Sciweavers

113 search results - page 9 / 23
» Statistical Tools for Digital Forensics
Sort
View
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 2 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
DGO
2004
111views Education» more  DGO 2004»
13 years 10 months ago
A Web Based Tool for an Automated Dental Identification System (ADIS)
We present a web-based environment for the Automated Dental Identification System (ADIS). This system is designed for identification missing, unidentified and wanted persons based...
Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, ...
SADFE
2008
IEEE
14 years 3 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
CCS
2007
ACM
14 years 17 days ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...