Results 41 to 50 of about 21,877 (187)
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
Source acquisition device identification from recorded audio aims to identify the source recording device by analyzing the intrinsic characteristics of audio, which is a challenging problem in audio forensics.
Chunyan Zeng +3 more
doaj +1 more source
Anti-Forensics of Double Compressed MP3 Audio
The widespread availability of audio editing software has made it easy to create acoustically convincing digital audio forgeries. To address this problem, more and more attention has been paid to the field of digital audio forensics. There has been little work, however, in the field of anti-forensics, which seeks to develop a set of techniques designed
Biaoli Tao +3 more
openaire +2 more sources
Inferring Room Semantics Using Acoustic Monitoring
Having knowledge of the environmental context of the user i.e. the knowledge of the users' indoor location and the semantics of their environment, can facilitate the development of many of location-aware applications.
Harras, Khaled A. +2 more
core +1 more source
Digital forensics is one of the prime professional fields for law enforcement forces. It is also a major active research topic in the cybersecurity field. Internet traffic and content analysis are leading tasks within this research area.
Soliman Abd Elmonsef Sarhan +2 more
doaj +1 more source
ABSTRACT This study examined how male rape myths, racial/ethnicity biases, and sexuality stereotypes influence verdicts in male‐on‐male rape trials—an area that is currently under‐researched. A sample of 463 participants read a mock rape trial, where both the defendant and complainant were male, with defendant ethnicity (White, Black, Asian) and ...
Lee J. Curley +3 more
wiley +1 more source
ABSTRACT Objectives Men with presentations consistent with borderline personality disorder (BPD) and antisocial personality disorder (ASPD) are highly visible in community and forensic services. However, mis/underdiagnosis may be a consequence of their lower than expected engagement with mental health services, and when they do engage, systematised ...
Jillian Helen Broadbear +4 more
wiley +1 more source
Dataset for file fragment classification of audio file formats
Objectives File fragment classification of audio file formats is a topic of interest in network forensics. There are a few publicly available datasets of files with audio formats.
Atieh Khodadadi, Mehdi Teimouri
doaj +1 more source
Abstract Background: Individuals with severe visual impairments frequently refrain from regular physical activity due to multiple barriers, including transportation difficulties, financial constraints, and limited availability of exercise programs tailored to their needs. These factors often contribute to a gradual decline in mobility and independence.
Luca Correale +7 more
wiley +1 more source
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide +3 more
core +1 more source

