Thèses sur le sujet « Multimedia forensic »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 21 meilleures thèses pour votre recherche sur le sujet « Multimedia forensic ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Nadeem, Ashraf Muhammad. « Forensic Multimedia File Carving ». Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119998.
Texte intégralGUARNERA, LUCA. « Discovering Fingerprints for Deepfake Detection and Multimedia-Enhanced Forensic Investigations ». Doctoral thesis, Università degli studi di Catania, 2021. http://hdl.handle.net/20.500.11769/539620.
Texte intégralSwaminathan, Ashwin. « Multimedia forensic analysis via intrinsic and extrinsic fingerprints ». College Park, Md. : University of Maryland, 2008. http://hdl.handle.net/1903/8776.
Texte intégralThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ledesma, Spencer Aguila. « A proposed framework for forensic image enhancement ». Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1605105.
Texte intégralDigital images and videos used in the investigation of a crime often undergo several concurrent enhancement operations for improved analysis by humans or automated systems. When applying multiple image processing techniques to an image, the order and method in which processes are applied can have a profound impact on the result. However, the effect that one enhancement algorithm will have when applied in conjunction with another is not always obvious. When applied incorrectly, at best, there will be a negative impact to the amount of information that can be extracted from an image. At worst, the information contained in a processed image could be misrepresented. This thesis proposes a tool independent workflow for forensic image enhancement with a strong emphasis on an order of operations that maximizes the efficacy of each enhancement technique while observing the responsibilities and best practices of the forensic science community. This work will be useful for developing an understanding of common image enhancement techniques, understanding how these techniques relate to forensic science, and aiding in the creation of quality assurance standards for forensic image enhancement. Chapter 1 gives an introduction to image enhancement and discusses its role in forensic science and litigation. Chapter 2 summarizes the digital image creation process and its relationship to the human visual system. Chapter 3 reviews the most commonly used image enhancement techniques, including their theoretical background, strengths, and limitations. Chapter 4 introduces a framework for image enhancement and the rationale behind it through a series of practical examples.
Wachter, Eddie R. « A Case for Animation : A Study of the Use of Forensic Multimedia in the Courtroom ». NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/904.
Texte intégralConotter, Valentina. « Active and Passive Multimedia Forensics ». Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368291.
Texte intégralZhao, Hong. « Multimedia fingerprinting for multiuser forensics and security ». College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/2068.
Texte intégralThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Pasquini, Cecilia. « Statistical and deterministic approaches for multimedia forensics ». Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/369281.
Texte intégralAl-Athamneh, Mohammad Hmoud. « Studies in source identification and video authentication for multimedia forensics ». Thesis, Queen's University Belfast, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725326.
Texte intégralPopejoy, Amy Lynnette. « Digital and multimedia forensics justified| An appraisal on professional policy and legislation ». Thesis, University of Colorado at Denver, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1598313.
Texte intégralRecent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: “The Promotion and Development of Forensic Science,” and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: “The Standardization of Terminology in Reporting and Testimony,” and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: “Insufficient Education and Training,” identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.
Giudice, Oliver. « Digital Forensics Ballistics : Reconstructing the source of an evidence exploiting multimedia data ». Doctoral thesis, Università di Catania, 2017. http://hdl.handle.net/10761/3896.
Texte intégralMullan, Patrick [Verfasser], Christian [Akademischer Betreuer] Rieß et Christian [Gutachter] Rieß. « Digital Cues in Multimedia Forensics / Patrick Mullan ; Gutachter : Christian Rieß ; Betreuer : Christian Rieß ». Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2021. http://d-nb.info/1229194185/34.
Texte intégralSchetinger, Victor Chitolina. « Beyond digital, imagens, and forensics : towards a regulation of trust in multimedia communication ». reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/182284.
Texte intégralThis thesis discusses the role of Digital Image Forensics as a regulator of digital media in society. This includes a perceptual study with over 400 subjects to assess their ability to notice editing in images. The results of such experiment indicate that humans are easily fooled by digital images, not being able to tell apart edited and pristine images. The thesis then analyzes the effectiveness of the available arsenal of digital image forensics technology to detect image editing performed by state-of-the-art image-compositing techniques. By analyzing fundamental image patterns, forensics techniques can effectively detect the occurrence of most types of image compositing operations. In response to these two studies, the thesis presents an alternative approach to digital image forensics, based on automated plan generation. By treating the image inspection process as a plan comprised of different steps, it proposes an architecture that is able to guide an analyst choosing the next best step for inspecting an image. The generated plans are flexible, adapting on the fly to the observed results. The plans are based on a formal modelling of current forensics knowledge and techniques, so that they can be translated in steps to be executed. The thesis then shows that the limits of such an approach lie in the difficulty to validate results, which is a consequence of the setup of forensics problems: they are problems of distributed trust among parties with limited information. This scenario is analyzed from different perspectives in search for the practical limits of Digital Image Forensics as a whole. The results of such an analysis suggest that the field is lacking in providing practical and accessible solutions to society due to limited engagement in multidisciplinary research rather than due to limited technical proficiency. The thesis then discusses how paradoxes from philosophy, mathematics, and epistemology arise naturally in both real forensics scenarios, and in the theoretical foundations of the field. Digital Image Forensics ultimately deals with human communication and, as such, it is subject to all its complexities. Finally, it is argued that the path for providing useful solutions for society requires a collective engagement from different disciplines. It is the responsibility of the forensics community to develop a common, accessible epistemological framework for this collective enterprise.
Lago, Federica. « On the preservation of media trustworthiness in the social media era ». Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/334996.
Texte intégralGUARNERA, FRANCESCO. « Advanced Methods for Image Forensics : First Quantization Estimation and Document Authentication ». Doctoral thesis, Università degli studi di Catania, 2022. http://hdl.handle.net/20.500.11769/539559.
Texte intégralStanton, Jamie Alyssa. « Detecting Image Forgery with Color Phenomenology ». University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton15574119887572.
Texte intégralAMERINI, IRENE. « Image Forensics : sourceidentification and tamperingdetection ». Doctoral thesis, 2010. http://hdl.handle.net/2158/520262.
Texte intégralBALLAN, LAMBERTO. « Object and event recognition in multimedia archives using local visual features ». Doctoral thesis, 2011. http://hdl.handle.net/2158/485661.
Texte intégralFerreira, Sara Cardoso. « A machine learning based digital forensics application to detect tampered multimedia files ». Master's thesis, 2021. https://hdl.handle.net/10216/135823.
Texte intégralFerreira, Sara Cardoso. « A machine learning based digital forensics application to detect tampered multimedia files ». Dissertação, 2021. https://hdl.handle.net/10216/135823.
Texte intégralHung, Cheng-wei, et 洪丞緯. « Design and Implementation of Multimedia Streaming Forensics System in a Gigabit Passive Optical Network--The Case Study of SIP Phone Applications ». Thesis, 2013. http://ndltd.ncl.edu.tw/handle/m3wtv2.
Texte intégral南華大學
資訊管理學系
101
With the mature development of video and audio streaming applications, the multimedia session streaming services have become one of the popular internet services. While using the session service, the session control channel is fixed and using a well-known port, but the data channel is using select a dynamical and unknown port. The data channel would be decided in the control messages. For SIP (Session Initiation Protocol) applications, the voice data channel would be aware from the SDP (Session Description Protocol) information of SIP messages. Therefore, it’s difficult to implement a digital forensics system for multimedia session streaming services. Because of the rapid development of network architecture, the speed and quality of networks is increasing continually, such as from traditional dial-up access networks to fiber optic networks. The malicious attack from internet becomes difficult to tracking and record the illegal network behavior. Many network security problems are spread. Thus, it has to be redrawn by using digital forensics system to diagnose and recover the security events. Digital forensics is also called computer forensics. The network situation and behavior of the security events would be replayed by using computer forensics technology. The network packets are captured in OLT (Optical Line Termination) by using a traditional network forensics for GPON (Gigabit-capable Passive Optical Networks). Due to the symmetrical network speed with 2.5Gbps, the forensics task could not be handled in the high-speed situation. Some packets could be lost and the forensics is incomplete. This thesis proposed a two-tier architecture of forensics system with distributed loading. The system components were developed: Snooping Agent, Analyzing Server, and Media Processing Server. The System is design for GPON environment. Snooping Agent on the ONU (Optical Network Unit) deals with the packet capturing of SIP control channel, and the captured SIP packets are sent to the back-end component (Analyzing Server). The port numbers of the data channels will be figured out by Analyzing Server. According the port numbers, the audio and video packets will be captured and delivered to Media Processing Server. All of the session information and users data is stored in database and presented with web interface for event search. This thesis presented the two-tier structure of forensics system with distributed loading can reduce the loading of the centralized analyzer and data storage. The most packets are filtered in each ONU, and only the captured packets would be analyzed or stored.