Littérature scientifique sur le sujet « Multimedia forensic »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Multimedia forensic ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Multimedia forensic"

1

Okan, Emmanuel Tettey. « Forensic Analysis on Streaming Multimedia ». Advances in Multidisciplinary and scientific Research Journal Publication 1, no 1 (26 juillet 2022) : 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.

Texte intégral
Résumé :
Since the advent of technology and digitalization of multimedia, there has been a massive increase in cybercrime. During streaming, with the availability of a network or internet source, multimedia; audio and visual can easily be accessed whiles being aired live. This technology dates as far back as 1990s. Similar to still videos and images, the user is able to download, pause, reverse or forward the show. The ability to stream multimedia has made it easier for users to partake or retrieve multimedia from the comfort of their homes, offices or personal spaces without necessarily being present. However, there are several challenges that affect the functionality of this technology, slow network connection and cybercrime. The issue of slow network may easily be handled by network providers, but cybercrimes has become rampant over the years. These attackers, also known as cyber criminals, use various activities to attack data. Some of their activities include phishing, data breach, identity theft and harassment. The paper has been written to assess forensic analysis of streaming multimedia. While exploring existing studies, it was realized that despite the rich availability of digital image forensics, video forensics hasn’t been explored much. This is because of the difficulty involved in analyzing the video data. Video data is always presented in a compressed form, unlike still images that are obtained in their original state. The compressed data often cancels or totally compromises the existing fingerprints, hence making it difficult to monitor or recover data. It was also revealed that, much has not been done so far as the research area is concerned. Keywords: Mobile Forensics, Cybersecurity, Streaming, Media, Video, Networks BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Tettey Okan (2022): Forensic Analysis On Streaming Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 221-226 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P36
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lizarti, Nora, Bambang Sugiantoro et Yudi Prayudi. « PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK ». JISKA (Jurnal Informatika Sunan Kalijaga) 2, no 1 (29 août 2017) : 26. http://dx.doi.org/10.14421/jiska.2017.21-04.

Texte intégral
Résumé :
Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Wisdom, Frey John. « Digital Forensics In Multimedia ». Advances in Multidisciplinary and scientific Research Journal Publication 1, no 1 (26 juillet 2022) : 239–50. http://dx.doi.org/10.22624/aims/crp-bk3-p39.

Texte intégral
Résumé :
Digital forensics and multimedia forensics are rapidly growing disciplines where electronic information is extracted and interpreted using scientifically accepted and validated processes, to be used in and outside of a court of law. As personal computing and the internet becomes more widespread, these two fields are becoming increasingly important in law enforcement and cybercrime investigation.Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics which focuses on extracting and analyzing contents such as images, videos, and audio to produce forensic evidence from both regular computer systems and special multimedia devices, such as digital cameras, voice recorders etc. This paper seeks to shed some light on digital forensics in multimedia, methods of authentication and challenges. Keywords: Forensics, Multimedia, Scrutiny, Analysis, Video, Voice, Data, Camera, Authentication BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Frey John Wisdom (2022): Digital Forensics In Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 239-250 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P39
Styles APA, Harvard, Vancouver, ISO, etc.
4

Khan, Muhammad Khurram, Mohammed Zakariah, Hafiz Malik et Kim-Kwang Raymond Choo. « A novel audio forensic data-set for digital multimedia forensics ». Australian Journal of Forensic Sciences 50, no 5 (24 mars 2017) : 525–42. http://dx.doi.org/10.1080/00450618.2017.1296186.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Nour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. « Anti- Forensics : The Tampering of Media ». International Journal on Recent and Innovation Trends in Computing and Communication 8, no 10 (31 octobre 2020) : 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.

