Listing 1 - 10 of 28 | << page >> |
Sort by
|
Choose an application
Digital forensic science. --- Image processing --- Digital techniques. --- Digital image processing --- Digital electronics --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation
Choose an application
Biometric identification --- Digital forensic science. --- Technological innovations. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification
Choose an application
Database security. --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Data base security --- Databases --- Computer security --- Security measures
Choose an application
This book is an open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Digital forensic science. --- Multimedia systems. --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Media Forensics --- Digital Image Forensics --- Video Forensics --- Sensor Noise (PRNU) --- Deepfakes --- Digital Integrity --- Video Tampering Detection --- Image Tampering Detection --- ENF --- Counter-Forensics --- Criminalística --- Sistemes multimèdia
Choose an application
Digital forensic science. --- Internet of things. --- Data privacy. --- Information privacy --- Information resources management --- Privacy --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Internet de les coses --- Seguretat informàtica
Choose an application
Digital forensic science --- Forensic sciences --- Criminal investigation --- Forensic Medicine --- Data processing --- Data processing. --- Medicine, Forensic --- Medicine, Legal --- Legal Medicine --- Jurisprudence --- Law Enforcement --- Biometric Identification --- DNA Contamination --- Crime detection --- Crime investigation --- Criminal investigations --- Detection of crime --- Investigations --- Law enforcement --- Crime scenes --- Detectives --- Informers --- Suspects (Criminal investigation) --- Criminalistics --- Forensic science --- Science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Digital preservation --- Digital forensic science. --- Criminalística --- Medicina legal --- Criminalística. --- Medicina legal. --- Criminalística. --- Forensic Medicine.
Choose an application
This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.
Computer security --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Telecommunication. --- Computer networks—Security measures. --- Blockchains (Databases). --- Data protection. --- Forensic sciences. --- Communications Engineering, Networks. --- Mobile and Network Security. --- Blockchain. --- Data and Information Security. --- Forensic Science. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Block chains (Databases) --- Database security --- Distributed databases
Choose an application
Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts. This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement of Computational Intelligence in Digital Forensics; in both theoretical and application papers related to novel discovery in intelligent forensics. The chapters are further organized into three sections: (1) Introduction, (2) Forensic Discovery and Investigation, which discusses the computational intelligence technologies employed in Digital Forensic, and (3) Intelligent Forensic Science Applications, which encompasses the applications of computational intelligence in Digital Forensic, such as human anthropology, human biometrics, human by products, drugs, and electronic devices.
Computational intelligence. --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Engineering. --- Computer security. --- Artificial intelligence. --- Computational Intelligence. --- Systems and Data Security. --- Artificial Intelligence. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Construction --- Industrial arts --- Technology --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures
Choose an application
Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical evidence, just as they have become our primary source of news and have replaced paper-based financial documentation. Crucially, the contributions also analyze the very profound problems which have arisen alongside the digital image, issues of veracity and progeny that demand systematic and detailed response: It looks real, but is it? What camera captured it? Has it been doctored or subtly altered? Attempting to provide answers to these slippery issues, the book covers how digital images are created, processed and stored before moving on to set out the latest techniques for forensically examining images, and finally addressing practical issues such as courtroom admissibility. In an environment where even novice users can alter digital media, this authoritative publication will do much so stabilize public trust in these real, yet vastly flexible, images of the world around us.
Crime prevention -- Technological innovations. --- Criminal investigation -- Technological innovations.. --- Criminal investigation. --- Law enforcement -- Technological innovations. --- Forensic sciences --- Criminal investigation --- Electronic evidence --- Electrical & Computer Engineering --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Telecommunications --- Criminology, Penology & Juvenile Delinquency --- Applied Physics --- Electrical Engineering --- Data processing --- Technological innovations --- Electronic evidence. --- Virtual computer systems --- Machine systems, Virtual --- Virtual machine systems --- Criminalistics --- Forensic science --- Digital evidence --- Technological innovations. --- Security measures. --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Engineering. --- Computer graphics. --- Image processing. --- Signal, Image and Speech Processing. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Image Processing and Computer Vision. --- Computer systems --- Digital computer simulation --- Science --- Evidence, Documentary
Choose an application
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises. This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis. Topics and features: Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the AccessData Forensic Toolkit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations. Joakim Kävrestad is a lecturer and researcher at the University of Skövde, Sweden, and an AccessData Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.
Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Computer security. --- Optical data processing. --- Public safety. --- Systems and Data Security. --- Image Processing and Computer Vision. --- Crime Control and Security. --- Safety, Public --- Human services --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Optical equipment --- Protection --- Security measures
Listing 1 - 10 of 28 | << page >> |
Sort by
|