Sciweavers

7544 search results - page 13 / 1509
» Network Forensics Analysis
Sort
View
DI
2006
67views more  DI 2006»
13 years 7 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
ICASSP
2007
IEEE
14 years 1 months ago
Block Size Forensic Analysis in Digital Images
In non-intrusive forensic analysis, we wish to find information and properties about a piece of data without any reference to the original data prior to processing. An important ...
Steven Tjoa, Wan-Yi Sabrina Lin, H. Vicky Zhao, K....
TIFS
2010
132views more  TIFS 2010»
13 years 5 months ago
JPEG error analysis and its applications to digital image forensics
JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics. In this paper, we int...
Weiqi Luo, Jiwu Huang, Guoping Qiu
PERCOM
2006
ACM
14 years 7 months ago
Law Enforcement, Forensics and Mobile Communications
Vanessa Gratzer, David Naccache, David Znaty
ICDAR
2009
IEEE
13 years 5 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...