Texte intégral
Résumé :
In the context of forensic investigations, the traditional understanding of evidence is changing where nowadays most prosecutors, lawyers and judges heavily rely on multimedia signs. This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos as forensic evidences presenting the possibility of their tampering by various easy-to-use, available anti-forensics softwares. We proved that along with the forensic analysis, digital processing, enhancement and authentication via forgery detection algorithms to testify the integrity of the content and the respective source of each, differentiating between an original and altered evidence is now feasible. These operations assist the court to attain higher degree of intelligibility of the multimedia data handled and assert the information retrieved from each that support the success of the investigation process.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zou, Hao, Pengpeng Yang, Rongrong Ni et Yao Zhao. « Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network ». Security and Communication Networks 2021 (24 mars 2021) : 1–8. http://dx.doi.org/10.1155/2021/6663486.

Texte intégral
Résumé :
In the multimedia forensics community, anti-forensics of contrast enhancement (CE) in digital images is an important topic to understand the vulnerability of the corresponding CE forensic method. Some traditional CE anti-forensic methods have demonstrated their effective forging ability to erase forensic fingerprints of the contrast-enhanced image in histogram and even gray level cooccurrence matrix (GLCM), while they ignore the problem that their ways of pixel value changes can expose them in the pixel domain. In this paper, we focus on the study of CE anti-forensics based on Generative Adversarial Network (GAN) to handle the problem mentioned above. Firstly, we exploit GAN to process the contrast-enhanced image and make it indistinguishable from the unaltered one in the pixel domain. Secondly, we introduce a specially designed histogram-based loss to enhance the attack effectiveness in the histogram domain and the GLCM domain. Thirdly, we use a pixel-wise loss to keep the visual enhancement effect of the processed image. The experimental results show that our method achieves high anti-forensic attack performance against CE detectors in the pixel domain, the histogram domain, and the GLCM domain, respectively, and maintains the highest image quality compared with traditional CE anti-forensic methods.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ruslan, Takdir, Imam Riadi et Sunardi Sunardi. « FORENSIK MULTIMEDIA BERBASIS MOBILE MENGGUNAKAN METODE NATIONAL INSTITUTE OF JUSTICE ». Jurnal SAINTEKOM 12, no 1 (2 mars 2022) : 69–80. http://dx.doi.org/10.33020/saintekom.v12i1.210.

Texte intégral
Résumé :
Current technological developments make it easier for people to share information and carry out communication activities through instant messaging applications using multimedia features in the form of audio and video. Technology has been able to contribute and facilitate humans in a positive sense, but it can also be misused to carry out negative activities. In solving crime problems using instant messages, investigators need to carry out digital forensics, including on mobile devices such as smartphones. This study aims to obtain digital evidence of online drug sales scenarios via Facebook messenger and WhatsApp using four forensic tools, namely Belkasoft, Oxygen, MOBILedit, and Magnet Axiom. The National Institute of Justice (NIJ) is used as a framework with stages, namely identification, solution, testing, evaluation, and reporting of results. out of the four tools, MOBILedit cannot recover deleted audio and video while the other three tools can recover deleted audio and video.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Marcon, Federico, Cecilia Pasquini et Giulia Boato. « Detection of Manipulated Face Videos over Social Networks : A Large-Scale Study ». Journal of Imaging 7, no 10 (28 septembre 2021) : 193. http://dx.doi.org/10.3390/jimaging7100193.

Texte intégral
Résumé :
The detection of manipulated videos represents a highly relevant problem in multimedia forensics, which has been widely investigated in the last years. However, a common trait of published studies is the fact that the forensic analysis is typically applied on data prior to their potential dissemination over the web. This work addresses the challenging scenario where manipulated videos are first shared through social media platforms and then are subject to the forensic analysis. In this context, a large scale performance evaluation has been carried out involving general purpose deep networks and state-of-the-art manipulated data, and studying different effects. Results confirm that a performance drop is observed in every case when unseen shared data are tested by networks trained on non-shared data; however, fine-tuning operations can mitigate this problem. Also, we show that the output of differently trained networks can carry useful forensic information for the identification of the specific technique used for visual manipulation, both for shared and non-shared data.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Zawali, Bako, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell et Arafat A-Dhaqm. « Realising a Push Button Modality for Video-Based Forensics ». Infrastructures 6, no 4 (2 avril 2021) : 54. http://dx.doi.org/10.3390/infrastructures6040054.

Texte intégral
Résumé :
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video content that, for example, has been manipulated digitally. To address this perennial investigative challenge, this paper proposes the integration of a forensically sound push button forensic modality (PBFM) model for the investigation of the MP4 video file format as a step towards automated video forensic investigation. An open-source multimedia forensic tool was developed based on the proposed PBFM model. A comprehensive evaluation of the efficiency of the tool against file alteration showed that the tool was capable of identifying falsified files, which satisfied the underlying assertion of the PBFM model. Furthermore, the outcome can be used as a complementary process for enhancing the evidence admissibility of MP4 video for forensic investigation.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Zhao, H. V., Min Wu, Z. J. Wang et K. J. Ray Liu. « Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting ». IEEE Transactions on Image Processing 14, no 5 (mai 2005) : 646–61. http://dx.doi.org/10.1109/tip.2005.846035.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Multimedia forensic"

1

Nadeem, Ashraf Muhammad. « Forensic Multimedia File Carving ». Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119998.

Texte intégral
Résumé :
Distribution of video contents over the Internet has increased drastically over the past few years. With technological advancements and emergence of social media services, video content sharing has grown exponentially. An increased number of cyber crimes today belong to possession or distribution of illegal video contents over the Internet. Therefore, it is crucial for forensic examiners to have the capability of recovering and analyzing illegal video contents from seized storage devices. File carving is an advanced forensic technique used to recover deleted contents from a storage device even when there is no file system present. After recovering a deleted video file, its contents have to be analyzed manually in order to classify them. This is not only very stressful but also takes a large amount of time. In this thesis we propose a carving approach for streaming multimedia formats that allows forensic examiners to recover individual frames of a video file as images. The contents of these images then can be classified using existing techniques for forensic analysis of image sets. A carving tool based on this approach is developed for MPEG-1 video files. A number of experiments are conducted to evaluate performance of the tool. For each experiment an MPEG-1 file with different encoding parameters is used. Moreover, each experiment contains 18 runs and with each run chunk size of the input MPEG-1 file is varied in order to create different amount of disk fragmentation For video only MPEG-1 files, 87.802 % frames are fully recovered when the chunk size is equal to 124 KB. Where as in the case of MPEG-1 files containing both audio and video data 90.55 % frames are fully recovered when the chunk size is 132 KB.
Styles APA, Harvard, Vancouver, ISO, etc.
2

GUARNERA, LUCA. « Discovering Fingerprints for Deepfake Detection and Multimedia-Enhanced Forensic Investigations ». Doctoral thesis, Università degli studi di Catania, 2021. http://hdl.handle.net/20.500.11769/539620.

Texte intégral
Résumé :
Forensic Science, which concerns the application of technical and scientific methods to justice, investigation and evidence discovery, has evolved over the years to the birth of several fields such as Multimedia Forensics, which involves the analysis of digital images, video and audio contents. Multimedia data was (and still is), altered using common editing tools such as Photoshop and GIMP. Rapid advances in Deep Learning have opened up the possibility of creating sophisticated algorithms capable of manipulating images, video and audio in a “simple” manner causing the emergence of a powerful yet frightening new phenomenon called deepfake: synthetic multimedia data created and/or altered using generative models. A great discovery made by forensic researchers over the years concerns the possibility of extracting a unique fingerprint that can determine the devices and software used to create the data itself. Unfortunately, extracting these traces turns out to be a complicated task. A fingerprint can be extracted not only in multimedia data in order to determine the devices used in the acquisition phase, or the social networks where the file was uploaded, or recently define the generative models used to create deepfakes, but, in general, this trace can be extracted from evidences recovered in a crime scene as shells or projectiles to determine the model of gun that have fired (Forensic Firearms Ballistics Comparison). Forensic Analysis of Handwritten Documents is another field of Forensic Science that can determine the authors of a manuscript by extracting a fingerprint defined by a careful analysis of the text style in the document. Developing new algorithms for Deepfake Detection, Forensic Firearms Ballistics Comparison, and Forensic Handwritten Document Analysis was the main focus of this Ph.D. thesis. These three macro areas of Forensic Science have a common element, namely a unique fingerprint present in the data itself that can be extracted in order to solve the various tasks. Therefore, for each of these topics a preliminary analysis will be performed and new detection techniques will be presented obtaining promising results in all these domains.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Swaminathan, Ashwin. « Multimedia forensic analysis via intrinsic and extrinsic fingerprints ». College Park, Md. : University of Maryland, 2008. http://hdl.handle.net/1903/8776.

Texte intégral
Résumé :
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ledesma, Spencer Aguila. « A proposed framework for forensic image enhancement ». Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1605105.

Texte intégral
Résumé :

Digital images and videos used in the investigation of a crime often undergo several concurrent enhancement operations for improved analysis by humans or automated systems. When applying multiple image processing techniques to an image, the order and method in which processes are applied can have a profound impact on the result. However, the effect that one enhancement algorithm will have when applied in conjunction with another is not always obvious. When applied incorrectly, at best, there will be a negative impact to the amount of information that can be extracted from an image. At worst, the information contained in a processed image could be misrepresented. This thesis proposes a tool independent workflow for forensic image enhancement with a strong emphasis on an order of operations that maximizes the efficacy of each enhancement technique while observing the responsibilities and best practices of the forensic science community. This work will be useful for developing an understanding of common image enhancement techniques, understanding how these techniques relate to forensic science, and aiding in the creation of quality assurance standards for forensic image enhancement. Chapter 1 gives an introduction to image enhancement and discusses its role in forensic science and litigation. Chapter 2 summarizes the digital image creation process and its relationship to the human visual system. Chapter 3 reviews the most commonly used image enhancement techniques, including their theoretical background, strengths, and limitations. Chapter 4 introduces a framework for image enhancement and the rationale behind it through a series of practical examples.

Styles APA, Harvard, Vancouver, ISO, etc.
5

Wachter, Eddie R. « A Case for Animation : A Study of the Use of Forensic Multimedia in the Courtroom ». NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/904.

Texte intégral
Résumé :
Forensic multimedia is the specific term for computer simulation and computer animation presented as evidence in a court of law. Since its first use in the courtroom in the early 1990's, many high profile legal teams have used forensic multimedia to present arguments to reproduce an occurrence of events. Since that time, significant literature has been written on the use of forensic multimedia in the courtroom specifically targeted “towards the legal aspects of inclusion of the media as evidence, and rules and regulations about its admissibility. Special courtrooms have been developed to facilitate the use of multimedia, yet there has been no published research on the subject of the capabilities of lawyers to understand the process and address the educational aspects of the medium. The author's goal for this dissertation was the evaluation of the use of forensic multimedia in the greater Atlanta legal community. The study includes research on the use of forensic multimedia in the target area, a usability evaluation of a forensic multimedia product, a survey of southern US law school curricula as to the inclusion of forensic multimedia conceptual training in the programs, and a survey of the capabilities of lawyers in the target area as to their understanding of the multimedia process and use of forensic multimedia in the courtroom. Results of the research indicate a lack of formal education by law schools in the concepts and use of forensic multimedia. A survey of legal professionals confirms that lawyers are unfamiliar with the components and methodologies of use of the media. In addition, usability research of forensic multimedia software indicates areas for usability improvement.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Conotter, Valentina. « Active and Passive Multimedia Forensics ». Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368291.

