Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    REVIEW

    Applications of AI and Blockchain in Origin Traceability and Forensics: A Review of ICs, Pharmaceuticals, EVs, UAVs, and Robotics

    Hsiao-Chun Han1, Der-Chen Huang1,*, Chin-Ling Chen2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 67-126, 2025, DOI:10.32604/cmes.2025.070944 - 30 October 2025

    Abstract This study presents a systematic review of applications of artificial intelligence (abbreviated as AI) and blockchain in supply chain provenance traceability and legal forensics cover five sectors: integrated circuits (abbreviated as ICs), pharmaceuticals, electric vehicles (abbreviated as EVs), drones (abbreviated as UAVs), and robotics—in response to rising trade tensions and geopolitical conflicts, which have heightened concerns over product origin fraud and information security. While previous literature often focuses on single-industry contexts or isolated technologies, this review comprehensively surveys these sectors and categorizes 116 peer-reviewed studies by application domain, technical architecture, and functional objective. Special attention More >

  • Open Access

    ARTICLE

    Digital Evidence Lifecycle Management Framework in Courts of Law (DELM-C): A Case of Zanzibar High Courts

    Idarous Saleh Said1, Gilbert Gilibrays Ocen1,*, Mwase Ali2, Alunyu Andrew Egwar1

    Journal of Cyber Security, Vol.7, pp. 359-375, 2025, DOI:10.32604/jcs.2025.066979 - 25 September 2025

    Abstract The growing reliance on digital evidence in judicial proceedings has heightened the need for structured, secure, and legally sound frameworks for its collection, preservation, storage, and presentation. In Zanzibar, however, the integration of digital evidence into the court system remains hindered by the absence of standardized procedures and digital infrastructure, undermining the integrity and admissibility of such evidence. This study addresses these challenges by developing a comprehensive Digital Evidence Lifecycle Management Framework (DELM-C) tailored to the operational and legal context of the Zanzibar High Court. The proposed framework aims to streamline digital evidence handling, enhance… More >

  • Open Access

    REVIEW

    A Comprehensive Review on File Containers-Based Image and Video Forensics

    Pengpeng Yang1,2,*, Chen Zhou1, Dasara Shullani2, Lanxi Liu1, Daniele Baracchi2

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2487-2526, 2025, DOI:10.32604/cmc.2025.069129 - 23 September 2025

    Abstract Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis. Simultaneously, advancements in image and video processing technologies have facilitated the widespread availability of powerful editing tools, such as Deepfakes, enabling anyone to easily create manipulated or fake visual content, which poses an enormous threat to social security and public trust. To verify the authenticity and integrity of images and videos, numerous approaches have been proposed, which are primarily based on content analysis and their effectiveness is susceptible to interference… More >

  • Open Access

    ARTICLE

    Real-Time Deepfake Detection via Gaze and Blink Patterns: A Transformer Framework

    Muhammad Javed1, Zhaohui Zhang1,*, Fida Hussain Dahri2, Asif Ali Laghari3,*, Martin Krajčík4, Ahmad Almadhor5

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1457-1493, 2025, DOI:10.32604/cmc.2025.062954 - 29 August 2025

    Abstract Recent advances in artificial intelligence and the availability of large-scale benchmarks have made deepfake video generation and manipulation easier. Therefore, developing reliable and robust deepfake video detection mechanisms is paramount. This research introduces a novel real-time deepfake video detection framework by analyzing gaze and blink patterns, addressing the spatial-temporal challenges unique to gaze and blink anomalies using the TimeSformer and hybrid Transformer-CNN models. The TimeSformer architecture leverages spatial-temporal attention mechanisms to capture fine-grained blinking intervals and gaze direction anomalies. Compared to state-of-the-art traditional convolutional models like MesoNet and EfficientNet, which primarily focus on global facial… More >

