Results 41 to 50 of about 34,561 (185)

Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]

open access: yes, 2014
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core   +1 more source

Camera-based Image Forgery Localization using Convolutional Neural Networks

open access: yes, 2018
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core   +1 more source

IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference

open access: yesIEEE Access, 2020
With the prevalence of low-cost imaging devices (smartphones, tablets, camcorders, digital cameras, scanners, wearable, and IoT devices), images and videos have become the main modalities of information being exchanged in every walk of life.
Irene Amerini   +3 more
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

A comparison of forensic toolkits and mass market data recovery applications [PDF]

open access: yes, 2013
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts.
Buchanan-Wollaston, J.   +2 more
core  

ACCURACY Detection of Digital Image Forgery by Using Ant Colony Optimization Technique

open access: yesMATEC Web of Conferences, 2016
Image forgery is one of the well known fields in which researches continuously exploring new areas. In digital image forgery one can change image in many ways using several software’s, researchers exploring new algorithms to detect image forgery areas ...
Singh Sarvjit   +2 more
doaj   +1 more source

iPhone forensics methodology and tools [PDF]

open access: yes, 2008
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core   +1 more source

A Web Service for File-Level Access to Disk Images

open access: yesCode4Lib Journal, 2014
Digital forensics tools have many potential applications in the curation of digital materials in libraries, archives and museums (LAMs). Open source digital forensics tools can help LAM professionals to extract digital contents from born-digital media ...
Sunitha Misra   +2 more
doaj  

Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)

open access: yes, 2017
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on the surface label.
Kuo, C. -C. Jay   +2 more
core   +1 more source

Autoencoder with recurrent neural networks for video forgery detection

open access: yes, 2017
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy