DOI QR코드

DOI QR Code

Integrity Verification in Vehicle Black Box Video Files with Hashing Method

차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법

  • Choi, Jin-young (Sejong Cyber University Graduate School of Information Security) ;
  • Chang, Nam Su (Sejong Cyber University Department of Information Security)
  • Received : 2016.11.17
  • Accepted : 2017.01.13
  • Published : 2017.01.31

Abstract

Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

최근 차량용 블랙박스의 보급이 확산됨에 따라 이를 법적 증거로 사용하는 경우가 증가하고 있으며, 이에 따라 영상데이터의 무결성 검증에 대한 필요성이 대두되고 있다. 그러나 임베디드 시스템으로 분류되는 블랙박스는 적은 용량과 낮은 처리속도를 가지므로 영상파일 저장과 무결성 검증 처리의 한계점을 가진다. 본 논문에서는 제한된 자원을 가진 블랙박스 환경에서 고속경량 해시함수 LSH와 HMAC의 안전성을 이용하여 영상파일의 무결성을 보장하는 기법을 제안한다. 또한 이 기법을 구현하여 블랙박스 기기에서 무결성 검증 시의 CPU Idle Rate를 측정한 실험 결과를 제시하고, 제안한 기법의 효과성과 실용 가능성에 대해 검증한다.

Keywords

References

  1. S. Son, T. Kim, Y. Jeon, Y. Baek, "Smart camera technology to support high speed video processing in vehicular network," J. KICS, vol. 40, no. 1, pp. 152-164, Jan. 2015. https://doi.org/10.7840/kics.2015.40.1.152
  2. B.-H. Lee, S.-B. Lee, J.-Y. Moon, and J.-H. Lee, "Lightweight DTLS message authentication based on a hash tree," J. KICS, vol. 40, no. 10, pp. 1969-1975, Oct. 2015. https://doi.org/10.7840/kics.2015.40.10.1969
  3. H. Seo and H. Kim, "User authentication method on VANET environment," J. KICS, vol. 37, no. 7, pp. 576-583, Jul. 2015.
  4. J. Shin, S. Oh, C. Jeong, K. Chung, and K. Ahn, "Improved an RFID mutual authentication protocol based on hash function," J. KICS, vol. 37, no. 3, pp. 241-250, Mar. 2012. https://doi.org/10.7840/KICS.2012.37C.3.241
  5. Y. Kim, B. H. Kim, and D. H. Lee, "Real-time integrity for vehicle black box system," Korea Inst. Inf. Security & Cryptology, vol. 19, no. 6, pp. 49-61, Dec. 2009.
  6. W. J. Kim and H. H. Kim, "A study on the application of the vehicle blackbox data security technology," Korea Inst. Inf. Security & Cryptology, vol. 24, no. 2, pp. 35-41, Apr. 2014.
  7. K. Yi, K.-M. Kim, and Y. J. Cho, "A car black box video data integrity assurance scheme using cyclic data block chaining," J. KIISE, vol. 41, no. 11, pp. 982-991, Nov. 2014. https://doi.org/10.5626/JOK.2014.41.11.982

Cited by

  1. Design and Implementation of Video File Structure Analysis Tool for Detecting Manipulated Video Contents vol.10, pp.3, 2017, https://doi.org/10.7236/ijibc.2018.10.3.128
  2. Self-Verifiable Video Integrity Technology for Car Dashboard Cameras using Reversible Data Hiding Method vol.20, pp.2, 2017, https://doi.org/10.9728/dcs.2019.20.2.405