|
|
|
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin...
ver más
|
|
|
|
|
|
|
Saad Said Alqahtany and Toqeer Ali Syed
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To ...
ver más
|
|
|
|
|
|
|
Georgios Karantaidis and Constantine Kotropoulos
The detection of computer-generated (CG) multimedia content has become of utmost importance due to the advances in digital image processing and computer graphics. Realistic CG images could be used for fraudulent purposes due to the deceiving recognition ...
ver más
|
|
|
|
|
|
|
Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou and Vassilis Tsiantos
Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increase...
ver más
|
|
|
|
|
|
|
Luis Alberto Martínez Hernández, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Due to the advancement of technology, cybercrime has increased considerably, making digital forensics essential for any organisation. One of the most critical challenges is to analyse and classify the information on devices, identifying the relevant and ...
ver más
|
|
|
|
|
|
|
Min-Jen Tsai, Ya-Chu Lee and Te-Ming Chen
QR codes (short for Quick Response codes) were originally developed for use in the automotive industry to track factory inventories and logistics, but their popularity has expanded significantly in the past few years due to the widespread applications of...
ver más
|
|
|
|
|
|
|
Furkan Paligu and Cihan Varol
Social media usage is increasing at a rapid rate. Everyday users are leaving a substantial amount of data as artifacts in these applications. As the size and velocity of data increase, innovative technologies such as Web Storage and IndexedDB are emergin...
ver más
|
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
|
Nikolaos Vryzas, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis and Charalampos Dimoulas
Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich research o...
ver más
|
|
|
|
|
|
|
Christos Karagiannis and Kostas Vergidis
Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity. Handling digital evidence is a complex and multifaceted pro...
ver más
|
|
|
|