To see the other types of publications on this topic, follow the link: Forensics and counter-forensics.

Journal articles on the topic 'Forensics and counter-forensics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensics and counter-forensics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.

Full text
Abstract:
Digital forensics is a rapidly evolving field that plays a critical role in investigating cybercrime, data breaches, and illicit activities across various domains, including blockchain, cryptocurrency, and the dark web. This paper explores key areas of digital forensics, including computer forensics, mobile forensics, network forensics, cloud forensics, IoT forensics, and embedded system forensics. Emerging trends such as drone and satellite forensics highlight the increasing scope of forensic investigations beyond traditional computing environments. Additionally, the study delves into blockch
APA, Harvard, Vancouver, ISO, and other styles
2

DOVHAN, O., and T. TKACHUK. "Combating counter-forensics as a component of digital security of critical infrastructure of Ukraine." INFORMATION AND LAW, no. 2(53) (June 24, 2025): 115–25. https://doi.org/10.37750/2616-6798.2025.2(53).334135.

Full text
Abstract:
The article examines counter-forensics as one of the most dangerous forms of digital interference, which poses a direct threat to the digital security of critical infrastructure of Ukraine in the conditions of a full-scale war. It is substantiated that counter-forensic technologies — including wiping, fileless attacks, steganography, deepfakes, and other tools designed to conceal digital traces — are actively employed in contemporary cyberattacks targeting the stability of critical elements of state infrastructure. The paper provides an interdisciplinary analysis of the technical, legal and or
APA, Harvard, Vancouver, ISO, and other styles
3

Keenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.

Full text
Abstract:
Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we present the most important data-driven algorithms that deal with the problem of image source forensics. To make order in this vast field, we have divided the area in five sub-topics: source camera identification, recaptured image forensic, computer g
APA, Harvard, Vancouver, ISO, and other styles
6

Irons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.

Full text
Abstract:
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universi
APA, Harvard, Vancouver, ISO, and other styles
7

Amit, Kapoor, and Vinod Mahor Prof. "Broadcasting Forensics Using Machine Learning Approaches." International Journal of Trend in Scientific Research and Development 7, no. 3 (2023): 1034–45. https://doi.org/10.5281/zenodo.8068297.

Full text
Abstract:
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and authenticate Multimedia content. Over the past decade, consumer-grade imaging sensors have become increasingly prevalent, generating vast quantities of images and videos that are used for various public and private communication purposes. Such applications include publicity, advocacy, disinformation, and deception, among others. This paper aims to develop tools that can extract knowledge from these visuals and comprehend their provenance. However, many images and videos undergo modification and mani
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.

Full text
Abstract:
The Internet of Things forensics is a specialised field within digital forensics that focuses on the identification of security incidents, as well as the collection and analysis of evidence with the aim of preventing future attacks on IoT networks. IoT forensics differs from other digital forensic fields due to the unique characteristics of IoT devices, such as limited processing power and connectivity. Although numerous studies are available on IoT forensics, the field is rapidly evolving, and comprehensive surveys are needed to keep up with new developments, emerging threats, and evolving be
APA, Harvard, Vancouver, ISO, and other styles
9

Fuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.

Full text
Abstract:
Forensics is proposed as a means to understand, trace, and recompile data and computational activities. It has a securitocratic dimension and one that is being developed as a means of opening processes, events and systems into a more public state. This article proposes an analysis of forces at play in the circulation of a ‘screener’ of Quentin Tarantino’s The Hateful Eight and associated files, to suggest that forensic approaches used to control flows of data may be repurposed for dissemination. The article maps a brief history of digital forensics and sets out some of its political entailment
APA, Harvard, Vancouver, ISO, and other styles
10

Imeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.

Full text
Abstract:
Digital forensics is a new science and follows the rapid changes in the computer environment, expanding into many disciplines, which turns it into a very challenging field that requires the continuous development of methodologies and tools to counter the ever-newer changes in cybercrime. The research subject refers to the analysis and challenges of digital forensics, tracking of hard drives, recovery of deleted files from the hard drive, their quality after recovery, and the possibility of creating forensic images on physically damaged hard drives. The research is based on digital forensics an
APA, Harvard, Vancouver, ISO, and other styles
11

Iqbal, Saima, Wilayat Khan, Abdulrahman Alothaim, Aamir Qamar, Adi Alhudhaif, and Shtwai Alsubai. "Proving Reliability of Image Processing Techniques in Digital Forensics Applications." Security and Communication Networks 2022 (March 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/1322264.

