Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (36)
  • Open Access

    ARTICLE

    An Advanced Integrated Approach in Mobile Forensic Investigation

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 87-102, 2022, DOI:10.32604/iasc.2022.022972

    Abstract Rapid advancement of digital technology has encouraged its use in all aspects of life, including the workplace, education, and leisure. As technology advances, so does the number of users, which leads to an increase in criminal activity and demand for a cyber-crime investigation. Mobile phones have been the epicenter of illegal activity in recent years. Sensitive information is transferred due to numerous technical applications available at one’s fingertips, which play an essential part in cyber-crime attacks in the mobile environment. Mobile forensic is a technique of recovering or retrieving digital evidence from mobile devices so that it may be submitted… More >

  • Open Access

    ARTICLE

    Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 963-978, 2022, DOI:10.32604/csse.2022.019483

    Abstract Mobile devices and social networks provide communication opportunities among the young generation, which increases vulnerability and cybercrimes activities. A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters. This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit. We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection. We use forensics techniques, Machine Learning (ML), and Deep Learning (DL) algorithms to exploit suspicious… More >

  • Open Access

    ARTICLE

    CNN-Based Forensic Method on Contrast Enhancement with JPEG Post-Processing

    Ziqing Yan1,2, Pengpeng Yang1,2, Rongrong Ni1,2,*, Yao Zhao1,2, Hairong Qi3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3205-3216, 2021, DOI:10.32604/cmc.2021.020324

    Abstract As one of the most popular digital image manipulations, contrast enhancement (CE) is frequently applied to improve the visual quality of the forged images and conceal traces of forgery, therefore it can provide evidence of tampering when verifying the authenticity of digital images. Contrast enhancement forensics techniques have always drawn significant attention for image forensics community, although most approaches have obtained effective detection results, existing CE forensic methods exhibit poor performance when detecting enhanced images stored in the JPEG format. The detection of forgery on contrast adjustments in the presence of JPEG post processing is still a challenging task. In… More >

  • Open Access

    ARTICLE

    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    Marriam Nawaz1, Zahid Mehmood2,*, Tahira Nazir1, Momina Masood1, Usman Tariq3, Asmaa Mahdi Munshi4, Awais Mehmood1, Muhammad Rashid5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1927-1944, 2021, DOI:10.32604/cmc.2021.018052

    Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also uses discrete wavelet transform (DWT)… More >

  • Open Access

    ARTICLE

    Digital Forensics for Skulls Classification in Physical Anthropology Collection Management

    Imam Yuadi1,*, Myrtati D. Artaria2, Sakina3, A. Taufiq Asyhari4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3979-3995, 2021, DOI:10.32604/cmc.2021.015417

    Abstract The size, shape, and physical characteristics of the human skull are distinct when considering individual humans. In physical anthropology, the accurate management of skull collections is crucial for storing and maintaining collections in a cost-effective manner. For example, labeling skulls inaccurately or attaching printed labels to skulls can affect the authenticity of collections. Given the multiple issues associated with the manual identification of skulls, we propose an automatic human skull classification approach that uses a support vector machine and different feature extraction methods such as gray-level co-occurrence matrix features, Gabor features, fractal features, discrete wavelet transforms, and combinations of features.… More >

  • Open Access

    ARTICLE

    Instagram Mobile Application Digital Forensics

    Muhammad Asim Mubarik1, Zhijian Wang1, Yunyoung Nam2,*, Seifedine Kadry3, Muhammad Azam waqar4

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 169-186, 2021, DOI:10.32604/csse.2021.014472

    Abstract In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily… More >

  • Open Access

    ARTICLE

    Video Source Identification Algorithm Based on 3D Geometric Transformation

    Jian Li1, Yang Lv1, Bin Ma1,*, Meihong Yang2, Chunpeng Wang1, Yang Zheng3

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 513-521, 2020, DOI:10.32604/csse.2020.35.513

    Abstract Digital video has become one of the most preferred ways for people to share information. Considering people tend to release illegal information in anonymous way, the problem of video source identification attracts more and more attention as an important part of multimedia forensics. The Photo-Response Non-Uniformity (PRNU) based algorithm shows to be a promising solution for the problem of video source identification. However, it is necessary to make a geometric transformation for testing PRNU noise to align it with the reference noise, due to the effect of video stabilization. This paper analyzes the three-dimensional (3D) characteristics of camera jitters and… More >

  • Open Access

    ARTICLE

    Deep Learning for Distinguishing Computer Generated Images and Natural Images: A Survey

    Bingtao Hu*, Jinwei Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.2, pp. 95-105, 2020, DOI:10.32604/jihpp.2020.010464

    Abstract With the development of computer graphics, realistic computer graphics (CG) have become more and more common in our field of vision. This rendered image is invisible to the naked eye. How to effectively identify CG and natural images (NI) has been become a new issue in the field of digital forensics. In recent years, a series of deep learning network frameworks have shown great advantages in the field of images, which provides a good choice for us to solve this problem. This paper aims to track the latest developments and applications of deep learning in the field of CG and… More >

  • Open Access

    ARTICLE

    Resampling Factor Estimation via Dual-Stream Convolutional Neural Network

    Shangjun Luo1, Junwei Luo1, Wei Lu1,*, Yanmei Fang1, Jinhua Zeng2, Shaopei Shi2, Yue Zhang3,4

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 647-657, 2021, DOI:10.32604/cmc.2020.012869

    Abstract The estimation of image resampling factors is an important problem in image forensics. Among all the resampling factor estimation methods, spectrumbased methods are one of the most widely used methods and have attracted a lot of research interest. However, because of inherent ambiguity, spectrum-based methods fail to discriminate upscale and downscale operations without any prior information. In general, the application of resampling leaves detectable traces in both spatial domain and frequency domain of a resampled image. Firstly, the resampling process will introduce correlations between neighboring pixels. In this case, a set of periodic pixels that are correlated to their neighbors… More >

  • Open Access

    ARTICLE

    Multi-Purpose Forensics of Image Manipulations Using Residual- Based Feature

    Anjie Peng1, Kang Deng1, Shenghai Luo1, Hui Zeng1, 2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2217-2231, 2020, DOI:10.32604/cmc.2020.011006

    Abstract The multi-purpose forensics is an important tool for forge image detection. In this paper, we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typical image manipulations, including spatial low-pass Gaussian blurring, median filtering, re-sampling, and JPEG compression. To eliminate the influences caused by diverse image contents on the effectiveness and robustness of the feature, a residual group which contains several highpass filtered residuals is introduced. The partial correlation coefficient is exploited from the residual group to purely measure neighborhood correlations in a linear way. Besides that, we also combine autoregressive coefficient and… More >

Displaying 21-30 on page 3 of 36. Per Page