Results 61 to 70 of about 71,532 (148)

A survey of contemporary enterprise storage technologies from a digital forensics perspective

open access: yesJournal of Digital Forensics, Security and Law, 2011
As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems.
Gregory H. Carlton, Joe Matsumoto
doaj  

Image Processing-Based Application for Determining Wound Types in Forensic Medical Cases

open access: yesJurnal Nasional Teknik Elektro
Wounds result from physical violence that damages the continuity of body tissues and are frequently observed in forensic medicine and medicolegal science.
Elvira Sukma Wahyuni   +4 more
doaj   +1 more source

Replication of Known Dental Characteristics in Porcine Skin: Emerging Technologies for the Imaging Specialist [PDF]

open access: yes, 2014
This study demonstrates that it is sometimes possible to replicate patterns of human teeth in pig skin and determine scientifically that a given injury pattern (bite mark) correlates with the dentitions of a very small proportion of a population dataset,
Ahn, Kwang Woo   +9 more
core   +1 more source

Computer Forensics Field Triage Process Model

open access: yesJournal of Digital Forensics, Security and Law, 2006
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial.
Marcus K. Rogers   +4 more
doaj  

The determination of identity and uniqueness of color laser printouts of Ricoh® brand by Adobe® Creative Cloud Photoshop® 2018

open access: yesEgyptian Journal of Forensic Sciences, 2019
Background Printer forensics is a sub-branch of digital forensic science encompassing the identification of the source of any printout by different means.
Ahmad S. Salim, Asmaa A. Abdalla
doaj   +1 more source

An Analysis of Forensic Imaging in the Absence of Write-Blockers

open access: yesJournal of Digital Forensics, Security and Law, 2014
Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker
Gary C Kessler, Greg H Carlton
doaj  

MATADOR: a magic matrix-based framework for tamper detection and image recovery

open access: yesJournal of King Saud University: Computer and Information Sciences
Ensuring the integrity and authenticity of digital medical images is crucial for healthcare security and digital forensics, as image tampering can have serious consequences.
Thilina Mendis   +2 more
doaj   +1 more source

Sensor pattern noise and image similarity for picture‐to‐identity linking

open access: yesIET Computer Vision, 2015
Picture sharing through social networks has become a prominent phenomenon, producing a large amount of data that law enforcers may be entitled to use, under the proper legal framework, as a source of information for investigating a crime.
Riccardo Satta, Andrea Ciardulli
doaj   +1 more source

Artificial intelligence fosters forensic odontology-a narrative review

open access: yesEgyptian Journal of Forensic Sciences
This review aims to evaluate the advancements in Forensic Odontology (FO), focusing on the integration of digital technologies and artificial intelligence (AI) to improve human identification through dental characteristics, particularly in the context of
Aya Mohammed Gaber   +6 more
doaj   +1 more source

Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive [PDF]

open access: yes
With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.
Darren Quick, Kim-Kwang Raymond Choo
core  

Home - About - Disclaimer - Privacy