REFERENCES

1. Mordor intelligence research & advisory. video surveillance system market size & share analysis - growth trends & forecasts (2024 - 2029). Mordor Intelligence; 2023. Available from: https://www.mordorintelligence.com/industry-reports/video-surveillance-systems-market. [Last accessed on 25 Dec 2024].

2. Tech Report. 15+ Surveillance Camera Statistics (2023 Updated Data); 2023. Accessed: 2024-06-10. Available from: https://techreport.com/statistics/hardware-gadgets/surveillance-camera-statistics/. [Last accessed on 25 Dec 2024].

3. Market us. IP camera market; 2023. Accessed: 2024-06-10. Available from: https://market.us/report/ip-camera-market/. [Last accessed on 25 Dec 2024].

4. BrandEssence market research. IP camera market size, share & trends analysis Report; 2022. Accessed: 2024-06-10. Available from: https://brandessenceresearch.com/technology-and-media/ip-camera-market-latest. [Last accessed on 25 Dec 2024].

5. Verified market research. Global IP camera market size; 2024. Accessed: 2024-06-10. Available from: https://www.verifiedmarketresearch.com/product/ip-camera-market/. [Last accessed on 25 Dec 2024].

6. Global market insights. IP camera market; 2023. Accessed: 2024-06-10. Available from: Available from: https://www.gminsights.com/industry-analysis/ip-camera-market. [Last accessed on 25 Dec 2024].

7. MSIT. The 13th Meeting of the ICT Strategy Committee Was Held; 2019.

8. CISA. Dahua Technology Co., Ltd digital video recorders and IP cameras; 2017. Accessed: 2024-06-10. Available from: https://www.cisa.gov/news-events/ics-advisories/icsa-17-124-02. [Last accessed on 25 Dec 2024].

9. Kovacs E. Backdoor found in dahua video recorders, cameras; 2017. Accessed: 2024-06-10. Available from: https://www.securityweek.com/backdoor-found-dahua-video-recorders-cameras. [Last accessed on 25 Dec 2024].

10. Brook C. Dahua patching backdoor in DVRs, IP cameras. Threatpost; 2017. Accessed: 2024-06-10. Available from: https://threatpost.com/dahua-patching-backdoor-in-dvrs-ip-cameras. [Last accessed on 25 Dec 2024].

11. Domonoske C. S.C. Mom says baby monitor was hacked; experts say many devices are vulnerable. NPR; 2018. Accessed: 2024-06-10. Available from: https://www.npr.org/sections/thetwo-way/2018/06/05/617196788/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable. [Last accessed on 25 Dec 2024].

12. Chokshi N. Somebody's watching: hackers breach ring home security cameras; 2019. Accessed: 2024-06-10. Available from: https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html. [Last accessed on 25 Dec 2024].

13. PW consulting. Video surveillance market; 2022. Accessed: 2024-06-10. Available from: https://pmarketresearch.com/video-surveillance-market/. [Last accessed on 25 Dec 2024].

14. Grand view research. Video surveillance market size, share & trends analysis report; 2023. Accessed: 2024-06-10. Available from: https://www.grandviewresearch.com/industry-analysis/video-surveillance-market-report. [Last accessed on 25 Dec 2024].

15. 6Wresearch. China video surveillance systems market (2019-2025); 2023. Accessed: 2024-06-10. Available from: https://www.6wresearch.com/industry-report/china-video-surveillance-systems-market-2019-2025. [Last accessed on 25 Dec 2024].

16. Doffman Z. Warning as eavesdropping risk hits millions Of Chinese-Made cameras; 2019. Accessed: 2024-06-10. Available from: https://www.forbes.com/sites/zakdoffman/2019/08/03/update-now-warning-as-eavesdropping-risk-hits-millions-of-chinese-made-cameras/?sh=18de3d66bf2c. [Last accessed on 25 Dec 2024].

17. Fingas J. Army base pulls Chinese security cameras over "negative perception". Engadget; 2018. Accessed: 2024-06-10. Available from: https://www.engadget.com/2018-01-15-army-base-pulls-chinese-security-cameras.html. [Last accessed on 25 Dec 2024].

18. Federal Communications commission. FCC bans authorizations for devices that pose national security threat; 2022. Accessed: 2024-06-10. Available from: https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat. [Last accessed on 25 Dec 2024].

19. Martin N. US bans Chinese telecom, surveillance cameras; 2022. Accessed: 2024-06-10. Available from: https://www.dw.com/en/us-bans-chinese-telecom-surveillance-cameras/a-63895206. [Last accessed on 25 Dec 2024].

20. Morrison R. UK government ban for Chinese Hikvision CCTV cameras. Tech Monitor; 2022. Accessed: 2024-06-30. Available from: https://techmonitor.ai/government-computing/hikvision-ban-uk-government-oliver-dowden. [Last accessed on 25 Dec 2024].

21. Blake E. Government department removes Chinese cameras that caught Matt Hancock's affair; 2022. Accessed: 2024-06-10. Available from: https://www.standard.co.uk/news/uk/hikvision-chinese-cameras-cctv-dwp-banned-matt-hancock-affair-b1008586.html. [Last accessed on 25 Dec 2024].

