The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence
Abstract
:1. Introduction
2. What Is Big Data
2.1. Volume, Velocity and Variety
- Volume The size of data is too large (either or both in terms of number of items or size) to be processed effectively and efficiently.
- Velocity It takes too long to extract meaningful data from the dataset. This is a feature of volume and variety but additionally refers to unstructured data.
- Variety The dataset comprises of numerous complex structures of data and includes for instance: computer access logs, imagery, financial transactions, and website navigation trees.
2.2. Digital Investigative Trends
Year | Number of e-investigations | Size of data processed (TB) |
---|---|---|
2003 | 987 | 82.3 |
2004 | 1304 | 229 |
2005 | 2977 | 457 |
2006 | 3633 | 916 |
2007 | 4634 | 1288 |
2008 | 4524 | 1756 |
2009 | 6016 | 2334 |
2010 | 6564 | 3086 |
2011 | 7629 | 4263 |
3. “Large Data” and Digital Forensics
4. Crowd Sourced Audio-Visual Evidence
4.1. Victoria Stanley Cup Riots 2011
4.2. London Riots
5. The Problems of Crowd Sourced Audio-Visual Evidence
5.1. Collecting and Managing Crowd Sourced Audio-Visual Evidence
5.2. Acquisition
5.3. Tagging
5.4. The Problem of Near Duplicate Audio-Visual Evidence
6. Conclusions
Conflicts of Interest
References
- Jacobs, A. The pathologies of big data. Commun. ACM 2009, 52, 36–44. [Google Scholar] [CrossRef]
- Lynch, C. Big data: How do your data grow? Nature 2008, 455, 28–29. [Google Scholar] [CrossRef]
- Manyika, J.; Chui, M.; Brown, B.; Bughin, J.; Dobbs, R.; Roxburgh, C.; Byers, A.H. Big Data: The Next Frontier for Innovation, Competition and Productivity. Report from McKinsey Global Institute. May 2011. Available online: http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation (accessed on 4 March 2014).
- Weier, M.H. In A Big Win For HP, Wal-Mart Chooses Neoview Data Warehouse. 2007. Available online: http://www.informationweek.com/news/201202317 (accessed on 2 June 2012).
- European Organization for Nuclear Research. Worldwide LHC Computing Grid. 2008. Available online: http://public.web.cern.ch/public/en/lhc/Computing-en.html (accessed on 2 June 2012).
- Revolution Analytics. Complex Data Sets in Genomic Diagnostics Require Multiple Analytic Methods. 2010. Available online: http://www.revolutionanalytics.com/content/complex-data-sets-genomic-diagnostics-require-multiple-analytic-methods (accessed on 2 June, 2012).
- Internet Crime Complaint Center. Internet Crime Report; Internet Crime Complaint Center: Washington D.C., Washington, USA, 2012. [Google Scholar]
- Regional Computer Forensics Laboratory (RCFL); Federal Bureau of Investigation (FBI); U.S. Department of Justice. Annual Report for Fiscal Year 2011; FBI: Washington, DC, USA, 2011. [Google Scholar]
- Hans, S.; Swinehart, G. Finding the Needle—Using Forensic Analytics to Understand What Happened—and What Might Happen; Deloitte: Boston, Masachusetts, USA, 2011. [Google Scholar]
- Federal Bureau of Investigation (FBI). Piecing Together Digital Evidence—The Computer Analysis Response Team. 2013. Available online: http://www.fbi.gov/news/stories/2013/january/piecing-together-digital-evidence/piecing-together-digital-evidence (accessed on 5 March 2014).
- FBI ordered to copy seized Dotcom data. Otago Daily Times. 20 January 2012. Available online: http://www.odt.co.nz/news/national/213394/fbi-ordered-copy-seized-dotcom-data (accessed on 5 March 2014).
- Lostprophets’ Ian Watkins: “Tech savvy” web haul. BBC News. 18 December 2013. Available online: http://www.bbc.co.uk/news/uk-wales-25435751 (accessed on 1 March 2014).
- Beebe, N. Digital forensic research: The good, the bad and the unaddressed. In Advances in Digital Forensics V, Proceedings of the Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, 26–28 January 2009; Springer Berlin Heidelberg: Berlin/Heidelberg, Germany, 2009; Volume V, pp. 17–36. [Google Scholar]
- European Network and Information Security Agency (ENISA). Cloud Computing. Benefits, risks and recommendations for information security. 2009. Available online: http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport (accessed on 2 June, 2012).
- Grispos, G.; Storer, T.; Glisson, W.B. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. Int. J. Digit. Crime Forensics 2012, 4, 28–48. [Google Scholar] [CrossRef]
- Qureshi, A. Plugging into Energy Market Diversity. In Proceedings of the 7th ACM Workshop on Hot Topics in Networks, Calgary, Canada, 6–7 October 2008.
- 2011 Stanley Cup Riot Review; Vancouver Police Department: Vancouver, Canada, 2011.
- Halliday, J. David Cameron considers banning suspected rioters from social media. In The Guardian; 11 August 2011. [Google Scholar]
- High-def CCTV cameras risk backlash, warns UK watchdog. BBC News. 3 October 2010. Available online: http://www.bbc.co.uk/news/technology-19812385 (accessed on 2 June, 2012).
- Lewis, P. You’re being watched: There’s one CCTV camera for every 32 people in the UK. In The Guardian; 2 March 2011. [Google Scholar]
- Metropolitan Police Service. 4 Days in August. Strategic Review into the Disorder of August 2011; Metropolitan Police: London, UK, 14 March 2012.
- Good Practice Guide for Computer Based Electronic Evidence; Association of Chief Police Officers: London, UK, 2007.
- National Institute of Justice. In Electronic Crime Scene Investigation: A Guide for First Responders, 1st ed.; National Institute of Justice , U.S. Department of Justice: Washington, DC, USA, 2001.
- Richard, G.G., III; Roussev, V. Next-generation digital forensics. Commun. ACM 2006, 49, 76–80. [Google Scholar] [CrossRef]
- Roussev, V.; Quates, C.; Martell, R. Real-time digital forensics and triage. Digit. Investig. 2013, 10, 158–167. [Google Scholar] [CrossRef]
- Ke, Y.; Sukthankar, R.; Huston, L. Efficient Near-Duplicate Detection and Sub-Image Retrieval. In Proceedings of the 12th ACM International Conference on Multimedia (ACM Multimedia 2004), New York, NY, USA, 10–16 October 2004; p. 5.
- Chum, O.; Philbin, J.; Zisserman, A. Near Duplicate Image Detection: min-Hash and tf-idf Weighting. In Proceedings of the 19th British Machine Vision Conference (BMVC 2008), Leeds, UK, 1–4 September 2008; pp. 812–815.
- Stamm, M.C.; Lin, W.S.; Liu, K.R. Temporal forensics and anti-forensics for motion compensated video. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1315–1329. [Google Scholar] [CrossRef]
- Cano, P.; Batle, E.; Kalker, T.; Haitsma, J. A Review of Algorithms for Audio Fingerprinting. In Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing, St. Thomas, Virgin Islands, USA, 9–11 December 2002; pp. 169–173.
- Haitsma, J.; Kalker, T. A Highly Robust Audio Fingerprinting System. In Proceedings of the 3rd International Conference on Music Information Retrieval (ISMIR 2002), Paris, France, 13–17 October 2002; pp. 107–115.
- Cano, P.; Batlle, E.; Gómez, E.; de Campos Teixeira Gomes, L.; Bonnet, M. Audio fingerprinting: concepts and applications. In Computational Intelligence for Modelling and Prediction; Halgamuge, S.K., Wang, L., Eds.; Springer: Berlin, Germany, 2005; pp. 233–245. [Google Scholar]
- Liu, J.; Huang, Z.; Shen, H.T.; Cui, B. Correlation-based retrieval for heavily changed near-duplicate videos. ACM Trans. Inf. Syst. 2011, 29, 21–46. [Google Scholar]
- Wang, H.; Shen, Y.; Wang, L.; Zhufeng, K.; Wang, W.; Cheng, C. Large-scale multimedia data mining using MapReduce framework. In Proceedings of the IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, 3–6 December 2012; pp. 287–292.
- PhotoDNA Newsroom. Microsoft News Center. 10 September 2013. Available online: http://www.microsoft.com/en-us/news/presskits/photodna/ (accessed on 10 November 2013).
© 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Lallie, H.S. The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence. Future Internet 2014, 6, 190-202. https://doi.org/10.3390/fi6020190
Lallie HS. The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence. Future Internet. 2014; 6(2):190-202. https://doi.org/10.3390/fi6020190
Chicago/Turabian StyleLallie, Harjinder Singh. 2014. "The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence" Future Internet 6, no. 2: 190-202. https://doi.org/10.3390/fi6020190
APA StyleLallie, H. S. (2014). The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence. Future Internet, 6(2), 190-202. https://doi.org/10.3390/fi6020190