Results 41 to 50 of about 34,561 (185)
Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core +1 more source
Camera-based Image Forgery Localization using Convolutional Neural Networks
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core +1 more source
IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference
With the prevalence of low-cost imaging devices (smartphones, tablets, camcorders, digital cameras, scanners, wearable, and IoT devices), images and videos have become the main modalities of information being exchanged in every walk of life.
Irene Amerini +3 more
doaj +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
A comparison of forensic toolkits and mass market data recovery applications [PDF]
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts.
Buchanan-Wollaston, J. +2 more
core
ACCURACY Detection of Digital Image Forgery by Using Ant Colony Optimization Technique
Image forgery is one of the well known fields in which researches continuously exploring new areas. In digital image forgery one can change image in many ways using several software’s, researchers exploring new algorithms to detect image forgery areas ...
Singh Sarvjit +2 more
doaj +1 more source
iPhone forensics methodology and tools [PDF]
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core +1 more source
A Web Service for File-Level Access to Disk Images
Digital forensics tools have many potential applications in the curation of digital materials in libraries, archives and museums (LAMs). Open source digital forensics tools can help LAM professionals to extract digital contents from born-digital media ...
Sunitha Misra +2 more
doaj
Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on the surface label.
Kuo, C. -C. Jay +2 more
core +1 more source
Autoencoder with recurrent neural networks for video forgery detection
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide +3 more
core +1 more source

