Showing 341 - 360 results of 964 for search '"forensics"', query time: 0.07s Refine Results
  1. 341
  2. 342
  3. 343
  4. 344
  5. 345

    Perbandingan Tool Forensik Data Recovery Berbasis Android menggunakan Metode NIST by Imam Riadi, Sunardi Sunardi, Sahiruddin Sahiruddin

    Published 2020-02-01
    “…This research uses two smartphones as well as two Wondershare forensic tools from dr. Fone for Android and Oxygen Forensics Suite 2014, and use the NIST method which has a structured framework and forensic process that ensures investigators follow the steps of the research so that the results can be justified. …”
    Get full text
    Article
  6. 346

    Deepfake swapped face detection based on double attention by Xiaojuan GONG, Tianqiang HUANG, Bin WENG, Feng YE, Chao XU, Lijun YOU

    Published 2021-04-01
    “…In view of the existing Deepfake detection algorithms, such problems as low accuracy and poor interpretability are common.A neural network model combining the double attention was proposed, which used channel attention to capture the abnormal features of false faces and combined the location of spatial attention to focus the abnormal features.To fully learn the contextual semantic information of the abnormal part of the false face, so as to improve the effectiveness and accuracy of face changing detection.In addition, the decision-making area of real and fake faces was shown effectively in the form of thermal diagram, which provided a certain degree of explanation for the face exchange detection model.Experiments on FaceForensics ++ open source data set show that the detection accuracy of proposed method is superior to MesoInception, Capsule-Forensics and XceptionNet.…”
    Get full text
    Article
  7. 347
  8. 348
  9. 349
  10. 350
  11. 351
  12. 352
  13. 353
  14. 354

    AAC compression detection based on scaling factor transition probability by Qijuan HUANG, Rangding WANG, Diqun YAN

    Published 2017-11-01
    “…Audio compression history detection is an important part of audio forensics,which is important to detect whether audio has been tampered or forged.An algorithm of AAC audio compression history detection was presented by using the transition probability differences of scale factors as the discriminative feature.Experimental results demonstrate that the proposed method can distinguish the single,double and triple compressed AAC audios effectively,and from the low-bite-rate to high-bit-rate,the average classification accuracy achieves 99.75%,the same-bit-rate detection accuracy achieves 97.28%.In addition,the results of comparison experiments show that the proposed algorithm outperforms the state-of-the-art algorithm.…”
    Get full text
    Article
  15. 355

    La parole de l’enfant victime de crimes sexuels dans les procédures judiciaires aux Assises de la Charente (1889-1914) by Marie Rougier

    Published 2020-03-01
    “…In a context of a child welfare emerging from the end of the 19th century and paradoxically the development of theses supported by forensics on the mythomania of children in cases of indecent assault, this article proposes to question the place given to the speech of the child victim of a sexual crime with his depositories, and then throughout the investigation process.To achieve this objective, this study is based on the systematic counting of 68 procedural files of cases of rape, indecent assault and incest committed on minors and judged by the Court of Assizes of Charente, courts of Angoulême, Cognac, Barbezieux and Confolens from 1889 to 1914 and the exploitation of the charges, police or gendarmerie minutes, interrogations of investigating judges, hearing witnesses and medicals expertises.…”
    Get full text
    Article
  16. 356

    Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok by Halimah Septya Mikayla, Ari Kusyanti, Primantara Hari Trisnawan

    Published 2024-10-01
    “…It involves the creation of case scenarios and the application of a digital forensic investigative model specifically focused on social networks. …”
    Get full text
    Article
  17. 357

    Video inter-frame tampering detection algorithm fusing multiple features by Hui XIAO, Bin WENG, Tianqiang HUANG, Han PU, Zehui HUANG

    Published 2020-02-01
    “…Traditional passive forensics of video inter-frame tampering often relies on single feature.Each of these features is usually suitable for certain types of videos,while has low detection accuracy for other videos.To combine the advantages of these features,a video inter-frame tampering detection algorithm that could fuse multi-features was proposed.The algorithm firstly classified the input video into one group based on its space information and time information values.Then it calculated the VQA features that represented the video inter-frame continuity.These features were sorted by the SVM-RFE feature recursive elimination algorithm.Finally,the sorted features were filtered and fused by the sequential forward selection algorithm and Adaboost binary classifier.Experimental results show that the proposed algorithm could achieve higher tampering detection accuracy.…”
    Get full text
    Article
  18. 358

    Video tampering detection algorithm based on spatial constraint and gradient structure information by Han PU, Tianqiang HUANG, Bin WENG, Hui XIAO, Wei HUANG

    Published 2019-10-01
    “…The traditional video passive forensics method using only the principle of similarity between adjacent frames will cause a lot of false detection for the video with severe motion.Aiming at this problem,a video tamper detection method combining spatial constraints and gradient structure information was proposed.Firstly,the low motion region and the high texture region were extracted by using spatial constraint criteria.The two regions were merged to obtain the robust quantitative correlation rich regions for extracting video optimal similarity features.Then improving the extraction and description methods of the original features,and using the similarity of the gradient structure in accordance with the characteristics of the human visual system to calculate the spatial constraint correlation value.Finally,the tampering points were located by the Chebyshev inequality.Experiments show that the proposed algorithm has lower false detection rate and higher accuracy.…”
    Get full text
    Article
  19. 359

    CFA-Based Splicing Forgery Localization Method via Statistical Analysis by Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li

    Published 2024-01-01
    “…The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. …”
    Get full text
    Article
  20. 360

    Implementation of lightweight intrusion detection model for security of smart green house and vertical farm by Jun-Ho Huh

    Published 2018-04-01
    “…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
    Get full text
    Article