Results 21 to 30 of about 36,393 (285)

A user-oriented network forensic analyser: the design of a high-level protocol analyser [PDF]

open access: yes, 2014
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g.
Clarke, Nathan   +3 more
core   +2 more sources

Identification of Social-Media Platform of Videos through the Use of Shared Features

open access: yesJournal of Imaging, 2021
Videos have become a powerful tool for spreading illegal content such as military propaganda, revenge porn, or bullying through social networks. To counter these illegal activities, it has become essential to try new methods to verify the origin of ...
Luca Maiano   +3 more
doaj   +1 more source

Face recognition technologies for evidential evaluation of video traces [PDF]

open access: yes, 2017
Human recognition from video traces is an important task in forensic investigations and evidence evaluations. Compared with other biometric traits, face is one of the most popularly used modalities for human recognition due to the fact that its ...
Li, Chang-Tsun, Wei, Xingjie
core   +1 more source

Reference face graph for face recognition [PDF]

open access: yes, 2014
Face recognition has been studied extensively; however, real-world face recognition still remains a challenging task. The demand for unconstrained practical face recognition is rising with the explosion of online multimedia such as social networks, and ...
An, L, Bhanu, B, Kafai, M
core   +3 more sources

Color-decoupled photo response non-uniformity for digital image forensics [PDF]

open access: yes, 2012
The last few years have seen the use of photo response non-uniformity noise (PRNU), a unique fingerprint of imaging sensors, in various digital forensic applications such as source device identification, content integrity verification and authentication.
Li, Chang-Tsun, Li, Yue
core   +2 more sources

Investigating visualisation techniques for rapid triage of digital forensic evidence [PDF]

open access: yes, 2019
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation.
Bayne, Ethan, Hales, Gavin
core   +2 more sources

Video inter-frame tampering detection algorithm fusing multiple features

open access: yes网络与信息安全学报, 2020
Traditional passive forensics of video inter-frame tampering often relies on single feature.Each of these features is usually suitable for certain types of videos,while has low detection accuracy for other videos.To combine the advantages of these ...
Hui XIAO   +4 more
doaj   +3 more sources

Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method

open access: yesCommIT Journal, 2021
Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and ...
Sunardi Sunardi   +3 more
doaj   +1 more source

Provenance analysis for instagram photos [PDF]

open access: yes, 2019
As a feasible device fingerprint, sensor pattern noise (SPN) has been proven to be effective in the provenance analysis of digital images. However, with the rise of social media, millions of images are being uploaded to and shared through social media ...
CT Li   +12 more
core   +1 more source

Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics

open access: yesIEEE Access, 2018
Video copy-move forgery detection is one of the hot topics in multimedia forensics to protect digital videos from malicious use. Several approaches have been presented through analyzing the side effect caused by copy-move operation.
Shan Jia   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy