Results 71 to 80 of about 35,854 (174)

Analisis Forensics Untuk Mendeteksi Pemalsuan Video

open access: yesJ-SAKTI (Jurnal Sains Komputer dan Informatika), 2019
The current technology is proving that the ease with which crimes occur using computer science in the field of video editing, in addition from time to time more and more video editing software and increasingly eassy to use, but the development of this technology is widely misused by video creators to manipulate video hoaxes that cause disputes, so many
Rusydi Umar   +2 more
openaire   +2 more sources

High-quality deepfakes have a heart!

open access: yesFrontiers in Imaging
IntroductionDeepfakes have become ubiquitous in our modern society, with both their quantity and quality increasing. The current evolution of image generation techniques makes the detection of manipulated content through visual inspection increasingly ...
Clemens Seibold   +8 more
doaj   +1 more source

Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive [PDF]

open access: yes
With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.
Darren Quick, Kim-Kwang Raymond Choo
core  

Forensic Engineering Use Of Digital Video

open access: yesJournal of the National Academy of Forensic Engineers, 2004
In The Past Few Years, Reasonably Priced Digital Video Equipment Has Become Available To The General Consumer. For A Couple Thousand Dollars, A Digital Camera Can Be Obtained, Which Will Provide Almost Professional Quality Images. The Images Can Be Saved Individually On Memory Sticks, Cards Or Transferred To Cd Or Dvd Discs, Depending Upon The Size Of ...
openaire   +1 more source

Video Steganalysis for Digital Forensics Investigation

open access: yes, 2020
Increasing use of steganography in espionage and exfiltration of company secrets means that it is important to find ways to detect such activity. Because the amount of data being transferred is also growing, channels that can hide larger amounts of data are going to become increasingly attractive.
openaire   +2 more sources

Forensic analysis of Kik messenger on iOS devices [PDF]

open access: yes, 2016
Morison, Gordon, Ovens, Kenneth M.
core   +1 more source

Home - About - Disclaimer - Privacy