Full text
Abstract:
Binary images have found its place in many applications, such as digital forensics involving legal documents, authentication of images, digital books, contracts, and text recognition. Modern digital forensics applications involve binary image processing as part of data hiding techniques for ownership protection, copyright control, and authentication of digital media. Whether in image forensics, health, or other fields, such transformations are often implemented in high-level languages without formal foundations. The lack of formal foundation questions the reliability of the image processing te
APA, Harvard, Vancouver, ISO, and other styles
12

Elliethy, Ahmed. "Neural noiseprint transfer: a generic noiseprint-based counter forensics framework." PeerJ Computer Science 9 (April 27, 2023): e1359. http://dx.doi.org/10.7717/peerj-cs.1359.

Full text
Abstract:
A noiseprint is a camera-related artifact that can be extracted from an image to serve as a powerful tool for several forensic tasks. The noiseprint is built with a deep learning data-driven approach that is trained to produce unique noise residuals with clear traces of camera-related artifacts. This data-driven approach results in a complex relationship that governs the noiseprint with the input image, making it challenging to attack. This article proposes a novel neural noiseprint transfer framework for noiseprint-based counter forensics. Given an authentic image and a forged image, the prop
APA, Harvard, Vancouver, ISO, and other styles
13

Muthusamy, Dr P., Shanmugam V, Kapilsurya R, and Saran Kumar R. "Python-Based Security Operations Center (SOC) and Forensics Analysis for Incident Cyber Threats." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2592–96. http://dx.doi.org/10.22214/ijraset.2024.60403.

Full text
Abstract:
Abstract: The increasing complexity and frequency of cyber threats demand robust solutions for incident detection, analysis, and response. Security Operations Centers (SOCs) play a pivotal role in safeguarding organizational assets by monitoring, detecting, and mitigating cyber threats. This paper presents a Python-based approach for enhancing SOC capabilities and conducting forensics analysis to counter incident cyber threats effectively. Leveraging Python's versatility and extensive libraries, this research proposes a comprehensive framework that integrates various cybersecurity tools and te
APA, Harvard, Vancouver, ISO, and other styles
14

Chlebowicz, Piotr, and Tomasz Safjański. "Considerations Regarding the Typology of Counter-Detection Measures in the Light of Quantitative Research on Organised Crime Groups that Recruit Football Hooligans." Białostockie Studia Prawnicze 29, no. 4 (2024): 161–82. https://doi.org/10.15290/bsp.2024.29.04.10.

Full text
Abstract:
Abstract Through the application of counter-detection activities, football hooligan groups in Poland have created organised crime networks, that are able to identify, locate and neutralise police intelligence activities. In the 20th and 21st centuries, the issue of counter-detection activities undertaken by members of organised crime groups has not been acknowledged by researchers. Therefore, the existing body of work on forensic tactics as a scientific discipline needs to be critically analysed, and new definitions need to be adopted. The scope of the study includes definitions of forms of co
APA, Harvard, Vancouver, ISO, and other styles
15

Kenneth Chukwujekwu Nwafor, Ivan Zziwa, Daniel O. T. Ihenacho, and Oladele J Adeyeye. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. http://dx.doi.org/10.30574/wjarr.2024.24.1.3212.

Full text
Abstract:
In the realm of cybersecurity, the integrity of forensic investigations is paramount, especially as the volume and complexity of data continue to escalate. This paper explores innovative approaches to complex data forensics, focusing on the methodologies used to assess error rates in data retrieval and analysis. High error rates in forensic processes can compromise the reliability of findings, leading to erroneous conclusions that may impact security measures and legal proceedings. This research examines various techniques for error rate assessment, including statistical methods and data valid
APA, Harvard, Vancouver, ISO, and other styles
16

Kenneth, Chukwujekwu Nwafor, Zziwa Ivan, O. T. Ihenacho Daniel, and J. Adeyeye Oladele. "Innovative approaches in complex data forensics: error rate assessment and its impact on cybersecurity." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1772–92. https://doi.org/10.5281/zenodo.15045230.

Full text
Abstract:
In the realm of cybersecurity, the integrity of forensic investigations is paramount, especially as the volume and complexity of data continue to escalate. This paper explores innovative approaches to complex data forensics, focusing on the methodologies used to assess error rates in data retrieval and analysis. High error rates in forensic processes can compromise the reliability of findings, leading to erroneous conclusions that may impact security measures and legal proceedings. This research examines various techniques for error rate assessment, including statistical methods and data valid
APA, Harvard, Vancouver, ISO, and other styles
17

Stevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.

Full text
Abstract:
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy
APA, Harvard, Vancouver, ISO, and other styles
18

Baracchi, Daniele, Dasara Shullani, Massimo Iuliani, Damiano Giani, and Alessandro Piva. "Camera Obscura: Exploiting in-camera processing for image counter forensics." Forensic Science International: Digital Investigation 38 (September 2021): 301213. http://dx.doi.org/10.1016/j.fsidi.2021.301213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

De Rosa, Alessia, Marco Fontani, Matteo Massai, Alessandro Piva, and Mauro Barni. "Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics." IEEE Signal Processing Letters 22, no. 8 (2015): 1132–36. http://dx.doi.org/10.1109/lsp.2015.2389241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Doyoddorj, Munkhbaatar, and Kyung-Hyune Rhee. "A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection." KIPS Transactions on Computer and Communication Systems 3, no. 5 (2014): 163–72. http://dx.doi.org/10.3745/ktccs.2014.3.5.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Venkata, Udaya Sameer, and Ruchira Naskar. "Blind Image Source Device Identification." International Journal of Information Security and Privacy 12, no. 3 (2018): 84–99. http://dx.doi.org/10.4018/ijisp.2018070105.

Full text
Abstract:
This article describes how digital forensic techniques for source investigation and identification enable forensic analysts to map an image under question to its source device, in a completely blind way, with no a-priori information about the storage and processing. Such techniques operate based on blind image fingerprinting or machine learning based modelling using appropriate image features. Although researchers till date have succeeded to achieve extremely high accuracy, more than 99% with 10-12 candidate cameras, as far as source device prediction is concerned, the practical application of
APA, Harvard, Vancouver, ISO, and other styles
22

Mehrish, Ambuj, A. V. Subramanyam, and Sabu Emmanuel. "Joint Spatial and Discrete Cosine Transform Domain-Based Counter Forensics for Adaptive Contrast Enhancement." IEEE Access 7 (2019): 27183–95. http://dx.doi.org/10.1109/access.2019.2901345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ramirez, Fanny. "The digital divide in the US criminal justice system." New Media & Society 24, no. 2 (2022): 514–29. http://dx.doi.org/10.1177/14614448211063190.

Full text
Abstract:
The growing use of digital evidence from smartphones and social media has led to a digital divide in the US criminal justice system that advantages law enforcement and prosecutors while further increasing the vulnerability of poor people and people of color who rely on public legal assistance. Drawing on a year-long ethnographic study of one of the first digital forensics laboratories in a public defender office, I argue that digital inclusion in the form of better resources for public defenders is necessary for equitable and fair representation in today’s criminal justice system. Findings sho
APA, Harvard, Vancouver, ISO, and other styles
24

Łabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal organizations aimed at reducing the effectiveness of surveillance conducted as part of operational activities." Issues of Forensic Science 298 (2017): 62–68. http://dx.doi.org/10.34836/pk.2017.298.3.

Full text
Abstract:
The article presents the essential aspects of tactics and techniques applied by criminals with an aim to reduce the effectiveness of surveillance conducted as part of operational activities. The possible actions adopted by criminals with the purpose of preventing surveilling authorities from detecting their activities are characterized. The above issues are exceptionally complicated, owing to the specifics of the activities to be discussed. To date, counter-detection activities of criminal organizations have not been within the main area of interest for forensics. This article points out the a
APA, Harvard, Vancouver, ISO, and other styles
25

Sorokin, Siim. "Plausibility Under Duress: Counter-Narrative, Suspicion and Folk Forensic Contra-Plotting." Narrative Works 13, no. 1 (2024): 127–47. https://doi.org/10.7202/1115727ar.

Full text
Abstract:
How would it portend to analytical contextualization as well as specific theorization when instances where narrative kernels, once weaved into alternative epistemologies, make their way into, and become (re-)”plotted” on an inherently political platform, a session of state Parliament? Motivated by such an inquiry, the present multidisciplinary paper develops its theoretical argument by interrogating the notions of “counter-narrating” and “counter-narrative” cast on the intertwined conceptual landscape of forensics, tracking, and suspicion. The theoretical discussion is advanced further by deve
APA, Harvard, Vancouver, ISO, and other styles
26

Łabuz, Paweł, and Tomasz Safjański. "Counter-detection activities of criminal groups aimed at limiting the effectiveness of operational and procedural control and interception of conversations." Issues of Forensic Science 297 (2017): 72–78. http://dx.doi.org/10.34836/pk.2017.297.4.

Full text
Abstract:
The article presents the essential aspects of tactics and techniques applied by criminals with an aim to reduce the effectiveness of procedural eavesdropping and operational control. The most significant methods of protecting criminal correspondence were characterized. The above issues are exceptionally complicated, owing to the specifics of the activities to be discussed. To date, counter-detection activities of criminal organizations have not been within the main area of interest for forensics. The article highlights the benefits resulting from the knowledge of criminal tactics and technique
APA, Harvard, Vancouver, ISO, and other styles
27

Dave, Aparna, Pearl Gupta, Manpreet Arora, and Pulin Saluja. "Dental Record-keeping: Reviving the Importance." Indian Journal of Dental Sciences 17, no. 1 (2025): 38–41. https://doi.org/10.4103/ijds.ijds_123_24.

Full text
Abstract:
Dental records are important documents in possession with dentists and are a fundamental requirement in delivering optimal health care. In addition to this, it is an important legal document which needs to be maintained appropriately. These records are essential components of patient care as they contain information about the patient, the opinion of the dentist, the treatment plan, the possible alternative treatment, patients’ consent, and details of possible associated complications. Adequate records help to counter the objections raised by patients. They also have a very important role in fo
APA, Harvard, Vancouver, ISO, and other styles
28

Manisha, Chang-Tsun Li, Xufeng Lin, and Karunakar A. Kotegar. "Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification." Sensors 22, no. 20 (2022): 7871. http://dx.doi.org/10.3390/s22207871.

Full text
Abstract:
Source-camera identification tools assist image forensics investigators to associate an image with a camera. The Photo Response Non-Uniformity (PRNU) noise pattern caused by sensor imperfections has been proven to be an effective way to identify the source camera. However, the PRNU is susceptible to camera settings, scene details, image processing operations (e.g., simple low-pass filtering or JPEG compression), and counter-forensic attacks. A forensic investigator unaware of malicious counter-forensic attacks or incidental image manipulation is at risk of being misled. The spatial synchroniza
APA, Harvard, Vancouver, ISO, and other styles
29

Venkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft044.

Full text
Abstract:
Abstract—To enhance the privacy and security of audio signals stored in third-party storage centers, a robust digital audio encryption and forensics watermarking scheme is proposed. The scheme incorporates the AES-GCM (Advanced Encryption Standard in Galois/Counter Mode) algorithm for authenticated encryption, ensuring both confidentiality and integrity of the audio data. In addition, we utilize Fernet symmetric encryption and PBKDF2HMAC (Password-Based Key Derivation Function 2 with HMAC) for key generation, supported by generative hash passwords to further strengthen security. The signal ene
APA, Harvard, Vancouver, ISO, and other styles
30

Venkatesh, M. "A Novel Digital Audio Encryption and Watermarking Scheme." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem.ncft043.

