Search results for " forensics"

showing 10 items of 30 documents

Copy-move Forgery Detection via Texture Description

2010

Copy-move forgery is one of the most common type of tampering in digital images. Copy-moves are parts of the image that are copied and pasted onto another part of the same image. Detection methods in general use block-matching methods, which first divide the image into overlapping blocks and then extract features from each block, assuming similar blocks will yield similar features. In this paper we present a block-based approach which exploits texture as feature to be extracted from blocks. Our goal is to study if texture is well suited for the specific application, and to compare performance of several texture descriptors. Tests have been made on both uncompressed and JPEG compressed image…

Texture compressionComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage forensicscomputer.file_formatTexture (music)JPEGUncompressed videoDigital imageImage textureBlock (programming)Feature (computer vision)Computer visionArtificial intelligencebusinesscomputer
researchProduct

Nuclear Forensics: A methodology applicable to Nuclear Security and to Non-Proliferation

2011

Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material…

Nuclear reactionHistoryComputer scienceNuclear engineeringNuclear forensicschemistry.chemical_elementNuclear materialUraniumIsotopic compositionComputer Science ApplicationsEducationCharacterization (materials science)PlutoniumNuclear physicschemistryNeutron
researchProduct

Strukturētu datu grafu vizualizācija virtuālā realitātē kā rīks lai asistētu noziegumu digitālā izmeklēšanā

2022

Maģistra darbā „Strukturētu datu grafu vizualizācija virtuālā realitātē kā rīks lai asistētu noziegumu digitālā izmeklēšanā” tiek apskatīti pētījumi par datu apstrādes metodēm digitālā izmeklēšanā un datu attēlošanas paņēmieniem. Darba mērķis ir, balstoties uz pētījumu analīzi, izstrādāt reālus un funkcionējošus, divus savstarpēji atkarīgus, rīku prototipus, kas veiktu kriminālprocesa laikā izgūto datu apstrādi, izveidojot starp tām saistības, vienā un veiktu skaidru un saprotamu apstrādāto datu attēlošanu otrā.

Datu attēlošanaData processingDigital forensicsDatorzinātneDatu apstrādeDigitālā izmeklēšana
researchProduct

Pesticide occurrence in the waters of Júcar River, Spain from different farming landscapes.

2017

A combined methodology to identify and quantify farming chemicals in the entire Júcar River basin has been developed. The procedure consisted of the application of environmental forensic criteria associating laboratory analytical samples, cartographic analysis using Geographical Information Systems (GIS) and synthetic statistical analysis. Sampling involved the collection of 15 samples in surface waters distributed alongside the Júcar River and its two main tributaries (Cabriel and Magro Rivers). The analytical procedure involves generic sample extraction and selective determination of up to 50 target pesticides by liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS). Geogra…

IrrigationEnvironmental Engineering010504 meteorology & atmospheric sciencesDrainage basinMediterranean environment010501 environmental sciences01 natural sciencesTributaryEnvironmental ChemistryEnvironmental forensicsStatistical analysisWaste Management and Disposal0105 earth and related environmental sciencesHydrologygeographyEmerging contaminantsgeography.geographical_feature_categoryLandscape chemistryLand usebusiness.industrySpatial analysisSampling (statistics)PesticidePollutionAgricultureEnvironmental sciencebusinessThe Science of the total environment
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct

Shot-dead CT-virtopsy: our experience

2016

Learning objectives Background Findings and procedure details Conclusion Personal information References

Computer Applications-GeneralComputer Applications-Virtual imaginggenetic structuresComputer Applications-3DForensic / Necropsy studies CT Computer Applications-3D Computer Applications-General Computer Applications-Virtual imaging ForensicseducationForensic / Necropsy studiesCTForensics
researchProduct

A tool to support the creation of datasets of tampered videos

2015

Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users. Unlike Digital Image Forensics, to our knowledge, there are not standard datasets to test video forgery detection techniques. In this paper we present a new tool to support the users in creating datasets of tampered videos. We furthermore present our own dataset and we discuss some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopy move forgeryCopy move forgeryInformation retrievalVideo forensicComputer scienceForgery detectionComputer Science (all)Digital videoComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObject trackingCopy move forgery; Object tracking; Video forensics; Computer Science (all); Theoretical Computer ScienceData scienceTheoretical Computer ScienceVideo trackingResearch communityDigital image forensics
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

An Ontology-Based Approach for the Reconstruction and Analysis of Digital Incidents Timelines

2015

International audience; Due to the democratisation of new technologies, computer forensics investigators have to deal with volumes of data which are becoming increasingly large and heterogeneous. Indeed, in a single machine, hundred of events occur per minute, produced and logged by the operating system and various software. Therefore, the identification of evidence, and more generally, the reconstruction of past events is a tedious and time-consuming task for the investigators. Our work aims at reconstructing and analysing automatically the events related to a digital incident, while respecting legal requirements. To tackle those three main problems (volume, heterogeneity and legal require…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI][INFO.INFO-WB] Computer Science [cs]/WebComputer scienceOntology PopulationDigital forensics[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH][ INFO.INFO-WB ] Computer Science [cs]/Web02 engineering and technologyEvent ReconstructionOntology (information science)[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]SoftwareKnowledge extraction[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]020204 information systemsForensic OntologyTimeline Analysis0202 electrical engineering electronic engineering information engineering[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Event reconstructionKnowledge Extractionbusiness.industry[INFO.INFO-WB]Computer Science [cs]/WebTimelineComputer forensicsData scienceComputer Science Applications[ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY][INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Medical Laboratory TechnologyIdentification (information)Digital Forensics[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]020201 artificial intelligence & image processingbusinessLaw
researchProduct

Event Reconstruction

2014

Event reconstruction is one of the most important step in digital forensic investigations. It allows investigators to have a clear view of the events that have occurred over time. Event reconstruction is a complex task which requires exploration of a large amount of events due to the pervasiveness of new technologies nowadays. Any evidence produced at the end of the investigative process must also meet the requirements of the courts, such as reproducibility, verifiability, validation, etc. After defining the most important concepts of event reconstruction, a survey of the challenges of this field and solutions proposed so far is given in this chapter. Irish Research Council Science Foundati…

EngineeringDigital ForensicEmerging technologiesProcess (engineering)[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Digital forensicsEvent Reconstruction02 engineering and technologyField (computer science)Task (project management)[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]020204 information systemsMachine learning0202 electrical engineering electronic engineering information engineeringEvent reconstructionbusiness.industryStatisticsDigital holography020207 software engineeringData science[ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY][INFO.INFO-OH] Computer Science [cs]/Other [cs.OH][INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY]Terahertz imaging[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]State (computer science)businessSparsity
researchProduct