22. National intelligence service, Republic of Korea. Security Conformance Verification Policy for Product Family of Image Information Processing Devices in Public Sector; 2024. Accessed: 2024-06-10. Available from: https://www.ncsc.go.kr:4018/main/cop/bbs/selectBoardArticle.do?bbsId=SecurityNotification_main&nttId=127788&menuNo=030000&subMenuNo=031200&thirdMenuNo= . [Last accessed on 25 Dec 2024].

23. Simmons GJ. The history of subliminal channels. IEEE J Sel Areas Commun 1998;16:452-62.

24. Lampson BW. A note on the confinement problem. Commun ACM 973;16:613-15.

25. Petitcolas FA, Anderson RJ, Kuhn MG. Information hiding-a survey. Proc IEEE 1999;87:1062-78.

26. Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Process 2010;90:727-52.

27. Girling CG. Covert channels in LAN's. IEEE Trans Softw Eng 1987;13:292.

28. Simmons GJ. The prisoners' problem and the subliminal channel. In: Advances in Cryptology: Proceedings of Crypto 83. Springer; 1984. pp. 51-67.

29. Young A, Yung M. Malicious cryptography: exposing cryptovirology. John Wiley & Sons; 2004.

30. National Institute of Standards and Technology. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology; 2010. SP 800-22 Rev. 1a. Accessed: 2024-06-10.

31. Telecommunications Technology Association. Guideline for the collection and application of noise source on operating systems. Telecommunications Technology Association; 2020. TTAS. KO-12.0235/R2. Available from: https://committee.tta.or.kr/data/standard_view.jsp?commit_code=PG504&pk_num=TTAK.KO-12.0235%2FR2. [Last accessed on 25 Dec 2024].

32. Park BK, Park H, Kim YS, et al. Practical true random number generator using CMOS image sensor dark noise. IEEE Access 2019;7: 91407-13.

33. Sanguinetti B, Martin A, Zbinden H, Gisin N. Quantum Random Number Generation on a Mobile Phone. Phys Rev X 2014;4: 031056.

34. Kelsey J, Schneier B, Ferguson N. Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: International Workshop on Selected Areas in Cryptography. Springer; 1999. pp. 13-33.

35. Alzhrani K, Aljaedi A. Windows and linux random number generation process: A comparative analysis. Int J Comput Appl 2015;113.

36. Ferguson N. The windows 10 random number generation infrastructure. Microsoft Corporation: Redmond, WA, USA 2019. Available from: https://download.microsoft.com/download/1/c/9/1c9813b8-089c-4fef-b2ad-ad80e79403ba/Whitepaper%20-%20The%20Windows%2010%20random%20number%20generation%20infrastructure.pdf. [Last accessed on 25 Dec 2024].

37. Dodis Y, Guo S, Stephens-Davidowitz N, Xie Z. No time to hash: On super-efficient entropy accumulation. In: Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part Ⅳ 41. Springer; 2021. pp. 548-76.

38. Turan MS, Barker E, Kelsey J, et al. Recommendation for the Entropy Sources Used for Random Bit Generation. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD; 2018.

39. ISO/IEC JTC 1 W SC 27. Information technology - security techniques - test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408. ISO/IEC 20543: 2019; 2019. Available from: https://www.iso.org/standard/68296.html. [Last accessed on 25 Dec 2024].

40. Shoup V. A computational introduction to number theory and algebra Cambridge, UK: Cambridge University Press; 2009.

41. Choi Y, Yeom Y, Kang JS. Practical entropy accumulation for random number generators with image sensor-based quantum noise sources. Entropy 2023;25.

42. Matsui M. Linear cryptanalysis method for DES cipher. In: Helleseth T, editor. Advances in Cryptology — EUROCRYPT '93. Berlin, Heidelberg: Springer Berlin Heidelberg; 1994. pp. 386-97.

43. Yoo H. Design and implementation of cryptographic random number generators based on parallel noise source; 2022. Available from: https://www.riss.kr/link?id=T16633914. [Last accessed on 25 Dec 2024].

44. Hong D, Lee JK, Kim DC, et al. LEA: A 128-bit block cipher for fast encryption on common processors. In: Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers 14. Springer; 2014. pp. 3-27. Available from: 10.1007/978-3-319-05149-9_1.

45. Barker E, Kelsey J. Recommendation for random number generation using deterministic random bit generators. National Institute of Standards and Technology; 2015. SP 800-90A Rev. 1. Accessed: 2024-06-10.

46. Barker E, Kelsey J, McKay K, Roginsky A, Turan MS. Recommendation for Random Bit Generator (RBG) Constructions. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD; 2022.

47. Stinson D. Cryptography theory and practice. Chapman and Hall, CRC; 2005.

48. Barker E, Chen L. Recommendation for key-derivation methods in key-establishment schemes. National Institute of Standards and Technology; 2011. 800-56C Rev. 1. Accessed: 2024-06-10. Available from: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf.

49. Choi Y, Yeom Y, Kang JS. Subliminal channels of CRYSTALS-Kyber applicablein the black box cryptographic module and potential security threats of IP camera; 2023.

50. National Institute of Standards and Technology. Module-lattice-based key-encapsulation mechanism standard. National institute of standards and technology, gaithersburg, MD; 2023. http://dx.doi.org/https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf.

51. Bos J, Ducas L, Kiltz E, et al. CRYSTALS - Kyber: A CCA-secure module-lattice-based KEM; 2018. pp. 353-67.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/