Full text
Abstract:
Abstract—To enhance the privacy and security of audio signals stored in third-party storage centers, a robust digital audio encryption and forensics watermarking scheme is proposed. The scheme incorporates the AES-GCM (Advanced Encryption Standard in Galois/Counter Mode) algorithm for authenticated encryption, ensuring both confidentiality and integrity of the audio data. In addition, we utilize Fernet symmetric encryption and PBKDF2HMAC (Password-Based Key Derivation Function 2 with HMAC) for key generation, supported by generative hash passwords to further strengthen security. The signal ene
APA, Harvard, Vancouver, ISO, and other styles
31

SMUSHKIN, A. B. "FORENSICS IN DIGITAL WORLDS (USING THE EXAMPLE OF ONLINE GAMES)." Vestnik Tomskogo gosudarstvennogo universiteta, no. 502 (2024): 214–19. https://doi.org/10.17223/15617793/502/22.

Full text
Abstract:
The author notes the growing need to counteract crimes committed in or with the help of “digital worlds”. Digital worlds mean artificial digital simulations of reality in the form of meta-universes of various levels (from metaverses, metacampuses of universities to full-scale metaverses, such as the one developed by Meta or simulation computer realities (from simulators to online games). The need to develop measures to counter such crimes has already been realized both by foreign public authorities (USA, UAE, etc.) and by international organizations (Interpol, etc.). The article examines crime
APA, Harvard, Vancouver, ISO, and other styles
32

Sudjayanti, Shafa alya, and Dani Hamdani. "Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 100–110. http://dx.doi.org/10.47709/brilliance.v4i1.3800.

Full text
Abstract:
Cybercrime targeting Android devices through phishing methods, especially through the WhatsApp messaging app, has emerged as a critical issue in cybersecurity. It requires comprehensive investigation and analysis. This research attempts to address this critical issue by conducting a comprehensive digital forensic investigation using the National Institute of Standards and Technology (NIST) framework methodology. Using advanced reverse engineering techniques and Vscode's APKTool extension tool, called APKLab, the research carefully examines the structure and mechanism of hidden encoded APK file
APA, Harvard, Vancouver, ISO, and other styles
33

Mulla, A. S. "Real-Time Cyber Security Protection Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 183–86. https://doi.org/10.22214/ijraset.2025.65807.

Full text
Abstract:
This report aims to examine the evolving cybersecurity threats, including DeepFakes, phishing, social engineering, and malware, and analyze detection mechanisms to counter these threats. DeepFakes, generated using advanced AI techniques, pose risks such as identity theft and disinformation, with detection models like CNNs and RNNs showing promise, albeit with reduced effectiveness against high-quality manipulations. Tools like Face Forensics++ are instrumental for training such models. Phishing, which employs deceptive techniques to steal sensitive information, is addressed through URL-based d
APA, Harvard, Vancouver, ISO, and other styles
34

Kerrakchou, Imane, Adil Abou El Hassan, Sara Chadli, Mohamed Emharraf, and Mohammed Saber. "Selection of efficient machine learning algorithm on Bot-IoT dataset for intrusion detection in internet of things networks." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (2023): 1784. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1784-1793.

Full text
Abstract:
With the growth of internet of things (IoT) systems, they have become the target of malicious third parties. In order to counter this issue, realistic investigation and protection countermeasures must be evolved. These countermeasures comprise network forensics and network intrusion detection systems. To this end, a well-organized and representative data set is a crucial element in training and validating the system's credibility. In spite of the existence of multiple networks, there is usually little information provided about the botnet scenarios used. This article provides the Bot-IoT datas
APA, Harvard, Vancouver, ISO, and other styles
35

V, Dreshpak, Prokopovych-Tkachenko D, and Rybalchenko L. "Comprehensive digital image analysis to detect manipulation." Artificial Intelligence 30, AI.2025.30(1) (2025): 77–83. https://doi.org/10.15407/jai2025.01.077.

