We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 2,710 results
  1. SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES

    Quick response codes are widely used for tagging products, sharing information and making digital payments due to their robustness against...
    Pulkit Garg, Saheb Chhabra, ... Monika Gupta in Advances in Digital Forensics XVII
    Conference paper 2021
  2. What’s in This Book and Why?

    Multimedia forensics is a societally important and technically challenging research area that will need significant effort for the foreseeable...
    Husrev Taha Sencar, Luisa Verdoliva, Nasir Memon in Multimedia Forensics
    Chapter Open access 2022
  3. Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of...

    Thea Riebe, Julian Bäumler, ... Christian Reuter in Computer Supported Cooperative Work (CSCW)
    Article Open access 04 April 2023
  4. Sensor Fingerprints: Camera Identification and Beyond

    Every imaging sensor introduces a certain amount of noise to the images it captures—slight fluctuations in the intensity of individual pixels even...
    Matthias Kirchner in Multimedia Forensics
    Chapter Open access 2022
  5. Forged document detection and writer identification through unsupervised deep learning approach

    In recent years, there has been a significant increase in document forgery, which includes the fraudulent replication of currency, diplomas, and...

    Prachi Tyagi, Khushboo Agarwal, ... Ritu Rani in Multimedia Tools and Applications
    Article 19 July 2023
  6. H4VDM: H.264 Video Device Matching

    Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in...
    Conference paper 2023
  7. A Robust Approach for Crop Misalignment Estimation in Single and Double JPEG Compressed Images

    In forensics investigation, information about the crop performed after a JPEG compression can be useful exploited to reconstruct the manipulation...
    Giovanni Puglisi, Sebastiano Battiato in Image Analysis and Processing - ICIAP 2023 Workshops
    Conference paper 2024
  8. Machine Learning-Based Online Source Identification for Image Forensics

    Source camera identification is central to multimedia forensics with much research effort addressing to this problem. The assumption made by most...
    Yonggang Huang, Lei Pan, ... Jun Zhang in Cyber Security Meets Machine Learning
    Chapter 2021
  9. Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device

    The IoT devices have proliferated into human lives from simple mundane to advanced lifesaving activities by means of automation, control and...

    Kapilan Kulayan Arumugam Gandhi, Chamundeswari Arumugam in International Journal of Information Security
    Article 05 December 2022
  10. Incident Response

    Turning away from law enforcement, computer forensics is a common part of modern-day incident response. Incident response is essentially the practice...
    Joakim Kävrestad in Fundamentals of Digital Forensics
    Chapter 2020
  11. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security

    The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data...

    Ashok Yadav, Atul Kumar, Vrijendra Singh in Artificial Intelligence Review
    Article 15 March 2023
  12. Computer and Network Forensics

    This chapter discusses what constitutes digital evidence, the collection and analysis of digital evidence, the chain of custody, the writing of the...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2020
  13. Triage

    Two major challenges in modern-day forensics are urgency and volume of data. Needless to say, modern computers can carry large amounts of data, and...
    Joakim Kävrestad, Marcus Birath, Nathan Clarke in Fundamentals of Digital Forensics
    Chapter 2024
  14. Computer security incident response teams: are they legally regulated? The Swiss example

    Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling...

    Pauline Meyer, Sylvain Métille in International Cybersecurity Law Review
    Article Open access 08 November 2022
  15. ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS

    Industrial control systems are increasingly targeted by cyber attacks. However, it is difficult to conduct forensic investigations of industrial...
    Marietheres Dietz, Ludwig Englbrecht, Günther Pernul in Advances in Digital Forensics XVII
    Conference paper 2021
  16. An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration

    Cyberattacks are occurring increasingly frequently as cyber science advances and people utilize the internet and other technology on a regular basis....
    Saswati Chatterjee, Lal Mohan Pattnaik, Suneeta Satpathy in Intelligent Systems and Machine Learning
    Conference paper 2023
  17. Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study

    Mobile digital forensics science is develo** on a daily basis, and every day there is a new tool introduced and a new challenge as well. This...
    Chapter 2022
  18. High-Quality PRNU Anonymous Algorithm for JPEG Images

    The utilization of Photo Response Non-Uniformity (PRNU) technology has found extensive application in the field of multimedia forensics, particularly...
    Jian Li, Huanhuan Zhao, ... Zhengzhong Zhao in Digital Forensics and Watermarking
    Conference paper 2024
  19. Blockchain-based tamper-proof and transparent investigation model for cloud VMs

    In cloud forensics, ensuring the integrity of the evidence such that it is admissible in a court of law is essential. There is always a possibility...

    Pranitha Sanda, Digambar Pawar, V. Radha in The Journal of Supercomputing
    Article 25 May 2022
  20. Image Forensics

    Hany Farid in Computer Vision
    Living reference work entry 2020
Did you find what you were looking for? Share feedback.