2,203 resources related to Digital Forensics
- Topics related to Digital Forensics
- IEEE Organizations related to Digital Forensics
- Conferences related to Digital Forensics
- Periodicals related to Digital Forensics
- Most published Xplore authors for Digital Forensics
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
Multimedia technologies, systems and applications for both research and development of communications, circuits and systems, computer, and signal processing communities.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Reprints articles from other publications of significant interest to members. The papers are aimed at those engaged in managing research, development, or engineering activities. Reprints make it possible for the readers to receive the best of today's literature without having to subscribe to and read other periodicals.
Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...
Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.
2017 International Conference on Computer Science and Engineering (UBMK), 2017
Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...
2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...
2016 Digital Media Industry & Academic Forum (DMIAF), 2016
This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This ...
2014 IEEE Security and Privacy Workshops, 2014
The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases. Increasingly there is a requirement from the various legal and judicial authorities throughout the world, that any digital evidence presented in criminal and civil cases should meet requirements regarding the acceptance and ...
2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence, 2015
Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated. However, digital forensics ...
Seeing the Invisibles: A Backstage Tour of Information Forensics
George Oikonomou’s Paper: Traffic Forensics for IPv6-Based Wireless Sensor Networks and the IoT: WF-IoT 2016
MicroApps: How Digital Markets are Driving Microwave Technology (Agilent Technologies)
IMS 2012 Microapps - Simulating an NXP Doherty Power Amplifier with Digital Pre-Distortion
APEC Speaker Highlights: Robert White, Chief Engineer, Embedded Power
IMS 2011 Microapps - Digital Radio Testing Using an RF Channel Replicator
Analog to Digital Types
IEEE Top Trends for 2012 at CES: Metadata Automatically Organizes Digital Content
Analog to Digital Traits
IEEE Internet Inclusion: Advancing Solutions for Digital Inclusion Roundtable
IEEE Member Digital Library
Maker Faire 2008: Spectrum's Digital Clock Contest Winner
The Josephson Effect: Josephson Digital Electronics in the Soviet Union
Q&A with Bill Tonti: IEEE Digital Reality Podcast, Episode 6
Yamaha's Avant Grand Digital Piano Mimics Acoustic
Panel Moderator: Prasanto Kumar Roy - ETAP Delhi 2016
Tech News on IEEE.tv
Q&A with Jeewika Ranaweera: IEEE Digital Reality Podcast, Episode 8
Your Digital Clone for Games, Videos, and More
Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.
This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This approach is compared with two similar geometrical features. Experimental results show the superiority of the proposed feature over the existing ones. The proposed feature is more robust compared to the existing features that use geometrical information from human faces and gives better classification results, useful to digital forensics applications.
The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases. Increasingly there is a requirement from the various legal and judicial authorities throughout the world, that any digital evidence presented in criminal and civil cases should meet requirements regarding the acceptance and admissibility of digital evidence, e.g., Daubert or Frye in the US. There is also increasing expectation that digital forensics labs are accredited to ISO 17025 or the US equivalent ASCLD-Lab International requirements. On the one hand, these standards cover general requirements and are not geared specifically towards digital forensics. On the other hand, digital forensics labs are mostly left with costly piece-meal efforts in order to try and address such pressing legal and regulatory requirements. In this paper, we address these issues by proposing DF-C<sup>2</sup>M<sup>2</sup>, a capability maturity model that enables organisations to evaluate the maturity of their digital forensics capabilities and identify roadmaps for improving it in accordance with business or regulatory requirements. The model has been developed through consultations and interviews with digital forensics experts. The model has been evaluated by using it to assess the digital forensics capability maturity of a lab in a law enforcement agency.
Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated. However, digital forensics technology has not spread widely due to problems such as its high cost structure. In addition, this cost structure has not been fully analyzed yet. Therefore, in this study, the cost structure of digital forensics is quantified with the Work Breakdown Method (WBS), which is a project management method. First, literature about digital forensics was studied, and components were extracted. Next, a digital forensic cost structure was calculated with the WBS method. The cost structure of digital forensics can be divided roughly into system, operation, and facility. The results of the WBS clearly show that digital forensics requires many costs for practical use. As a result, the study can contribute to helping the manager of a company decide whether to introduce digital forensics or not.
In this paper, we consider digital forensics in the context of Web services based infrastructures. We propose a built in forensics aware framework called (Fi4SOA). Fi4SOA uses Sherwood Applied Business Security (SABSA) methodology to merge forensics properties with business requirements at service design phase, and a reasoning machine over a new proposed ontology to define forensics properties and monitor forensics events at run time phase.
We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, and provide immediate investigative suggestions before an investigation starts. These activities adapt depending on suspicious events, which in turn might require the collection and analysis of additional evidence. The reactive activities of a traditional digital forensics process are also adapted depending on the investigation findings.
Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization of a unified standard is the identification and evaluation of current proactive initiatives.
The development of information and communication technologies are increasing rapidly. The security of data processed and stored also must be prepared in higher security. One of the techniques in data security is digital forensics. Digital forensics is an investigative technique to identify or collect the information on a digital storage as evidence to expose crimes legally defensible. However, in this research we use a live forensics digital technique. Investigations using live forensics technique requires special handling because the volatile data in Random Access Memory which can be lost if the system is in off investigation. This investigation conducted on the system by dump memory investigator to the system which has been attacked and then transferred the file on system investigator. We investigate the data inside the RAM and make analysis about the accuracy using several cyber attacks like session hijacking, FTP attack, and illegal access. The result shows that all the attacks can be investigated and produced the evidence which is authentic, reliable, and defensible.
Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics.
No standards are currently tagged "Digital Forensics"
Digital Network Exploitation Analyst - Entry/Mid-Level
The National Security Agency
Cryptanalytic Computer Scientist - Entry/Mid-Level
The National Security Agency
Computer Scientist - Software Engineer/Cyber Developer - Entry to Experienced Level
The National Security Agency
Instructor, Computer Service Technology (Cybersecurity)
Coastline Community College