  • Open Access

    REVIEW

    A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization

    Saurabh Agarwal1, Deepak Sharma2, Nancy Girdhar3, Cheonshik Kim4, Ki-Hyun Jung5,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4195-4221, 2025, DOI:10.32604/cmc.2025.066202 - 30 July 2025

    Abstract In today’s digital era, the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation. Unfortunately, this progress has also given rise to the misuse of manipulated images across various domains. One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images. This paper offers a comprehensive survey of existing methodologies for detecting image tampering, shedding light on the diverse approaches employed in the field of contemporary image forensics. The methods used to identify image forgery can be broadly classified into… More >

  • Open Access

    ARTICLE

    Data-Driven Digital Evidence Analysis for the Forensic Investigation of the Electric Vehicle Charging Infrastructure

    Dong-Hyuk Shin1, Jae-Jun Ha1, Ieck-Chae Euom2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3795-3838, 2025, DOI:10.32604/cmes.2025.066727 - 30 June 2025

    Abstract The accelerated global adoption of electric vehicles (EVs) is driving significant expansion and increasing complexity within the EV charging infrastructure, consequently presenting novel and pressing cybersecurity challenges. While considerable effort has focused on preventative cybersecurity measures, a critical deficiency persists in structured methodologies for digital forensic analysis following security incidents, a gap exacerbated by system heterogeneity, distributed digital evidence, and inconsistent logging practices which hinder effective incident reconstruction and attribution. This paper addresses this critical need by proposing a novel, data-driven forensic framework tailored to the EV charging infrastructure, focusing on the systematic identification, classification,… More >

  • Open Access

    ARTICLE

    Phishing Forensics: A Systematic Approach to Analyzing Mobile and Social Media Fraud

    Ananya Jha1, Amaresh Jha2,*

    Journal of Cyber Security, Vol.7, pp. 109-134, 2025, DOI:10.32604/jcs.2025.064429 - 30 May 2025

    Abstract This paper explores the methodologies employed in the study of mobile and social media phishing, aiming to enhance the understanding of these evolving threats and develop robust countermeasures. By synthesizing existing research, we identify key approaches, including surveys, controlled experiments, data mining, and machine learning, to gather and analyze data on phishing tactics. These methods enable us to uncover patterns in attacker behavior, pinpoint vulnerabilities in mobile and social platforms, and evaluate the effectiveness of current detection and prevention strategies. Our findings highlight the growing sophistication of phishing techniques, such as social engineering and deceptive More >

  • Open Access

    ARTICLE

    DDT-Net: Deep Detail Tracking Network for Image Tampering Detection

    Jim Wong1,2, Zhaoxiang Zang3,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3451-3469, 2025, DOI:10.32604/cmc.2025.061006 - 16 April 2025

    Abstract In the field of image forensics, image tampering detection is a critical and challenging task. Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation, which limits their effectiveness in complex scenarios involving multiple forms of tampering. Although deep learning-based methods offer the advantage of automatic feature learning, current approaches still require further improvements in terms of detection accuracy and computational efficiency. To address these challenges, this study applies the U-Net 3+ model to image tampering detection and proposes a hybrid framework, referred to as DDT-Net (Deep Detail… More >

  • Open Access

    ARTICLE

    A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations

    Sungbum Kim1, Gwangsik Lee2, Jian Song2, Insoo Lee2, Taeshik Shon3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 661-683, 2025, DOI:10.32604/cmc.2025.063687 - 26 March 2025

    Abstract The smart home platform integrates with Internet of Things (IoT) devices, smartphones, and cloud servers, enabling seamless and convenient services. It gathers and manages extensive user data, including personal information, device operations, and patterns of user behavior. Such data plays an essential role in criminal investigations, highlighting the growing importance of specialized smart home forensics. Given the rapid advancement in smart home software and hardware technologies, many companies are introducing new devices and services that expand the market. Consequently, scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home… More >

  • Open Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025

    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

Displaying 1-10 on page 1 of 40. Per Page