Results 71 to 80 of about 34,561 (185)

Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive [PDF]

open access: yes
With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.
Darren Quick, Kim-Kwang Raymond Choo
core  

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

open access: yesJournal of Cybersecurity and Privacy
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate
Abeer Al-Hyari   +3 more
doaj   +1 more source

Forensic analysis for digital images

open access: yes, 2011
IX n.s. Nowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been produced and shipped in 2010.
openaire   +2 more sources

Innovative Learning in a Digital Forensics Laboratory: Tools and Techniques for Data Recovery

open access: yesApplied Sciences
Electronic evidence is an essential component in most legal trials of criminal activities, and digital forensics is therefore a crucial support for law enforcement investigations.
Carlos Cruz
doaj   +1 more source

MMFD-Net: A Novel Network for Image Forgery Detection and Localization via Multi-Stream Edge Feature Learning and Multi-Dimensional Information Fusion

open access: yesMathematics
With the rapid advancement of image processing techniques, digital image forgery detection has emerged as a critical research area in information forensics.
Haichang Yin   +3 more
doaj   +1 more source

Audit: Automated Disk Investigation Toolkit

open access: yesJournal of Digital Forensics, Security and Law, 2014
Software tools designed for disk analysis play a critical role today in forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally trained users with IT ...
Umit Karabiyik, Sudhir Aggarwal
doaj  

Adversarial Shadows in Digital Forensics: New Insights Into File Fragment Classification Vulnerabilities and Defenses

open access: yesIEEE Access
The paper is a comprehensive survey of adversarial attacks on file fragment classification (FFC) models - a relatively unexplored area in digital forensics, given the increasing application of machine learning techniques.
Teena Mary, C. S. Sreeja
doaj   +1 more source

Analysis of Forensic Disk Imaging Tools for Data Acquisition and Preservation

open access: yesJournal of Informatics and Web Engineering
The identification, preservation, analysis, and presentation of electronic evidence to support legal or organizational inquiries constitute the discipline of digital forensics, which is crucial to contemporary investigations.
Michelle Chee Ern Lim   +6 more
doaj   +1 more source

Image Forgery Detection Techniques: Latest Trends and Key Challenges

open access: yesIEEE Access
The improvement and accessibility of high-resolution cameras have significantly increased image capturing by various media. Different editing tools are available that are frequently used to improve image quality, resulting in the alteration of images. So,
Poulomi Deb   +3 more
doaj   +1 more source

CNN-based Approach for Robust Detection of Copy-Move Forgery in Images

open access: yesInteligencia Artificial
With the rise of high-quality forged images on social media and other platforms, there is a need for algorithms that can recognize the originality. Detecting copy-move forgery is essential for ensuring the authenticity and integrity of digital images ...
Arivazhagan S   +3 more
doaj  

Home - About - Disclaimer - Privacy