Filters








7,037 Hits in 3.5 sec

Digital Evidence for Database Tamper Detection

Shweta Tripathi, Bandu Baburao Meshram
2012 Journal of Information Security  
Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection.  ...  Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis.  ...  The graph can be considered as the summarized output of the digital evidences collected for detecting the tampering in the database.  ... 
doi:10.4236/jis.2012.32014 fatcat:yuj5aduldnbh3onrhjc3jyuv7u

Forensic Investigation for Database Tampering using Audit Logs

Madhuri Aphale, Utkarsha Borikar, Bhagyashri Kardile, Vrushali Vasekar, Prof. Jadhav Shital
2015 International Journal of Engineering Research and  
Forensic analysis means collect evidence from number of location in database.  ...  Mechanism now exists that detect tampering of database through use of cryptographically strong one way hash function. Forensic analysis algorithms can help to determine when and what data tampered. .  ...  Shital Jadhav Madam from Bharati Vidyapeeth College of engineering for women for her kind help during the review of this paper.  ... 
doi:10.17577/ijertv4is030787 fatcat:7gusuhxacrajpje6nduufcw7e4

Data Tamper Detection from NoSQL Database in Forensic Environment

Rupali Chopade, Vinod Pachghare
2021 Journal of Cyber Security and Mobility  
Tamper detection techniques are useful for the detection of such data tampering which play an important role in database forensic investigation process.  ...  So there is a need to propose a mechanism to detect the tampering of NoSQL database systems.  ...  This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.  ... 
doi:10.13052/jcsm2245-1439.1025 fatcat:co4hjrlimzc6dft63t3fodzyya

On the Use of Benford's Law to Detect JPEG Biometric Data Tampering

Iorliam Aamo, Shangbum F. Caleb
2017 Journal of Information Security  
In this paper, the Benford's law features with support vector machine are proposed for the detection of malicious tampering of JPEG fingerprint images.  ...  Therefore, there exists a need to propose a method to detect data tampering, as well as differentiate biometric samples in cases of intentional or accidental use for a different application.  ...  Mario Hildebrandt for their useful inputs into this work. This paper is part of Iorliam's PhD research [21] at the University of Surrey, UK.  ... 
doi:10.4236/jis.2017.83016 fatcat:nmvp2m6yjveg3i5tikxmth7adm

Improving Security for Facial Image Using Fragile Digital Watermarking [chapter]

Zutao Zhang
2011 Face Analysis, Modeling and Recognition Systems  
Conclusion In this paper, we proposed a fragile digital watermarking for facial image database authentication, which not only can distinguish any minute tampers of facial image database but also detect  ...  Fig. 2 . 2 Valid facial image database detection 2. Tampered facial images detection Fig. 3 . 3 Tampered facial image detection 3.  ...  Improving Security for Facial Image Using Fragile Digital Watermarking, Face Analysis, Modeling and Recognition Systems, Dr.  ... 
doi:10.5772/20847 fatcat:jfh7jav6hjewlg67hhmrhf5szm

Deduplication Analysis of Products In Digital Marketing

P. Amudhavalli, N. Rajalakshmi, K.S. Sindhu
2018 Indonesian Journal of Electrical Engineering and Computer Science  
As Digital Marketing is becoming more popular, the number of customer's interpretation on brands is increasing promptly which makes it firmer for companies to evaluate their brand image and to digital  ...  We selected these techniques to compare and find the accuracy of the Digital Marketing images with the received product's images to identify the fraudulent activities on images in Digital Marketing.  ...  However some people used these tools to create tampered pictures and spread viral throughout the social media. Forensic analysis helps us to stand as an evidence for law enforcement.  ... 
doi:10.11591/ijeecs.v10.i1.pp392-399 fatcat:edienpytxfhrrj4ricg4pswigi

A GENERIC DATABASE FORENSIC INVESTIGATION PROCESS MODEL

Arafat Al-Dhaqm, Shukor Abd Razak, Siti Hajar Othman, Asri Nagdi, Abdulalem Ali
2016 Jurnal Teknologi  
Database Forensic investigation is a domain which deals with database contents and their metadata to reveal malicious activities on database systems.  ...  Thus, this will potentially facilitate the sharing of knowledge on database forensic investigation among domain stakeholders.  ...  Acknowledgement The authors would like to thank the Ministry of Higher Education Malaysia (MoHE) and UniversitiTeknologi Malaysia (UTM) for funding this study under the Fundamental Research Grant Scheme  ... 
doi:10.11113/jt.v78.9190 fatcat:pyb4unyyzbfo5bj74ovbjmbipi

