Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
نویسنده
چکیده
An obstacle in any Child Pornography (CP) investigation is the investigator’s ability to determine whether the pictures in question have been altered. Because of the court ruling in Ashcroft v. Free Speech, many agents are asked on the stand if they can prove the pictures they recovered were altered in any way. If the picture doesn’t match any known CP hashes, then it can be very difficult to prove they are untouched. One way an investigator may be able determine if a picture is authentic is through extraction of metadata. In the case of digital pictures, they may contain EXIF headers that can help the investigator to verify the authenticity of a picture.
منابع مشابه
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملAccuracy of an Intraoral Digital System for File Length Measurement
Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...
متن کاملSignature analysis and Computer Forensics
Computer Forensics is a process of using scientific knowledge to collect, analyze and present digital evidence to court or tribunals. Since files are the standard persistent form of data on computers, the collection, analysis and presentation of computer files as digital evidence is of utmost essential in Computer Forensics. However, data can be hidden behind files and can be enough to trick th...
متن کاملMetadata Practices for Consumer Photos
storage devices today, combined with the rapid expansion of broadband Internet connectivity, has given consumers more control over their digital photo collections than ever before. There’s virtually no limit to the amount of digital images we can keep and store on our PCs. As a result, the emerging challenge is searching through these digital image collections. With no information about the ima...
متن کاملSeeking Information Resources by Medical Students in Emergency Medicine
Introduction: Members of the health care team in medical emergencies have little information about admitted patients and rely on several information resources in order to manage these patients. The aim of this study was to determine the information resources for medical students in emergency ward. Methods: This descriptive study was performed on 146 last year medical students attended in emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJDE
دوره 2 شماره
صفحات -
تاریخ انتشار 2004