Sei sulla pagina 1di 40

An Agency Under

MOSTI

Video Forensics:
WHAT YOU NEED TO KNOW
Presented by:
MOHD SHARIZUAN B MOHD OMAR
Digital Forensics Analyst
sharizuan@cybersecurity.my
+60389926935

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia
Content

q Introduction
q Definitions
q Procedures
q Tools
q Case study
q Training
q Challenges
q Conclusion

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 2
Introduction: The Reality of Video Forensic

Too many people expect great stuff from the movies or CSI.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 3
Introduction: Reality of Video Forensic

Lesson from CSI:


Crop, Zoom in and Resize technique can
produce a CLEAR image of suspect.

Picture 1 Picture 2
To prove that it is NOT ALWAYS that easy, we will study the following slides.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 4
Introduction: Reality of Video Forensic

To prove Crop, Zoom in and Resize technique


can produce a CLEAR image of suspect.

Picture 1 Picture 2

Picture 1 and 2 are taken using same camera with the same distance, but with
different optical zooming.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 5
Introduction: Reality of Video Forensic

Result: Good visual image

Source: Picture 1

Result after using Crop, Zoom in and Resize technique


Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 6
Introduction: Reality of Video Forensic

Result: Bad Visual image

Source: Picture 2

Picture 1
Result after using Crop, Zoom in and Resize technique
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 7
Introduction: Reality of Video Forensic

If source picture is bad, the result will be bad as well.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 8
Introduction: Reality of Video Forensic

How about these picture?


A lot of cases received by us is coming from CCTV recordings.

Picture 3 Result after zoom in

Crop,Zoom In and Resize


is NOT HELPING!
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 9
Definition: Forensic Video Analysis

Forensic Video Analysis is the


scientific examination, comparison
and/or evaluation of video in legal
matters. ” -LEVA

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 10
Definition: Digital Video Evidence (DVE)

DVE is information of probative value


stored or transmitted in binary from
including, but not limited to, film, tape,
magnetic and optical media, and/or the
information contain therein ” -LEVA

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 11
Procedures:

Evidence Management

Playback

Storage/Archive

Processing

Output

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 12
Procedures: Evidence Management

q Principle for seizing


and maintaining video
evidence.

q The general principle


are:
§ Chain of custody.
§ Evidence preservation.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 13
Procedures: Playback

q To view and
playback the
video evidence.
q To identify which
video files to
capture.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 14
Procedures: Storage/Archive

q Method for retrieving recorded video from DVE.


q Process is based on this fundamental question:

§ Is the request reasonable?


§ What export method are available?
§ Is the method practical?

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 15
Procedures: Processing of DVE

q Technical Functions
§ Step-by-step process/procedure
§ Conducted by trained first
responder / analysts

q Analytical Functions
§ Required a significant amount of
judgment and/or an opinion.
§ requiring additional skills,
education, experience and/or
training.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 16
Procedures: Processing of DVE

q Technical Functions
§ Copy digital media
§ Converting digital media from one format to
another.
§ Printing images from digital media.
§ Archiving data.
§ Outputting data to an analog or digital
medium.
§ Resizing digital images.
§ Basic image adjustments.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 17
Procedures: Processing of DVE

q Analytical Functions
§ Image comparison / photographic/ video comparison
§ Conducting image aspect ratio calibration.
§ Color correction
§ Motion tracking
§ Image stabilization
§ Audio/Video Alignment
§ Image analysis

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 18
Procedures: Output
q Generate Hash
§ To verify the original condition of the evidence.
q Video format
§ Proper aspect ratio
720x480 (recommended)
§ Uncompressed video output.
mpeg (recommended)
q Image format
§ No compression or losses compression.
§ Use The Tagged Image File Format TIFF.(recommended)
q Storage media
§ CD/DVD
§ External hardisk

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 19
Tools: Video Forensics Analysis

Basic Tools

Advanced Tools

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 20
Tools: Basic

Video Editing Image Enhancing


• Handles the editing of video • A program that enable a person to
sequences on a computer. manipulate visual images on a
• Ability to capture video from other computer
devices. • Ability to enhance images.
• Video editing software comes with a
lot of video codecs

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 21
Tools: Advanced

Demultiplexer
§ Multiplexer system allows many cameras to record into a
single video file.
§ The frames jump all over the place.
§ Demultiplexer system separates the multiplex videos into
separate screens.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 22
Tools: Advanced

Deblur Filter
§ Problem: A moving object
creates a blur image when
captured.
§ Solution: Deblur filter helps
to sharpen the video.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 23
Tools: Advanced

Denoise Filter

§ Problem: The original


video is too dark.
§ Solution: After shifting
the histogram, more
details of the image can
be seen, but it is far too
noisy.
§ The Denoise filter rips
through the noise and
comes out with a more
decent picture
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 24
Tools: Advanced

Video Stabilization

§ Problem: A camera recording


a vehicle going from left to
right across the screen
producing a shaky image.
§ Solution: Video Stabilization
uses shape matching and
velocity estimation to freeze
the object in the same spot

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 25
Tools: Advanced

Panorama Mosaic Reconstruction

§ Problem: Getting a full image of a moving object.


§ Solution: Panorama Mosaic Reconstruction recognizes
duplicates in several frames and stitch parts of images to
form a complete object image.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 26
Case Study

q Case Study 1:
Video/Image Enhancement

q Case Study 2:
Video/image Comparison

q Case Study 3:
Image Authentication

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 27
Case Study 1: Video/Image Enhancement

Problem: Blur image Solution: Adjust image brightness and Sharpening

Picture 1 Result: Picture 2

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 28
Case Study 2: Video/image Comparison

Problem: To identify whether Object B is similar to Object A.


Solution: Use blend technique. Object A is blend with Object B in picture C.

Object A

Picture C

Similarities of Object A and Object B


Object B are highlighted with green arrows.
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 29
Case Study 3: Image Authentication

Problem: To prove Picture A is a superimpose picture


Solution: Zoom and analyze the picture C. Identify the texture, resolution,
perspective and color balance consistency.

Original image
Manipulated image

Picture B
Image was crop and
paste

Picture A

Picture C
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 30
Training

Where to get the training?


q Professional Organizations
q Vendor Training
q Seminar
q Other resource

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 31
Training: Professional Organizations

LEVA
Law Enforcement & Emergencies Services Video Association

Resolution Video Incorporation

• These organization provides regular courses and seminars on forensic


video analysis.
• Also provide Forensics Video Analysis Certification.
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 32
Training: Vendor Training

q Company that provide digital forensic analysis


system and image processing tools.
q Also provide training in digital forensics analysis
and image enhancing techniques.
q Example:
§ Avid-Ocean
§ Adobe Photoshop

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 33
Training: Conference & Seminar

q Seminar allow analyst to compare and review


processing techniques.
q Provided by:
§ Government forensic Lab
§ Law Enforcement Agencies (LEA)
§ Professional Organization
q Example:
§ The LEVA 2008 International Video Evidence
Symposium and training Conference.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 34
Training: Others

q Book
q Internet resource
§ Blog
• http://media-geek.com/
• http://www.deke.com/
§ Video Streaming
• http://www.youtube.com/
§ Website
• http://filext.com/

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 35
Challenges In Video Forensics

1. Low quality Source


§ Low quality images produced by low quality CCTV and
camera and also compressed video format.
§ Almost all CCTV cases received by the analyst are in low
quality format.

2. Proprietary Issue
§ Different CCTV produces different output.
§ Different codecs needed to be able to view the output.

3. Digital Video Forensic is a new technology


§ More research and more tools need to be produced.
§ It is important to maintain the integrity and to preserve the
digital video, therefore analyst must have the right tool.
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 36
Conclusion

q You almost never get a nice digital video


evidence.
q You won't always get a perfect picture.
q If source picture is bad, result will be bad as well.
q However, tools does help the analyst to produce
a better picture.
q Enhancing the image cannot fix 100% quality of
original image.
q Most important! Video Forensic is NOT JUST a
ZOOM IN IMAGE.

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 37
THANK YOU

QUESTION?
Securing Our Cyberspace
Copyright © 2008 CyberSecurity Malaysia 38
Our Websites and emails

http://www.cybersecurity.my for
Corporate website

http://www.mycert.my for
Technical website

http://www.esecurity.my for
Awareness Portal

http://cnii.cybersecurity.my for

info@cybersecurity.my → for general inquiries

cyber999@cybersecurity.my → for incidence reporting

Securing Our Cyberspace


Copyright © 2008 CyberSecurity Malaysia 39
Our Corporate
Website:

Securing Our Cyberspace


Securing Our Cyberspace Copyright © 2008 CyberSecurity Malaysia Copyright © 2008 CyberSecurity Malaysia 40

Potrebbero piacerti anche