CFP last date
20 December 2024
Reseach Article

Post Incident Analysis Framework for Automated Video Forensic Investigation

by Abdullah AlShaikh, Mohamed Sedky
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 17
Year of Publication: 2015
Authors: Abdullah AlShaikh, Mohamed Sedky
10.5120/ijca2015907187

Abdullah AlShaikh, Mohamed Sedky . Post Incident Analysis Framework for Automated Video Forensic Investigation. International Journal of Computer Applications. 129, 17 ( November 2015), 38-44. DOI=10.5120/ijca2015907187

@article{ 10.5120/ijca2015907187,
author = { Abdullah AlShaikh, Mohamed Sedky },
title = { Post Incident Analysis Framework for Automated Video Forensic Investigation },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 17 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number17/23169-2015907187/ },
doi = { 10.5120/ijca2015907187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:43.438750+05:30
%A Abdullah AlShaikh
%A Mohamed Sedky
%T Post Incident Analysis Framework for Automated Video Forensic Investigation
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 17
%P 38-44
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The need for proper and acceptable forensic process is necessary due to the proliferation and advancement of high digital technology in all aspect of our life. Also the desire and needs for optimizing time and cost of doing things push humans to deeply depend on digital data for decision making. The legal system has also been investing heavily on this area to develop a framework and technology improvement. Therefore there is a need for an automated video forensic investigation tool and a proper development of a framework that can address the sensitive issues associated with this application. A crime culprit may walk scot-free or an innocent suspect may suffer negative consequences, both monetary and otherwise, simply on account of a forensics process or investigation that was inadequate or improperly conducted. Computer related crime are on the rise and skipping one aspect of forensic process or step may result into incomplete or inconclusive result of investigation that may affect interpretation and conclusions in a court of law. In this paper, we propose a novel automated post incident analysis framework which is able to tackle the challenges of video, realistic and practical outdoor surveillance scenarios.

References
  1. Lycos Tech Glossary. 1999. http://webopedia.lycos.com/Multimedia/Video/video.html
  2. Vaughan, T. 1998. Multimedia: Making it Work (4th ed.). Berkeley, CA: McGraw-Hill.
  3. White, R. (1999). How Computers Work. Indianapolis, IN: QUE
  4. Fisher, B. and Schroeder, U. 1999. http://www7.tomshardware.com/video
  5. Baudry, S., Chupeau, B. and Lefèbvre, F. 2008. “A Framework for Video Forensic base on Local and Temporal Fingerprint” Thomson R&D France Security Competence Center 1, avenue de Belle-Fontaine, 35576 Cesson-Sévigné Cedex, France
  6. Sommer, P. 2005. Directors and Corporate Advisors' Guide to Digital Investigations and Evidence. Information Assurance Advisory Council, http://www.iaac.org.uk, accessed 3 June 2014.
  7. Cantrell, G., Dampier, D.A., Dandass, Y.S., Niu, N. and Bogen, A.C.2012. Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. Computer and Information Science 5(2): 29-38 (2012)
  8. Meadaris. 2006. Grants to help develop ways to improve digital evidence collection. October 2006. Purdue University.
  9. Venansius Baryamureeba, Florence Tushabe.  "The Enhanced Digital Investigation Process Model."  Digital Forensic Research Workshop (2004): 1-9.
  10. Kruse II, Warren and Jay, G. Heiser. 2002. Computer Forensics: Incident Response Essentials. Addison-Wesley.
  11. National Institute of Justice. 2001. Electronic Crime Scene Investigation A Guide for First Responders. http://www.ncjrs.org/pdffiles1/nij/187736.pdf
  12. Dee, H. M., Velastin, S. 2008. ‘How close are we to solving the problem of automated visual surveillance?’ in Machine Vision and Applications, vol. 19, no. 5-6, pp. 329-343.
  13. Kobayashi, M., Okabe, T. and Sato, Y. 2010. Detecting forgery from static-scene video based on inconsistency in noise level functions, Information Forensics and Security, IEEE Transactions on 5 (4) (2010) 883{892.
  14. Wang, W. and Farid, H. 2006. Exposing digital forgeries in video by detecting double mpeg compression, in: Proceedings of the 8th workshop on Multimedia and security, ACM, 2006, pp. 37{47.
  15. Wang, W. and Farid, H. 2009. Exposing digital forgeries in video by detecting double quantization, in: Proceedings of the 11th ACM workshop on Multimedia and security, ACM, 2009, pp. 39{48.
  16. Conotter, V., O'Brien, J.F., and Farid, H. 2012. Exposing Digital Forgeries in Ballistic Motion, IEEE Transactions on Information Forensics and Security, v.7 n.1, p.283-296, February 2012
  17. Quas J.A, Goodman G.S, Ghetti S, Alexander KW, Edelstein R, Redlich A.D, Cordon I.M, Jones D.P.H, . 2005. Childhood sexual assault victims: Long-term outcomes after testifying in criminal court. Monographs of the Society for Research in Child Development. 2005;70:1–145.
  18. Scottish Executive. 2003. Guidance on Interviewing Child Witnesses and Victims in Scotland Edinburgh: Author.
  19. Sternberg, K. J., Lamb, M. E., Davies, G. A. & Westcott, H. L. 2001. The Memorandum of Good Practice: Theory versus application. Child Abuse and Neglect. 25,669-681.
  20. Farid, H. 2006. Exposing digital forgeries in scienti c images, in: Proceedings of the 8th workshop on Multi-media and security, ACM, 2006, pp. 29{36.
  21. Mondaini., 2007. Detection of malevolent changes in digital video for forensic applications. In: Proc. of SPIE Int. Conf. on security, steganography and watermarking of multimedia, pp. 65050
  22. Jing Zhang , Yuting Su , Mingyu Zhang,. 2009. Exposing digital video forgery by ghost shadow artifact, Proceedings of the First ACM workshop on Multimedia in forensics, October 23-23, 2009, Beijing, China
  23. NITDA. 2014. National Information Technology Development Agency. www.nitda.gov.ng
  24. Reith, M., Carr, C. and Gunsch, G. 2002. An Examination of Digital Forensic Models. International Journal of Digital Evidence, Vol. 1 No. 3. Online: http://www.ijde.org/docs/02_fall_art2.html [visited 30 June 2014]
  25. DFRWS. 2001. DFRWS Technical Report: A Road Map for Digital Forensic Research, Utica, New York.
  26. Carrier, B. and Spafford, E.H. 2003. Getting Physical with the Investigative Process International Journal of Digital Evidence, vol. 2, Issue 2.
Index Terms

Computer Science
Information Sciences

Keywords

Video Forensic Investigation Post Incident Analysis Evidence Collection Automated Video Analysis.