Dissertations / Theses on the topic 'Multimedia forensic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 21 dissertations / theses for your research on the topic 'Multimedia forensic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nadeem, Ashraf Muhammad. "Forensic Multimedia File Carving." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119998.
Full textGUARNERA, LUCA. "Discovering Fingerprints for Deepfake Detection and Multimedia-Enhanced Forensic Investigations." Doctoral thesis, Università degli studi di Catania, 2021. http://hdl.handle.net/20.500.11769/539620.
Full textSwaminathan, Ashwin. "Multimedia forensic analysis via intrinsic and extrinsic fingerprints." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8776.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ledesma, Spencer Aguila. "A proposed framework for forensic image enhancement." Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1605105.
Full textDigital images and videos used in the investigation of a crime often undergo several concurrent enhancement operations for improved analysis by humans or automated systems. When applying multiple image processing techniques to an image, the order and method in which processes are applied can have a profound impact on the result. However, the effect that one enhancement algorithm will have when applied in conjunction with another is not always obvious. When applied incorrectly, at best, there will be a negative impact to the amount of information that can be extracted from an image. At worst, the information contained in a processed image could be misrepresented. This thesis proposes a tool independent workflow for forensic image enhancement with a strong emphasis on an order of operations that maximizes the efficacy of each enhancement technique while observing the responsibilities and best practices of the forensic science community. This work will be useful for developing an understanding of common image enhancement techniques, understanding how these techniques relate to forensic science, and aiding in the creation of quality assurance standards for forensic image enhancement. Chapter 1 gives an introduction to image enhancement and discusses its role in forensic science and litigation. Chapter 2 summarizes the digital image creation process and its relationship to the human visual system. Chapter 3 reviews the most commonly used image enhancement techniques, including their theoretical background, strengths, and limitations. Chapter 4 introduces a framework for image enhancement and the rationale behind it through a series of practical examples.
Wachter, Eddie R. "A Case for Animation: A Study of the Use of Forensic Multimedia in the Courtroom." NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/904.
Full textConotter, Valentina. "Active and Passive Multimedia Forensics." Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368291.
Full textZhao, Hong. "Multimedia fingerprinting for multiuser forensics and security." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2068.
Full textThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Pasquini, Cecilia. "Statistical and deterministic approaches for multimedia forensics." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/369281.
Full textAl-Athamneh, Mohammad Hmoud. "Studies in source identification and video authentication for multimedia forensics." Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725326.
Full textPopejoy, Amy Lynnette. "Digital and multimedia forensics justified| An appraisal on professional policy and legislation." Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598313.
Full textRecent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: “The Promotion and Development of Forensic Science,” and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: “The Standardization of Terminology in Reporting and Testimony,” and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: “Insufficient Education and Training,” identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.
Giudice, Oliver. "Digital Forensics Ballistics: Reconstructing the source of an evidence exploiting multimedia data." Doctoral thesis, Università di Catania, 2017. http://hdl.handle.net/10761/3896.
Full textMullan, Patrick [Verfasser], Christian [Akademischer Betreuer] Rieß, and Christian [Gutachter] Rieß. "Digital Cues in Multimedia Forensics / Patrick Mullan ; Gutachter: Christian Rieß ; Betreuer: Christian Rieß." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2021. http://d-nb.info/1229194185/34.
Full textSchetinger, Victor Chitolina. "Beyond digital, imagens, and forensics : towards a regulation of trust in multimedia communication." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/182284.
Full textThis thesis discusses the role of Digital Image Forensics as a regulator of digital media in society. This includes a perceptual study with over 400 subjects to assess their ability to notice editing in images. The results of such experiment indicate that humans are easily fooled by digital images, not being able to tell apart edited and pristine images. The thesis then analyzes the effectiveness of the available arsenal of digital image forensics technology to detect image editing performed by state-of-the-art image-compositing techniques. By analyzing fundamental image patterns, forensics techniques can effectively detect the occurrence of most types of image compositing operations. In response to these two studies, the thesis presents an alternative approach to digital image forensics, based on automated plan generation. By treating the image inspection process as a plan comprised of different steps, it proposes an architecture that is able to guide an analyst choosing the next best step for inspecting an image. The generated plans are flexible, adapting on the fly to the observed results. The plans are based on a formal modelling of current forensics knowledge and techniques, so that they can be translated in steps to be executed. The thesis then shows that the limits of such an approach lie in the difficulty to validate results, which is a consequence of the setup of forensics problems: they are problems of distributed trust among parties with limited information. This scenario is analyzed from different perspectives in search for the practical limits of Digital Image Forensics as a whole. The results of such an analysis suggest that the field is lacking in providing practical and accessible solutions to society due to limited engagement in multidisciplinary research rather than due to limited technical proficiency. The thesis then discusses how paradoxes from philosophy, mathematics, and epistemology arise naturally in both real forensics scenarios, and in the theoretical foundations of the field. Digital Image Forensics ultimately deals with human communication and, as such, it is subject to all its complexities. Finally, it is argued that the path for providing useful solutions for society requires a collective engagement from different disciplines. It is the responsibility of the forensics community to develop a common, accessible epistemological framework for this collective enterprise.
Lago, Federica. "On the preservation of media trustworthiness in the social media era." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/334996.
Full textGUARNERA, FRANCESCO. "Advanced Methods for Image Forensics: First Quantization Estimation and Document Authentication." Doctoral thesis, Università degli studi di Catania, 2022. http://hdl.handle.net/20.500.11769/539559.
Full textStanton, Jamie Alyssa. "Detecting Image Forgery with Color Phenomenology." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton15574119887572.
Full textAMERINI, IRENE. "Image Forensics: sourceidentification and tamperingdetection." Doctoral thesis, 2010. http://hdl.handle.net/2158/520262.
Full textBALLAN, LAMBERTO. "Object and event recognition in multimedia archives using local visual features." Doctoral thesis, 2011. http://hdl.handle.net/2158/485661.
Full textFerreira, Sara Cardoso. "A machine learning based digital forensics application to detect tampered multimedia files." Master's thesis, 2021. https://hdl.handle.net/10216/135823.
Full textFerreira, Sara Cardoso. "A machine learning based digital forensics application to detect tampered multimedia files." Dissertação, 2021. https://hdl.handle.net/10216/135823.
Full textHung, Cheng-wei, and 洪丞緯. "Design and Implementation of Multimedia Streaming Forensics System in a Gigabit Passive Optical Network--The Case Study of SIP Phone Applications." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/m3wtv2.
Full text南華大學
資訊管理學系
101
With the mature development of video and audio streaming applications, the multimedia session streaming services have become one of the popular internet services. While using the session service, the session control channel is fixed and using a well-known port, but the data channel is using select a dynamical and unknown port. The data channel would be decided in the control messages. For SIP (Session Initiation Protocol) applications, the voice data channel would be aware from the SDP (Session Description Protocol) information of SIP messages. Therefore, it’s difficult to implement a digital forensics system for multimedia session streaming services. Because of the rapid development of network architecture, the speed and quality of networks is increasing continually, such as from traditional dial-up access networks to fiber optic networks. The malicious attack from internet becomes difficult to tracking and record the illegal network behavior. Many network security problems are spread. Thus, it has to be redrawn by using digital forensics system to diagnose and recover the security events. Digital forensics is also called computer forensics. The network situation and behavior of the security events would be replayed by using computer forensics technology. The network packets are captured in OLT (Optical Line Termination) by using a traditional network forensics for GPON (Gigabit-capable Passive Optical Networks). Due to the symmetrical network speed with 2.5Gbps, the forensics task could not be handled in the high-speed situation. Some packets could be lost and the forensics is incomplete. This thesis proposed a two-tier architecture of forensics system with distributed loading. The system components were developed: Snooping Agent, Analyzing Server, and Media Processing Server. The System is design for GPON environment. Snooping Agent on the ONU (Optical Network Unit) deals with the packet capturing of SIP control channel, and the captured SIP packets are sent to the back-end component (Analyzing Server). The port numbers of the data channels will be figured out by Analyzing Server. According the port numbers, the audio and video packets will be captured and delivered to Media Processing Server. All of the session information and users data is stored in database and presented with web interface for event search. This thesis presented the two-tier structure of forensics system with distributed loading can reduce the loading of the centralized analyzer and data storage. The most packets are filtered in each ONU, and only the captured packets would be analyzed or stored.