Full text
Abstract:
Comprehensive digital image analysis plays an important role in modern digital forensics and cybersecurity, as it allows detecting fakes, tampering and hidden traces of editing in photographs or other visual data. These methods can be used by OSINT (Open Source Intelligence) specialists and investigative journalists to detect fakes and counter-propaganda. This article describes a scientific and methodological approach aimed at detecting manipulations in digital images based on a combination of various algorithms and data processing technologies. The article considers contour and gradient analy
APA, Harvard, Vancouver, ISO, and other styles
36

Kruchinina, N. V. "Criminalistic Implementation of Counteraction to the Use of Biotechnologies in the event of Commission of Criminal Offences". Lex Russica, № 2 (28 лютого 2022): 101–7. http://dx.doi.org/10.17803/1729-5920.2022.183.2.101-107.

Full text
Abstract:
Achievements in the field of biotechnology raise the standard of human life and improve its quality, open up new opportunities for social activity, including for business, and are also used when combating crime. The paper analyzes the problems associated with the study of trace substances of human biological origin, the collection and storage of genomic information, the formation of such a direction as DNA forensics. The author examines the issue of criminal threats associated with the use of biotechnologies, including crimes committed with the use of biological weapons, bioterrorism, and anal
APA, Harvard, Vancouver, ISO, and other styles
37

Kowalski, Marcin, and Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques." Photonics Letters of Poland 13, no. 2 (2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.

Full text
Abstract:
Biometric systems are becoming more and more efficient due to increasing performance of algorithms. These systems are also vulnerable to various attacks. Presentation of falsified identity to a biometric sensor is one the most urgent challenges for the recent biometric recognition systems. Exploration of specific properties of thermal infrared seems to be a comprehensive solution for detecting face presentation attacks. This letter presents outcome of our study on detecting 3D face masks using thermal infrared imaging and deep learning techniques. We demonstrate results of a two-step neural ne
APA, Harvard, Vancouver, ISO, and other styles
38

Journal, IJSREM. "Deep Fake Face Detection Using Deep Learning Tech with LSTM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28624.

Full text
Abstract:
The fabrication of extremely life like spoof films and pictures that are getting harder to tell apart from actual content is now possible because to the quick advancement of deep fake technology. A number of industries, including cybersecurity, politics, and journalism, are greatly impacted by the widespread use of deepfakes, which seriously jeopardizes the accuracy of digital media. In computer vision, machine learning, and digital forensics, detecting deepfakes has emerged as a crucial topic for study and development. An outline of the most recent cutting-edge methods and difficulties in dee
APA, Harvard, Vancouver, ISO, and other styles
39

Garcia, Jan Mark. "Exploring Deepfakes and Effective Prevention Strategies: A Critical Review." Psychology and Education: A Multidisciplinary Journal 33, no. 1 (2025): 93–96. https://doi.org/10.70838/pemj.330107.

Full text
Abstract:
Deepfake technology, powered by artificial intelligence and deep learning, has rapidly advanced, enabling the creation of highly realistic synthetic media. While it presents opportunities in entertainment and creative applications, deepfakes pose significant risks, including misinformation, identity fraud, and threats to privacy and national security. This study explores the evolution of deepfake technology, its implications, and current detection techniques. Existing methods for deepfake detection, such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and generative
APA, Harvard, Vancouver, ISO, and other styles
40

Barni, Mauro, Marco Fontani, and Benedetta Tondi. "A Universal Attack Against Histogram-Based Image Forensics." International Journal of Digital Crime and Forensics 5, no. 3 (2013): 35–52. http://dx.doi.org/10.4018/jdcf.2013070103.

Full text
Abstract:
In this paper the authors propose a universal image counter-forensic scheme that contrasts any detector based on the analysis of the image histogram. Being universal, the scheme does not require knowledge of the detection algorithms available to the forensic analyst, and can be used to conceal traces left in the histogram of the image by any processing tool. Instead of adapting the histogram of the image to fit some statistical model, the proposed scheme makes it practically identical to the histogram of an untouched image, by solving an optimization problem. In doing this, the perceptual simi
APA, Harvard, Vancouver, ISO, and other styles
41

Dr., Alungat Barbara (PhD). "The Current Responses by the Uganda Police Force in Enhancing Urban Peace Enforcement in Uganda; A Case of Kampala City." International Journal of Social Science And Human Research 06, no. 05 (2023): 2666–78. https://doi.org/10.5281/zenodo.7908339.

Full text
Abstract:
<strong>Purporse:</strong>&nbsp;This study examined the urban policing paradox in Uganda with specific regard to how rapid urbanisation poses challenges for policing and urban peace enforcement in Kampala city. This study was to explore the crimes accompanying rapid urbanisation in Kampala city; examine the role of the Uganda Police Force in urban policing and peace enforcement in Kampala&nbsp;<strong>city;</strong>&nbsp;analyse the challenges of urban policing and peace enforcement in Kampala city and finally explore the current responses by the Uganda Police Force in enhancing urban peace en
APA, Harvard, Vancouver, ISO, and other styles
42

Pravin, Kumar, and Neelam. "Real-time pixel pattern analysis for deepfake detection: Unveiling eye blinking dynamics in live video streams." International Journal of Trends in Emerging Research and Development 2, no. 3 (2024): 13–16. https://doi.org/10.5281/zenodo.12516486.

Full text
Abstract:
Deepfake technology poses significant threats to security, privacy, and trust in digital media. This paper introduces a novel approach to deepfake detection by analyzing pixel patterns related to eye blinking dynamics in real-time video streams. By leveraging machine learning algorithms to detect anomalies in eye blinking, our method offers an effective and efficient solution for identifying deepfake content. This study, focused on the Indian context, provides insights into the implementation challenges, accuracy, and potential applications of this technology. Thanks to advances in processing
APA, Harvard, Vancouver, ISO, and other styles
43

Poliakov, Igor. "Defense Versions in Modern Forensics: Concept and Types." Siberian Criminal Process and Criminalistic Readings, no. 2 (44) (July 5, 2024): 87–94. https://doi.org/10.17150/2411-6122.2024.2.87-94.

Full text
Abstract:
The article considers the concept and types of defense versions as a new variety of criminalistic versions. According to the author, defense versions are relevant not only to the lawyer's practice, but also to other types of activities connected with the enforcement of laws and human rights in the criminal legal sphere. The article notes that three types of versions can be used in the forensic analysis of the circumstances of a criminal case: main versions, counter-versions and alternative versions. The main version is the accusatory version, which determines the initial direction of the inves
APA, Harvard, Vancouver, ISO, and other styles
44

Fléron, René W. "Satellite Forensics: Analysing Sparse Beacon Data to Reveal the Fate of DTUsat-2." International Journal of Aerospace Engineering 2019 (May 5, 2019): 1–12. http://dx.doi.org/10.1155/2019/8428167.

Full text
Abstract:
The CubeSat DTUsat-2 was designed and built by students and faculty at the Technical University of Denmark and launched to low earth orbit on June 2014. Its mission was to aid ornithologists in bird migration research. Shortly after launch and orbit injection, it became apparent that all was not nominal. To understand the problem and find the causes, a forensic investigation was initiated. The investigation used recorded Morse-encoded beacons emitted by the satellite as a starting point. This paper presents the real-life data from DTUsat-2 on orbit and the methodologies used to visualize the k
APA, Harvard, Vancouver, ISO, and other styles
45

Hagen, Raymond André. "Computational Forensics: The Essential Role of Logs in APT and Advanced Cyberattack Response." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 547–54. https://doi.org/10.34190/iccws.20.1.3328.

Full text
Abstract:
Advanced Persistent Threats (APTs) represent one of the most complex challenges in modern cybersecurity, characterized by their stealth, persistence, and sophistication. This study investigates the critical yet underutilized role of log analysis in detecting and responding to APTs, drawing on semi-structured interviews with 12 cybersecurity professionals from diverse sectors. Findings highlight logs as indispensable tools for identifying anomalies, reconstructing attack timelines, and understanding adversary tactics, techniques, and procedures (TTPs). However, barriers such as overwhelming dat
APA, Harvard, Vancouver, ISO, and other styles
46

Bezerra, Islan Amorim, Rubens Karman Paula da Silva, Sidney Marlon Lopes De Lima, Sergio Murilo Maciel Fernandes, Carolina de Lira Matos, and Jheklos Gomes Da Silva. "DEJAVU FORENSICS: ENHANCING RECOVERY OF FORMATTED JPEG AND PNG DATA USING SUPPORT VECTOR MACHINES." ARACÊ 7, no. 3 (2025): 15398–434. https://doi.org/10.56238/arev7n3-301.

Full text
Abstract:
With technological advancements, virtual crimes are occurring more frequently. When digital equipment is stolen, lost, or discarded, the data remains stored on the disks, enabling its recovery. This work focuses on the recovery of formatted files, investigating the applicability of the tools Foremost, Scalpel, and Magic Rescue in Linux, as well as an in-house tool equipped with machine learning. The goal is to develop a tool for the recovery and validation of formatted files, contributing to investigations of digital crimes and bringing new insights into recovery methods. Using pattern recogni
APA, Harvard, Vancouver, ISO, and other styles
47

Qureshi, Shavez Mushtaq, Atif Saeed, Sultan H. Almotiri, Farooq Ahmad, and Mohammed A. Al Ghamdi. "Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media." PeerJ Computer Science 10 (May 27, 2024): e2037. http://dx.doi.org/10.7717/peerj-cs.2037.

Full text
Abstract:
The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a comprehensive understanding of deepfake detection techniques has not materialized. This research tackles this knowledge gap by providing an up-to-date systematic survey of the digital forensic methods used to detect deepfakes. A rigorous methodology is followed, consolidating findings from recent publications on deepfake detection innovation. Prevalent datasets that underpin new techniques are analyzed. The effectiveness and limitations of estab
APA, Harvard, Vancouver, ISO, and other styles
48

Stefanov, D. S. "DETECTION AND PREVENTION OF CRIMES IN HIGHER EDUCATIONAL INSTITUTIONS." Herald of criminal justice, no. 3-4 (2023): 332–47. https://doi.org/10.17721/2413-5372.2023.3-4/332-347.

Full text
Abstract:
This article is dedicated to a comprehensive analysis of the issue of crime in higher education institutions (HEIs), which poses a significant threat to the safety of the educational environment, academic integrity, and public trust in the education system. The purpose of the article is to investigate the problems of detecting and preventing crimes in HEIs and to develop proposals for their resolution. The main types of offenses most frequently encountered in HEIs are identified, including corruption crimes, violence, cybercrimes, illicit drug trafficking, and property crimes. Particular atten
APA, Harvard, Vancouver, ISO, and other styles
49

Seema, Bagchi (Chattaraj), Chakrabortty Ashutosh, K. Kuila D., and Chandra Lahiri Sujit. "Comparison of the composition profiles of the low explosives in India from forensic exhibits and a brief discussion on preventive forensic techniques." Journal of Indian Chemical Society 93, Jul 2016 (2016): 889–906. https://doi.org/10.5281/zenodo.5639449.

Full text
Abstract:
Central Forensic Science Laboratory, Government of India, 30, Gorachand Road, Kolkata-700 014, India E-mail : bagchiseema@gmail.com, sujitclahiri@yahoo.com Fax : 91-33-22849442 Geological Survey of India, Government of India, Kolkata-700 069, India <em>E-mail</em> : cashu@rediffmail.com Chemical Examination Laboratory, Excise Department, Government of West Bengal, Kolkata-700 046, India <em>E-mail</em> : kuiladk@rediffmail.com More than 1650 pre blast and post blast exhibits were analyzed using routine analytical procedures supplemented by advanced analytical techniques like Ion-Chromatography
APA, Harvard, Vancouver, ISO, and other styles
50

Emre, Caglar Hosgor. "Detection and Mitigation of Anti-Forensics." December 31, 2020. https://doi.org/10.5281/zenodo.4425258.

Full text
Abstract:
Abstract&mdash;With the advances in IT, digital forensics became an important part of the juridical system. On the other hand, cybercriminals have been developing counter tactics against digital forensics for fleeing from the justice. Those tactics are grouped under the term &ldquo;anti-forensics&rdquo;. Anti-forensics includes data hiding, artifact wiping and trail obfuscation techniques which aim to subvert, hinder or make dysfunctional the digital forensic analysis. There are more than 300 anti-forensics related tools and methods. Categorization of, detection the use and mitigation against
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!