Preserving Dates and Timestamps for Incident Handling in Android Smartphones [chapter]

Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
2014 IFIP Advances in Information and Communication Technology  
Destroying Evidence: Evidence is deleted to thwart a forensic investigation. For example, the tampering application can delete the contents of a SQLite database and the logcat buffer.  ...  Attack Methodology and Anti-Forensics Anti-forensic actions seek to destroy or tamper with digital evidence [9, 13] .  ... 
doi:10.1007/978-3-662-44952-3_14 fatcat:tqptre3fm5ep7nrhkqojna4ima

Analysis of Digital Image Splicing Detection

P.Sabeena Burvin, J.Monica Esther
2014 IOSR Journal of Computer Engineering  
In this paper, we analyze various automatic image forensic techniques for detecting digital image splicing.  ...  The availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes.  ...  in lighting can be used as a factor for detecting digital tampering.  ... 
doi:10.9790/0661-162111013 fatcat:agzv5zfczbcelmfx4lxewidkm4

Anti-Forensic Resistant Likelihood Ratio Computation

Anthony Ho, Aamo Iorliam, Norman Poh, Nik Suki
2014 Zenodo  
used to detect digital tampering of fingerprint images [18] .  ...  digital tampered images; and (3) investigating the impact of various settings for P (T = 1).  ... 
doi:10.5281/zenodo.44058 fatcat:4tsiyhbwynfd5enh77dvyvpcqy

Image tampering detection based on stationary distribution of Markov chain

Wei Wang, Jing Dong, Tieniu Tan
2010 2010 IEEE International Conference on Image Processing  
We model the edge image of image chroma component as a finite-state Markov chain and extract low dimensional feature vector from its stationary distribution for tampering detection.  ...  In this paper, we propose a passive image tampering detection method based on modeling edge information.  ...  The authors also thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/icip.2010.5652660 dblp:conf/icip/WangDT10 fatcat:g7ue6fehhne3pnrgjovu54vzi4

A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints

Ajit Singh, Jyoti Malik
2015 International Journal of Computer Applications  
Passive techniques extract and analyze inherent patterns introduced by various image processing steps and use these artifacts to associate the image with source device as well as to detect tampering of  ...  Over the past years image processing techniques have been developed that makes it really easy to tamper images.  ...  For tampering detection the computed quantization values are compared against database entries which contains quantization values for various popular image editing softwares  ... 
doi:10.5120/20444-2794 fatcat:ychi5xh4bnd6jp6lu4zyl77mom

Enhancement of Media Splicing Detection: A General Framework

Songpon Teerakanok, Tetsutaro Uehara
2018 Journal of Digital Forensics, Security and Law  
In this paper, a new general framework for enhancing today media splicing detection has been proposed.  ...  By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which anomalies are more explicitly shown, providing easier and faster way for  ...  Regarding the digital image, CASIA Tampered Image Detection Evaluation Database (2009), a public dataset of color digital images consisting of 7,491 authentic and 5,123 tampered digital images, was adopted  ... 
doi:10.15394/jdfsl.2018.1481 fatcat:cnunowwsxbbthaejsn7q7angoe

Conceptual Investigation Process Model for Managing Database Forensic Investigation Knowledge

Aarafat Aldhaqm, Shukor Abd Razak, Siti Hajar Othman, Abdulalem Ali, Asri Ngadi
2016 Research Journal of Applied Sciences Engineering and Technology  
Database Forensic Investigation (DBFI) discipline has been utilizing in identifying, collecting, preserving, analyzing, reconstructing and documenting database crimes.  ...  The functionality of many DBFI analysis algorithms and several DBFI artifacts available for forensics investigator are discussed. The DBFI challenges and issues are highlighted.  ...  Detecting database tampering algorithm was developed by Snodgrass et al. (2004) .  ... 
doi:10.19026/rjaset.12.2377 fatcat:i6hgcdkievbm7pqvvg3r2usv34

Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism

Piyush P.Gawali, Sunil R. Gupta
2013 International Journal of Computer Applications  
This paper show how to resolve when tampering arises in Database, what data was tampered and the identification of the person to tamper the data.  ...  It introduces the concept of a candidate set (all possible place of detected tampering(s)) and gives a full classification of the candidate set and its cardinality and prevent the intruder, the computing  ...  Thinking from the attacker's point of view this paper gives a contribution towards the identification of the general locations in a database for collecting the digital evidences.  ... 
doi:10.5120/10513-5483 fatcat:cc6nxhn3w5f2xfa5suotxsnp7y
« Previous Showing results 1 — 15 out of 7,037 results