Texte intégral
Résumé :
Thanks to their huge expressive capability, coupled with the widespread use of the Internet and of affordable and high quality cameras and computers, digital multimedia represent nowadays one of the principal means of communication. Besides the many benefits, the wide proliferation of such contents has lead to problematic issues regarding their authen- ticity and security. To cope with such problems, the scientific community has focused its attention on digital forensic techniques. The objective of this doctoral study is to actively contribute to this field of research, developing efficient techniques to protect digital contents and verify their integrity. Digital Watermarking has been initially proposed as a valuable instrument to prove con- tent ownership, protect copyright and verify integrity, by imperceptibly embedding a mes- sage into a documents. Such message can later be detected and used to disclose possible copyrights violations or manipulations. For specific applications, such as copyright pro- tection, the watermark is required to be as robust as possible, surviving possible attack a malevolent user may be willing to apply. In light of this, we developed a novel watermark- ing benchmarking tool able to evaluate the robustness of watermarking techniques under the attack of multiple processing operators. On the other hand, for specific applications, such as forensic and medical, the robustness requirement is overtaken by integrity preser- vation. To cope with this aim, fragile watermarking has been developed, assuming that the watermark is modified whenever a tampering occurs, thus its absence can be taken as ev- idence of manipulation. Among this class of techniques, we developed a prediction-based reversible watermarking algorithm, which allows a perfect recovery of both the original content and the watermark. More recently, passive forensics approaches, which work in absence of any watermark or special hardware, have been proposed for authentication purposes. The basic idea is that the manipulation of a digital media, if performed properly, may not leave any visual trace of its occurrence, but it alters the statistics of the content. Without any prior knowledge about the content, such alterations can be revealed and taken as evidence of forgery. We focused our study on geometric-based forensic techniques both for images and videos au- thentication. Firstly we proposed a method for authenticating text on signs and billboards, based on the assumption that text on a planar surface is imaged under perspective projec- tion, but it is unlikely to satisfy such geometric mapping when manipulated. Finally, we proposed a novel geometric technique to detect physically implausible trajectories of ob- jects in video sequences. This technique explicitly models the three-dimensional trajectory of objects in free-flight and the corresponding two-dimensional projection into the image plane. Deviations from this model provide evidence of manipulation.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhao, Hong. « Multimedia fingerprinting for multiuser forensics and security ». College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2068.

Texte intégral
Résumé :
Thesis (Ph. D.) -- University of Maryland, College Park, 2004.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Pasquini, Cecilia. « Statistical and deterministic approaches for multimedia forensics ». Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/369281.

Texte intégral
Résumé :
The increasing availability and pervasiveness of multimedia data in our society is before our very eyes. As a result of globalization and worldwide connectivity, people from all over the planet are exchanging constantly increasing amounts of images, videos, audio recordings on a daily basis. Coupled with the easy access to user-friendly editing software, this poses a number of problems related to the reliability and trustworthiness of such content, as well as its potential malevolent use. For this reason, the research field of multimedia forensics focuses on the development of forensic tools for verifying the authenticity of multimedia data. The hypothesis of pristine status of images, videos or audio tracks is called into question and can be rejected if traces of manipulation are detected with a certain degree of confidence. In this framework, studying traces left by any operation that could have been employed to process the data, either for malicious purposes or simply to improve their content or presentation, turns out to be of interest for a comprehensive forensic analysis. The goal of this doctoral study is to contribute to the field of multimedia forensics by exploiting intrinsic statistical and deterministic properties of multimedia data. With this respect, much work has been devoted to the study of JPEG compression traces in digital images, resulting in the development of several innovative approaches. Indeed, some of the main related research problems have been addressed and solution based on statistical properties of digital images have been proposed. In particular, the problem of identifying traces of JPEG compressions in images that have been decompressed and saved in uncompressed formats has been extensively studied, resulting in the design of novel statistical detectors. Given the enormous practical relevance, digital images in JPEG formats have also been considered. A novel method aimed at discriminating images compressed only once and more than once has been developed, and tested on a variety of images and forensic scenarios. Being the potential presence of intelligent counterfeiters ever increasingly studied, innovative counterforensic techniques to JPEG compression based on smart reconstruction strategies are proposed. Finally, we explore the possibility of defining and exploiting deterministic properties related to a certain processing operation in the forensic analysis. With this respect, we present a first approach targeted to the detection in one-dimensional data of a common data smoothing operation, the median filter. A peculiarity of this method is the ability of providing a deterministic response on the presence of median filtering traces in the data under investigation.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Al-Athamneh, Mohammad Hmoud. « Studies in source identification and video authentication for multimedia forensics ». Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725326.

Texte intégral
Résumé :
Nowadays, powerful and easy to use editing software which is available to almost everyone allows forgers to create convincing digital forgeries. As multimedia applications require a certain level of trust in the integrity and authenticity of the data become more common, there is an increasing need to restore some of the lost trustworthiness of digital media. In multimedia forensics, Digital Signature and Digital Watermarking have long been commonly used in video authentication, but these methods have proven to have shortcomings. The main drawback of these techniques is that information must generally be inserted at the time of video capture or before video broadcasting. Both techniques require two stages are: at the sender side and then at the receiver side, which in some real world applications is not feasible. For the problem of source type identification, digital fingerprints are usually extracted and then compared with a dataset of possible fingerprints to determine the acquisition devices. Photo-Response Non-Uniformity (PRNU), which is caused by the different sensitivity of pixels to the light, has proven to be a distinctive link between the camera and its images/videos. With this in mind, this thesis proposes several new digital forensic techniques to detect evidence of manipulations in digital video content based on blind techniques (Chapter 4 and Chapter 5) where there is no need for per-embedded watermarks or per-generated digital signature. These methods showed potential to be reliable techniques in digital video authentication based on the local video information. For the problem of determining the source of digital evidence, this thesis proposes a G-PRNU method (in Chapter 3) that overcomes the accuracy obtained in PRNU method in the problem of digital videos source type identification and it is less computationally expensive. Each proposed method was tested on a dataset of videos and detailed experimental results are presented.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Popejoy, Amy Lynnette. « Digital and multimedia forensics justified| An appraisal on professional policy and legislation ». Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598313.

Texte intégral
Résumé :

Recent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: “The Promotion and Development of Forensic Science,” and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: “The Standardization of Terminology in Reporting and Testimony,” and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: “Insufficient Education and Training,” identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.

Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Multimedia forensic"

1

Barbara, John J., dir. Handbook of Digital and Multimedia Forensic Evidence. Totowa, NJ : Humana Press, 2008. http://dx.doi.org/10.1007/978-1-59745-577-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

American Academy of Forensic Sciences. Forensic digital & multimedia sciences : Proceedings 2009-2011. Colorado Springs, CO : American Academy of Forensic Sciences, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

J, Barbara John, dir. Handbook of digital and multimedia forensic evidence. Totowa, N.J : Humana, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Handbook of digital forensics of multimedia data and devices. Hoboken : Wiley, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Sencar, Husrev Taha, Luisa Verdoliva et Nasir Memon, dir. Multimedia Forensics. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lai, Xuejia. Forensics in Telecommunications, Information, and Multimedia : Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers. Berlin, Heidelberg : Springer-Verlag GmbH Berlin Heidelberg, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Chang-Tsun, Li, dir. Multimedia forensics and security. Hershey PA : Information Science Reference, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Hassanien, Aboul Ella, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad et Janusz Kacprzyk, dir. Multimedia Forensics and Security. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44270-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lai, Xuejia, Dawu Gu, Bo Jin, Yongquan Wang et Hui Li, dir. Forensics in Telecommunications, Information, and Multimedia. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23602-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Sorell, Matthew, dir. Forensics in Telecommunications, Information and Multimedia. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02312-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Multimedia forensic"

1

Stamm, Matthew C., et Xinwei Zhao. « Anti-Forensic Attacks Using Generative Adversarial Networks ». Dans Multimedia Forensics, 467–90. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_17.

Texte intégral
Résumé :
AbstractThe rise of deep learning has led to rapid advances in multimedia forensics. Algorithms based on deep neural networks are able to automatically learn forensic traces, detect complex forgeries, and localize falsified content with increasingly greater accuracy. At the same time, deep learning has expanded the capabilities of anti-forensic attackers. New anti-forensic attacks have emerged, including those discussed in Chap. 10.1007/978-981-16-7621-5_14 based on adversarial examples, and those based on generative adversarial networks (GANs). In this chapter, we discuss the emerging threat posed by GAN-based anti-forensic attacks. GANs are a powerful machine learning framework that can be used to create realistic, but completely synthetic data. Researchers have recently shown that anti-forensic attacks can be built by using GANs to create synthetic forensic traces. While only a small number of GAN-based anti-forensic attacks currently exist, results show these early attacks are both effective at fooling forensic algorithms and introduce very little distortion into attacked images.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Piva, Alessandro, et Massimo Iuliani. « Integrity Verification Through File Container Analysis ». Dans Multimedia Forensics, 363–87. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_14.

Texte intégral
Résumé :
AbstractIn the previous chapters, multimedia forensics techniques based on the analysis of the data stream, i.e., the audio-visual signal, aimed at detecting artifacts and inconsistencies in the (statistics of the) content were presented. Recent research highlighted that useful forensic traces are also left in the file structure, thus offering the opportunity to understand a file’s life-cycle without looking at the content itself. This chapter is then devoted to the description of the main forensic methods for the analysis of image and video file formats.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Barni, Mauro, Wenjie Li, Benedetta Tondi et Bowen Zhang. « Adversarial Examples in Image Forensics ». Dans Multimedia Forensics, 435–66. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_16.

Texte intégral
Résumé :
AbstractWe describe the threats posed by adversarial examples in an image forensic context, highlighting the differences and similarities with respect to other application domains. Particular attention is paid to study the transferability of adversarial examples from a source to a target network and to the creation of attacks suitable to be applied in the physical domain. We also describe some possible countermeasures against adversarial examples and discuss their effectiveness. All the concepts described in the chapter are exemplified with results obtained in some selected image forensics scenarios.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Wani, Mohamad Ahtisham. « Privacy Preserving Anti-forensic Techniques ». Dans Multimedia Security, 89–108. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8711-5_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Riess, Christian. « Physical Integrity ». Dans Multimedia Forensics, 207–34. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_9.

Texte intégral
Résumé :
AbstractPhysics-based methods anchor the forensic analysis in physical laws of image and video formation. The analysis is typically based on simplifying assumptions to make the forensic analysis tractable. In scenes that satisfy such assumptions, different types of forensic analysis can be performed. The two most widely used applications are the detection of content repurposing and content splicing. Physics-based methods expose such cases with assumptions about the interaction of light and objects, and about the geometric mapping of light and objects onto the image sensor.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Geradts, Zeno, et Jurrien Bijhold. « Forensic Video Investigation ». Dans Multimedia Video-Based Surveillance Systems, 3–12. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4327-5_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Moreira, Daniel, William Theisen, Walter Scheirer, Aparna Bharati, Joel Brogan et Anderson Rocha. « Image Provenance Analysis ». Dans Multimedia Forensics, 389–432. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_15.

Texte intégral
Résumé :
AbstractThe literature of multimedia forensics is mainly dedicated to the analysis of single assets (such as sole image or video files), aiming at individually assessing their authenticity. Different from this, image provenance analysis is devoted to the joint examination of multiple assets, intending to ascertain their history of edits, by evaluating pairwise relationships. Each relationship, thus, expresses the probability of one asset giving rise to the other, through either global or local operations, such as data compression, resizing, color-space modifications, content blurring, and content splicing. The principled combination of these relationships unveils the provenance of the assets, also constituting an important forensic tool for authenticity verification. This chapter introduces the problem of provenance analysis, discussing its importance and delving into the state-of-the-art techniques to solve it.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Hajj-Ahmad, Adi, Chau-Wai Wong, Jisoo Choi et Min Wu. « Power Signature for Multimedia Forensics ». Dans Multimedia Forensics, 235–80. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7621-5_10.

Texte intégral
Résumé :
AbstractThere has been an increasing amount of work surrounding the Electric Network Frequency (ENF) signal, an environmental signature captured by audio and video recordings made in locations where there is electrical activity. ENF is the frequency of power distribution networks, 60 Hz in most of the Americas and 50 Hz in most other parts of the world. The ubiquity of this power signature and the appearance of its traces in media recordings motivated its early application toward time–location authentication of audio recordings. Since then, more work has been done toward utilizing this signature for other forensic applications, such as inferring the grid in which a recording was made, as well as applications beyond forensics, such as temporally synchronizing media pieces. The goal of this chapter is to provide an overview of the research work that has been done on the ENF signal and to provide an outlook for the future.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Geradts, Zeno. « Digital and multimedia sciences ». Dans The Future of Forensic Science, 31–47. Chichester, UK : John Wiley & Sons, Ltd, 2019. http://dx.doi.org/10.1002/9781119226703.ch3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Li, Zhouzhou, Xiaoming Liu, Mario Alberto Garcia et Charles D. McAllister. « Construct Forensic Evidence Networks from Information Fragments ». Dans Mobile Multimedia Communications, 702–14. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89814-4_51.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Multimedia forensic"

1

Talmale, G. R., A. V. Talhan et R. V. Dharaskar. « Analysis of multimedia forensic technique ». Dans the 2011 International Conference. New York, New York, USA : ACM Press, 2011. http://dx.doi.org/10.1145/1947940.1948002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lu, Wenjun, Avinash L. Varna et Min Wu. « Forensic hash for multimedia information ». Dans IS&T/SPIE Electronic Imaging, sous la direction de Nasir D. Memon, Jana Dittmann, Adnan M. Alattar et Edward J. Delp III. SPIE, 2010. http://dx.doi.org/10.1117/12.838745.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Schonberg, Daniel, et Darko Kirovski. « Fingerprinting and forensic analysis of multimedia ». Dans the 12th annual ACM international conference. New York, New York, USA : ACM Press, 2004. http://dx.doi.org/10.1145/1027527.1027712.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ulges, Adrian. « Session details : Forensic process support ». Dans MM '10 : ACM Multimedia Conference. New York, NY, USA : ACM, 2010. http://dx.doi.org/10.1145/3258349.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Lu, Wenjun, et Min Wu. « Multimedia forensic hash based on visual words ». Dans 2010 17th IEEE International Conference on Image Processing (ICIP 2010). IEEE, 2010. http://dx.doi.org/10.1109/icip.2010.5650613.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sk, Sumaiya, et Ch Rupa. « Multimedia Forensic Detection Using Enriched Statistical Analysis ». Dans 2018 15th IEEE India Council International Conference (INDICON). IEEE, 2018. http://dx.doi.org/10.1109/indicon45594.2018.8986969.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Lu, Wenjun, et Min Wu. « Seam carving estimation using forensic hash ». Dans the thirteenth ACM multimedia workshop. New York, New York, USA : ACM Press, 2011. http://dx.doi.org/10.1145/2037252.2037255.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Craver, Scott. « Session details : Digital forensic 2 ». Dans MM&Sec '10 : Multimedia and Security Workshop. New York, NY, USA : ACM, 2010. http://dx.doi.org/10.1145/3252051.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Campisi, Patrizio. « Session details : Digital forensic 1 ». Dans MM&Sec '10 : Multimedia and Security Workshop. New York, NY, USA : ACM, 2010. http://dx.doi.org/10.1145/3252050.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kirbiz, Serap, Mehmet Celik, Aweke Lemma et Stefan Katzenbeisser. « Forensic Watermarking During AAC Playback ». Dans Multimedia and Expo, 2007 IEEE International Conference on. IEEE, 2007. http://dx.doi.org/10.1109/icme.2007.4284849.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Multimedia forensic"

1

Pollitt, Mark, Eoghan Casey, David-Olivier Jaquet-Chiffelle et Pavel Gladyshev. A Framework for Harmonizing Forensic Science Practices and Digital/Multimedia Evidence. Organization of Scientific Area Committees for Forensic Science, janvier 2018. http://dx.doi.org/10.29325/osac.ts.0002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lee, Yooyoung, Amy N. Yates, Haiying Guan, Andrew Delgado, Daniel Zhou, Timothee Kheyrkhah et Jonathan Fiscus. 2018 Multimedia Forensics Challenges (MFC18) : Summary and Results. National Institute of Standards and Technology, novembre 2020. http://dx.doi.org/10.6028/nist.ir.8324.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie