | |
CN103189872B (en) | Safety in networked environment and the effectively method and apparatus of Content Selection | |
US20180121635A1 (en) | Systems and methods for authenticating video using watermarks | |
KR101687989B1 (en) | System for verifying digital forensic image and photographing device and image storing device used in the system | |
US20190097805A1 (en) | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | |
WO2019236470A1 (en) | Blockchain-embedded secure digital camera system to verify audiovisual authenticity | |
US8327150B2 (en) | System, method and program for managing information | |
US10891702B2 (en) | Duplicate image evidence management system for verifying authenticity and integrity | |
US20200278948A1 (en) | Method, apparatus and system for managing electronic fingerprint of electronic file | |
CA3002735C (en) | Secure transmission | |
CN107919959A (en) | Certification of the trusted device to new equipment | |
CN114117554B (en) | Law enforcement data credibility verification method, processing method and system and law enforcement instrument | |
KR101818118B1 (en) | System for verifying digital forensic image | |
KR101803963B1 (en) | Image Recording Apparatus for Securing Admissibility of Evidence about Picked-up Image | |
KR20220142800A (en) | System and method for video integrity verification and original recovery based on Blockchain network | |
Alamleh et al. | Secure Media Timestamping: Challenges, Solutions, and Frameworks | |
CN119563305A (en) | Data processing method, device, equipment, mobile platform, drone, storage medium and program product | |
CN115834035A (en) | Multimedia data storage method, computer equipment and storage device | |
CN117857058A (en) | Information source security verification method, system, equipment and medium | |
JP2017228918A (en) | System and information processing method | |
CN119670040A (en) | Audiovisual content acquisition equipment, verification terminal and system | |
CN119150304A (en) | Data encryption method, data verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: 4DREAM CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, WON-KUG;SHIN, JIN-KYO;REEL/FRAME:046092/0543 Effective date: 20180612 Owner name: HANWHA TECHWIN CO., LTD, KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, WON-KUG;SHIN, JIN-KYO;REEL/FRAME:046092/0543 Effective date: 20180612 |
|
AS | Assignment |
Owner name: HANWHA AEROSPACE CO., LTD., KOREA, REPUBLIC OF Free format text: CHANGE OF NAME;ASSIGNOR:HANWHA TECHWIN CO., LTD;REEL/FRAME:046927/0019 Effective date: 20180401 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: HANWHA AEROSPACE CO., LTD., KOREA, REPUBLIC OF Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE APPLICATION NUMBER 10/853,669. IN ADDITION PLEASE SEE EXHIBIT A PREVIOUSLY RECORDED ON REEL 046927 FRAME 0019. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:HANWHA TECHWIN CO., LTD.;REEL/FRAME:048496/0596 Effective date: 20180401 |
|
AS | Assignment |
Owner name: HANWHA TECHWIN CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HANWHA AEROSPACE CO., LTD.;REEL/FRAME:049013/0723 Effective date: 20190417 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: HANWHA VISION CO., LTD., KOREA, REPUBLIC OF Free format text: CHANGE OF NAME;ASSIGNOR:HANWHA TECHWIN CO., LTD.;REEL/FRAME:064549/0075 Effective date: 20230228 |