Sciweavers

94 search results - page 2 / 19
» Performance Forensics
Sort
View
ICPR
2010
IEEE
13 years 2 months ago
Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions
Abstract-- This work studies the performance of a stateof-the-art fingerprint recognition technology, in several practical scenarios of interest in forensic casework. First, the di...
Maria Puertas, Daniel Ramos, Julian Fiérrez...
KES
2005
Springer
13 years 10 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
EUROSEC
2008
ACM
13 years 6 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
MEDIAFORENSICS
2010
13 years 6 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
ICASSP
2008
IEEE
13 years 11 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu