REFERENCES
1. Mordor intelligence research & advisory. video surveillance system market size & share analysis - growth trends & forecasts (2024 - 2029). Mordor Intelligence; 2023. Available from: https://www.mordorintelligence.com/industry-reports/video-surveillance-systems-market. [Last accessed on 25 Dec 2024].
2. Tech Report. 15+ Surveillance Camera Statistics (2023 Updated Data); 2023. Accessed: 2024-06-10. Available from: https://techreport.com/statistics/hardware-gadgets/surveillance-camera-statistics/. [Last accessed on 25 Dec 2024].
3. Market us. IP camera market; 2023. Accessed: 2024-06-10. Available from: https://market.us/report/ip-camera-market/. [Last accessed on 25 Dec 2024].
4. BrandEssence market research. IP camera market size, share & trends analysis Report; 2022. Accessed: 2024-06-10. Available from: https://brandessenceresearch.com/technology-and-media/ip-camera-market-latest. [Last accessed on 25 Dec 2024].
5. Verified market research. Global IP camera market size; 2024. Accessed: 2024-06-10. Available from: https://www.verifiedmarketresearch.com/product/ip-camera-market/. [Last accessed on 25 Dec 2024].
6. Global market insights. IP camera market; 2023. Accessed: 2024-06-10. Available from: Available from: https://www.gminsights.com/industry-analysis/ip-camera-market. [Last accessed on 25 Dec 2024].
7. MSIT. The 13th Meeting of the ICT Strategy Committee Was Held; 2019.
8. CISA. Dahua Technology Co., Ltd digital video recorders and IP cameras; 2017. Accessed: 2024-06-10. Available from: https://www.cisa.gov/news-events/ics-advisories/icsa-17-124-02. [Last accessed on 25 Dec 2024].
9. Kovacs E. Backdoor found in dahua video recorders, cameras; 2017. Accessed: 2024-06-10. Available from: https://www.securityweek.com/backdoor-found-dahua-video-recorders-cameras. [Last accessed on 25 Dec 2024].
10. Brook C. Dahua patching backdoor in DVRs, IP cameras. Threatpost; 2017. Accessed: 2024-06-10. Available from: https://threatpost.com/dahua-patching-backdoor-in-dvrs-ip-cameras. [Last accessed on 25 Dec 2024].
11. Domonoske C. S.C. Mom says baby monitor was hacked; experts say many devices are vulnerable. NPR; 2018. Accessed: 2024-06-10. Available from: https://www.npr.org/sections/thetwo-way/2018/06/05/617196788/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable. [Last accessed on 25 Dec 2024].
12. Chokshi N. Somebody's watching: hackers breach ring home security cameras; 2019. Accessed: 2024-06-10. Available from: https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html. [Last accessed on 25 Dec 2024].
13. PW consulting. Video surveillance market; 2022. Accessed: 2024-06-10. Available from: https://pmarketresearch.com/video-surveillance-market/. [Last accessed on 25 Dec 2024].
14. Grand view research. Video surveillance market size, share & trends analysis report; 2023. Accessed: 2024-06-10. Available from: https://www.grandviewresearch.com/industry-analysis/video-surveillance-market-report. [Last accessed on 25 Dec 2024].
15. 6Wresearch. China video surveillance systems market (2019-2025); 2023. Accessed: 2024-06-10. Available from: https://www.6wresearch.com/industry-report/china-video-surveillance-systems-market-2019-2025. [Last accessed on 25 Dec 2024].
16. Doffman Z. Warning as eavesdropping risk hits millions Of Chinese-Made cameras; 2019. Accessed: 2024-06-10. Available from: https://www.forbes.com/sites/zakdoffman/2019/08/03/update-now-warning-as-eavesdropping-risk-hits-millions-of-chinese-made-cameras/?sh=18de3d66bf2c. [Last accessed on 25 Dec 2024].
17. Fingas J. Army base pulls Chinese security cameras over "negative perception". Engadget; 2018. Accessed: 2024-06-10. Available from: https://www.engadget.com/2018-01-15-army-base-pulls-chinese-security-cameras.html. [Last accessed on 25 Dec 2024].
18. Federal Communications commission. FCC bans authorizations for devices that pose national security threat; 2022. Accessed: 2024-06-10. Available from: https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat. [Last accessed on 25 Dec 2024].
19. Martin N. US bans Chinese telecom, surveillance cameras; 2022. Accessed: 2024-06-10. Available from: https://www.dw.com/en/us-bans-chinese-telecom-surveillance-cameras/a-63895206. [Last accessed on 25 Dec 2024].
20. Morrison R. UK government ban for Chinese Hikvision CCTV cameras. Tech Monitor; 2022. Accessed: 2024-06-30. Available from: https://techmonitor.ai/government-computing/hikvision-ban-uk-government-oliver-dowden. [Last accessed on 25 Dec 2024].
21. Blake E. Government department removes Chinese cameras that caught Matt Hancock's affair; 2022. Accessed: 2024-06-10. Available from: https://www.standard.co.uk/news/uk/hikvision-chinese-cameras-cctv-dwp-banned-matt-hancock-affair-b1008586.html. [Last accessed on 25 Dec 2024].
22. National intelligence service, Republic of Korea. Security Conformance Verification Policy for Product Family of Image Information Processing Devices in Public Sector; 2024. Accessed: 2024-06-10. Available from: https://www.ncsc.go.kr:4018/main/cop/bbs/selectBoardArticle.do?bbsId=SecurityNotification_main&nttId=127788&menuNo=030000&subMenuNo=031200&thirdMenuNo= . [Last accessed on 25 Dec 2024].
26. Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Process 2010;90:727-52.
28. Simmons GJ. The prisoners' problem and the subliminal channel. In: Advances in Cryptology: Proceedings of Crypto 83. Springer; 1984. pp. 51-67.
30. National Institute of Standards and Technology. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology; 2010. SP 800-22 Rev. 1a. Accessed: 2024-06-10.
31. Telecommunications Technology Association. Guideline for the collection and application of noise source on operating systems. Telecommunications Technology Association; 2020. TTAS. KO-12.0235/R2. Available from: https://committee.tta.or.kr/data/standard_view.jsp?commit_code=PG504&pk_num=TTAK.KO-12.0235%2FR2. [Last accessed on 25 Dec 2024].
32. Park BK, Park H, Kim YS, et al. Practical true random number generator using CMOS image sensor dark noise. IEEE Access 2019;7: 91407-13.
33. Sanguinetti B, Martin A, Zbinden H, Gisin N. Quantum Random Number Generation on a Mobile Phone. Phys Rev X 2014;4: 031056.
34. Kelsey J, Schneier B, Ferguson N. Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: International Workshop on Selected Areas in Cryptography. Springer; 1999. pp. 13-33.
35. Alzhrani K, Aljaedi A. Windows and linux random number generation process: A comparative analysis. Int J Comput Appl 2015;113.
36. Ferguson N. The windows 10 random number generation infrastructure. Microsoft Corporation: Redmond, WA, USA 2019. Available from: https://download.microsoft.com/download/1/c/9/1c9813b8-089c-4fef-b2ad-ad80e79403ba/Whitepaper%20-%20The%20Windows%2010%20random%20number%20generation%20infrastructure.pdf. [Last accessed on 25 Dec 2024].
37. Dodis Y, Guo S, Stephens-Davidowitz N, Xie Z. No time to hash: On super-efficient entropy accumulation. In: Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part Ⅳ 41. Springer; 2021. pp. 548-76.
38. Turan MS, Barker E, Kelsey J, et al. Recommendation for the Entropy Sources Used for Random Bit Generation. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD; 2018.
39. ISO/IEC JTC 1 W SC 27. Information technology - security techniques - test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408. ISO/IEC 20543: 2019; 2019. Available from: https://www.iso.org/standard/68296.html. [Last accessed on 25 Dec 2024].
40. Shoup V. A computational introduction to number theory and algebra Cambridge, UK: Cambridge University Press; 2009.
41. Choi Y, Yeom Y, Kang JS. Practical entropy accumulation for random number generators with image sensor-based quantum noise sources. Entropy 2023;25.
42. Matsui M. Linear cryptanalysis method for DES cipher. In: Helleseth T, editor. Advances in Cryptology — EUROCRYPT '93. Berlin, Heidelberg: Springer Berlin Heidelberg; 1994. pp. 386-97.
43. Yoo H. Design and implementation of cryptographic random number generators based on parallel noise source; 2022. Available from: https://www.riss.kr/link?id=T16633914. [Last accessed on 25 Dec 2024].
44. Hong D, Lee JK, Kim DC, et al. LEA: A 128-bit block cipher for fast encryption on common processors. In: Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers 14. Springer; 2014. pp. 3-27. Available from: 10.1007/978-3-319-05149-9_1.
45. Barker E, Kelsey J. Recommendation for random number generation using deterministic random bit generators. National Institute of Standards and Technology; 2015. SP 800-90A Rev. 1. Accessed: 2024-06-10.
46. Barker E, Kelsey J, McKay K, Roginsky A, Turan MS. Recommendation for Random Bit Generator (RBG) Constructions. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD; 2022.
48. Barker E, Chen L. Recommendation for key-derivation methods in key-establishment schemes. National Institute of Standards and Technology; 2011. 800-56C Rev. 1. Accessed: 2024-06-10. Available from: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf.
49. Choi Y, Yeom Y, Kang JS. Subliminal channels of CRYSTALS-Kyber applicablein the black box cryptographic module and potential security threats of IP camera; 2023.
50. National Institute of Standards and Technology. Module-lattice-based key-encapsulation mechanism standard. National institute of standards and technology, gaithersburg, MD; 2023. http://dx.doi.org/https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf.