Search results for "Forensics"
showing 10 items of 42 documents
Two tiered privacy enhanced intrusion detection system architecture
2009
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.
Cover Picture: Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation (Angew. Chem. Int. Ed. 45/2015)
2015
Nuclear Forensics: A methodology applicable to Nuclear Security and to Non-Proliferation
2011
Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material…
Il fattore personale dell'argomentazione: una prospettiva retorico-antropologica
2014
Dans le cadre d’une approche philosophique et épistémologique, qui privilège le point de vue rhétorique sur l’argumentation et la ligne de pensée Aristote-Vico-Perelman, la thèse essaye d’analyser la construction de la subjectivité dans le discours argumentatif. Je cherche à montrer qu’il est possible de tracer une théorie de l’argumentation dans laquelle subjective n’est pas synonyme de fallacieuse.En général, la thèse analyse le rôle de celui qui parle et de celui qui écoute dans l’argumentation et dans tous les discours. Je vais soutenir est que la dimension personnelle n’est pas un élément qu’il faut supprimer mais, au contraire, un élément essentiel du discours argumentatif.Une approch…
The Law of Service Robots
2014
Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…
A vision-based fully automated approach to robust image cropping detection
2020
Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…
The analysis of SUDEP forensic autopsies leading to preventable events
2023
Introduction: The diagnosis of unexpected death by excluding non-natural causes, particularly in subjects with epilepsy, is a topic of interest and it is difficult to identify in the forensic field. Health professionals sometimes are faced with cases of sudden death, generally in young adults with a long history of epilepsy that require, for judicial purposes, an explanation in terms of cause and means to determine the death. SUDEP is an entity diagnosed by the exclusion of other causes that may have led to death, and then for forensic purposes, it requires particular attention and knowledge, and there is difficulty in identifying it. Our contribution aims to illustrate the scientific commu…
Copy–Move Forgery Detection by Matching Triangles of Keypoints
2015
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…
A tool to support the creation of datasets of tampered videos
2015
Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users. Unlike Digital Image Forensics, to our knowledge, there are not standard datasets to test video forgery detection techniques. In this paper we present a new tool to support the users in creating datasets of tampered videos. We furthermore present our own dataset and we discuss some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye.
State of the art in passive digital image forgery detection: copy-move image forgery
2017
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…