Results 61 to 70 of about 43,462 (194)

The impace of custom ROM backups on android external storage erasure [PDF]

open access: yes, 2014
The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system.
Hannay, Peter, Hope, Haydon P
core   +1 more source

Forensic Analysis of Deepfake Audio Detection

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE)
The rise of deepfake audio technologies poses significant challenges to authenticity verification, necessitating effective detection methods. Traditional techniques, such as manual forensic analysis, basic machine learning approaches, speech-to-text conversion, and Short-Time Fourier Transform (STFT) analysis, have been employed to identify manipulated
Dr. Girija Chiddarwar   +4 more
openaire   +1 more source

Forensic audio authentication analysis technique of first or higher generation copies of analog magnetic audio tapes

open access: yesMedicine Science, 2018
In forensic audio examination, standard listening and visual sound spectrogram analysis methods often lead to incorrect conclusions due to the losses in data when the tape is copied.
Ege Niyazi Gural, Melih Pazarci
doaj   +1 more source

Constrained speaker linking [PDF]

open access: yes, 2014
In this paper we study speaker linking (a.k.a.\ partitioning) given constraints of the distribution of speaker identities over speech recordings. Specifically, we show that the intractable partitioning problem becomes tractable when the constraints pre ...
Brümmer, Niko, van Leeuwen, David A.
core   +1 more source

INNOVATIVE DATA HIDING SECURITY MODEL USING FORENSIC AUDIO VIDEO CRYPTO-STEGANOGRAPHY

open access: yesICTACT Journal on Communication Technology, 2017
Secret information concealing using steganography is simple but to maintain its security, perceptibility, robustness, embedding capacity and good recovery of both cover as well as secret information are the major issues.
Sunil K Moon, Rajeshree D Raut
doaj   +1 more source

An Audio Data Representation for Traffic Acoustic Scene Recognition

open access: yesIEEE Access, 2020
Acoustic scene recognition (ASR), recognizing acoustic environments given an audio recording of the scene, has a wide range of applications, e.g. robotic navigation and audio forensic.
Dazhi Jiang   +6 more
doaj   +1 more source

Electronic Recording of Police Interrogations [PDF]

open access: yes, 2019
Policy recommendation: All Virginia state law enforcement agencies to adopt a written department policy requiring electronic recording of any custodial interrogation conducted in a place of ...
Cleary, Hayley
core   +1 more source

Mobile device forensics: a snapshot [PDF]

open access: yes
In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple’s iOS, Google’s Android and RIM’s BlackBerry operating systems.
Ben Martini   +3 more
core  

Forensic Face Recognition: A Survey [PDF]

open access: yes, 2010
Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition.
Ali, Tauseef   +2 more
core   +2 more sources

Automated Detection of Container-based Audio Forgery Using Crowdsourcing for Dataset Building

open access: yesAptisi Transactions on Technopreneurship
This research paper introduces a new approach for detecting digital audio file forgeries, highlighting entrepreneurship spirit through innovation and market adaptability.
Homin Son, Sung Won Baek, Jae Wan Park
doaj   +1 more source

Home - About - Disclaimer - Privacy