Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
completely equipped to assimilate the detailed and complicated technical aspects of video forensics. Keywords Video forgery detection · Video tamper detection · Passive-blind video forensics · Video anti-forensics · Video content... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer security
The old adage, "seeing is believing", no longer holds true in modern society. Digital media has paved the way for anyone to doctor images and for videos to misrepresent truth. The lines between fact, entertainment, advertising,... more
    • by 
    •   3  
      MisinformationDigital Forensics and Cyber InvestigationSocial Media and Fake News/Propaganda
With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for... more
    • by 
    •   5  
      Digital InvestigationDigital ForensicsDIGITAL EVIDENCE AND INVESTIGATIONDigital Forensics and Cyber Investigation
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The... more
    • by 
    •   5  
      Software SecuritySecurity and PrivacyCyber SecurityDigital Forensics and Cyber Investigation
    • by 
    •   8  
      Formal AnalysisDigital ForensicsCase StudyLiquid State Machine
In the wake of widespread proliferation of inexpensive and easy-to-use digital content editing software, digital videos have lost the idealized reputation they once held as universal, objective and infallible evidence of occurrence of... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Forensic, Cyber Crime, Cyber Security
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media,... more
    • by 
    •   6  
      Digital InvestigationDigital ForensicsDigital Investigation,Computer Forensics, Computer securityDigital Forensic, Cyber Crime, Cyber Security
Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited, because special expertise is needed. Reverse engineering is one of many solution that can carry out malware... more
    • by 
    •   3  
      Malware AnalysisInternet of Things (IoT)Digital Forensics and Cyber Investigation
Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas... more
    • by 
    •   2  
      Digital Forensics and Cyber InvestigationEmail Spoofing
This paper presents a robust signature verification and forgery detection system using Additive fuzzy and TS modeling technique. The features of various handwritten signatures are sampled with proper analysis and encapsulated to devise an... more
    • by  and +1
    • Digital Forensics and Cyber Investigation
In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this... more
    • by 
    •   2  
      Deep LearningDigital Forensics and Cyber Investigation
A common investigative task is to identify known contraband images on a device, which typicallyinvolves calculating cryptographic hashes for all the files on a disk and checking these against adatabase of known contraband.... more
    • by  and +1
    •   4  
      Computer ForensicsDigital ForensicsComputer Forensics for Cyberspace CrimesDigital Forensics and Cyber Investigation