Sciweavers

113 search results - page 9 / 23
» Statistical Tools for Digital Forensics
Sort
View
130
Voted
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
112
Voted
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 10 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
123
Voted
DGO
2004
111views Education» more  DGO 2004»
15 years 5 months ago
A Web Based Tool for an Automated Dental Identification System (ADIS)
We present a web-based environment for the Automated Dental Identification System (ADIS). This system is designed for identification missing, unidentified and wanted persons based...
Gamal Fahmy, Diaa Eldin M. Nassar, Eyad Jai-Said, ...
125
Voted
SADFE
2008
IEEE
15 years 10 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
163
Voted
CCS
2007
ACM
15 years 7 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...