نتایج جستجو برای: Digital Forensic Artifacts
تعداد نتایج: 354431 فیلتر نتایج به سال:
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
The products of graphic design applications, leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graph...
Forensic artifacts refer to bits of information that an operating system records, when a user is using his computer system. These bits of data are user/session specific and provide all information regarding the use of a particular application or program along with the necessary time stamps. A digital forensic investigator needs to be aware of such artifacts in order to perform a legally accepta...
With the growing awareness of the fraud case for digital images, the researchers have developed some forensic techniques that based on the intrinsic statistical history or trace left by the jpeg compression to determine an image’s manipulation. Aiming at these forensic algorithms, special anti-forensic techniques was developed by removing footprints caused by jpeg compression. In this paper, th...
Modern computers are beginning to surpass the design limitations of the aging DOS/MBR partition tables and BIOS boot system. As disk sizes begin to exceed two terabytes and hardware vendors begin to transition from BIOS to EFI, understanding GPT disks in forensic examinations becomes useful. This practitioner paper provides an overview of the GUID Partition Table (GPT) scheme from the perspecti...
Cloud forensics analyzes digital evidence obtained from cloud computing environments. In the cloud, the traditional forensic focus of acquiring and analyzing snapshots of digital artifacts will becomes significantly less relevant as many of the artifacts are ephemeral, while the history of state changes become pervasive. This, over the medium-to-long term, the task of forensically reconstructin...
Abstract: Nowadays, digital images can be easily modified by using high-performance computers, sophisticated photo-editing, computer graphics software, etc. These modifications will affect the authenticity of images, from law, politics, the media, and business. Detecting forgery in digital images is one of the major research activities in the current time. In general, altering the digital image...
This chapter presents a high-level overview of image formation in a digital camera, highlighting aspects of potential interest in forensic applications. The discussion here focuses on image processing, especially processing steps related to concealing artifacts caused by camera hardware or that tend to create artifacts themselves. Image storage format issues are also discussed.
Digital traces found on local hard drives as a result of online activities have become very valuable in reconstructing events in digital forensic investigations. This paper demonstrates that forged alibis can be created for online activities and social interactions. In particular, a novel, automated framework is presented that uses social interactions to create false digital alibis. The framewo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید