Academic literature on the topic 'Forensics and counter-forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensics and counter-forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Forensics and counter-forensics"
Keenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.
Full textKang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (July 12, 2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (March 4, 2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textIrons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Full textFuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (May 15, 2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.
Full textIqbal, Saima, Wilayat Khan, Abdulrahman Alothaim, Aamir Qamar, Adi Alhudhaif, and Shtwai Alsubai. "Proving Reliability of Image Processing Techniques in Digital Forensics Applications." Security and Communication Networks 2022 (March 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/1322264.
Full textStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Full textBaracchi, Daniele, Dasara Shullani, Massimo Iuliani, Damiano Giani, and Alessandro Piva. "Camera Obscura: Exploiting in-camera processing for image counter forensics." Forensic Science International: Digital Investigation 38 (September 2021): 301213. http://dx.doi.org/10.1016/j.fsidi.2021.301213.
Full textDe Rosa, Alessia, Marco Fontani, Matteo Massai, Alessandro Piva, and Mauro Barni. "Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics." IEEE Signal Processing Letters 22, no. 8 (August 2015): 1132–36. http://dx.doi.org/10.1109/lsp.2015.2389241.
Full textDoyoddorj, Munkhbaatar, and Kyung-Hyune Rhee. "A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection." KIPS Transactions on Computer and Communication Systems 3, no. 5 (May 31, 2014): 163–72. http://dx.doi.org/10.3745/ktccs.2014.3.5.163.
Full textDissertations / Theses on the topic "Forensics and counter-forensics"
Nowroozi, Ehsan. "Machine Learning Techniques for Image Forensics in Adversarial Setting." Doctoral thesis, Università di Siena, 2020. http://hdl.handle.net/11365/1096177.
Full textBooks on the topic "Forensics and counter-forensics"
Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.
Full textBook chapters on the topic "Forensics and counter-forensics"
Rodger, Johnny. "Counter-forensics." In Key Essays, 78–82. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003186922-11.
Full textBöhme, Rainer, and Matthias Kirchner. "Counter-Forensics: Attacking Image Forensics." In Digital Image Forensics, 327–66. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-0757-7_12.
Full textNeha Singh and Sandeep Joshi. "Digital Image Forensics and Counter Anti-forensics." In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, 805–11. New Delhi: Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2638-3_90.
Full textKeenan, Thomas. "Counter-forensics and photography 1." In The Routledge Companion to Photography Theory, 276–92. New York : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9781315727998-19.
Full textLai, ShiYue, and Rainer Böhme. "Countering Counter-Forensics: The Case of JPEG Compression." In Information Hiding, 285–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24178-9_20.
Full textRodrigues, Marcos A., and Alan Robinson. "Fast 3D Recognition for Forensics and Counter-Terrorism Applications." In Advanced Information and Knowledge Processing, 95–109. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2140-4_7.
Full textLi, Wenjie, Benedetta Tondi, Rongrong Ni, and Mauro Barni. "Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics." In Pattern Recognition. ICPR International Workshops and Challenges, 411–24. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68780-9_34.
Full textPic, Marc Michel, Gaël Mahfoudi, Anis Trabelsi, and Jean-Luc Dugelay. "Face Manipulation Detection in Remote Operational Systems." In Handbook of Digital Face Manipulation and Detection, 413–36. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_19.
Full textSameer, Venkata Udaya, Ruchira Naskar, Nikhita Musthyala, and Kalyan Kokkalla. "Deep Learning Based Counter–Forensic Image Classification for Camera Model Identification." In Digital Forensics and Watermarking, 52–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_5.
Full textYu, Jingjing, Yifeng Zhan, Jianhua Yang, and Xiangui Kang. "A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks." In Digital Forensics and Watermarking, 3–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53465-7_1.
Full textConference papers on the topic "Forensics and counter-forensics"
Dang-Nguyen, D. T., I. D. Gebru, V. Conotter, G. Boato, and F. G. B. De Natale. "Counter-forensics of median filtering." In 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). IEEE, 2013. http://dx.doi.org/10.1109/mmsp.2013.6659298.
Full textIuliani, M., S. Rossetto, T. Bianchi, Alessia De Rosa, A. Piva, and M. Barni. "Image counter-forensics based on feature injection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2014. http://dx.doi.org/10.1117/12.2042234.
Full textGoljan, Miroslav, Jessica Fridrich, and Mo Chen. "Sensor noise camera identification: countering counter-forensics." In IS&T/SPIE Electronic Imaging, edited by Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III. SPIE, 2010. http://dx.doi.org/10.1117/12.839055.
Full textFahmy, Gamal, Abdullah Alqallaf, and Rolf Wurtz. "Phase based detection of JPEG counter forensics." In 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2015. http://dx.doi.org/10.1109/icecs.2015.7440243.
Full textValenzise, G., M. Tagliasacchi, and S. Tubaro. "Detectability-quality trade-off in JPEG counter-forensics." In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 2014. http://dx.doi.org/10.1109/icip.2014.7026080.
Full textMarra, Francesco, Giovanni Poggi, Fabio Roli, Carlo Sansone, and Luisa Verdoliva. "Counter-forensics in machine learning based forgery detection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2015. http://dx.doi.org/10.1117/12.2182173.
Full textDrescher, Adam, Brandon De Luna, Marjolein Pasman, Derek Haas, and Sheldon Landsberger. "Revamping of a Graduate Radiochemistry Course for Nuclear Forensics Applications." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81593.
Full textDeLooze, Lori L. "Counter hack: Creating a context for a cyber forensics course." In 2008 IEEE Frontiers in Education Conference (FIE). IEEE, 2008. http://dx.doi.org/10.1109/fie.2008.4720283.
Full textOsakabe, Takayuki, Miki Tanaka, Yuma Kinoshita, and Hitoshi Kiya. "CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection." In International Workshop on Advanced Image Technology 2021, edited by Wen-Nung Lie, Qian Kemao, Jae-Gon Kim, and Masayuki Nakajima. SPIE, 2021. http://dx.doi.org/10.1117/12.2590977.
Full textRaj, Aiswariya, and Deepa Sankar. "Counter Forensics: A New PRNU Based Method for Image Source Anonymization." In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2019. http://dx.doi.org/10.1109/icecct.2019.8868948.
Full text