A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Digital Evidence for Database Tamper Detection
2012
Journal of Information Security
Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. ...
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. ...
The graph can be considered as the summarized output of the digital evidences collected for detecting the tampering in the database. ...
doi:10.4236/jis.2012.32014
fatcat:yuj5aduldnbh3onrhjc3jyuv7u
Forensic Investigation for Database Tampering using Audit Logs
2015
International Journal of Engineering Research and
Forensic analysis means collect evidence from number of location in database. ...
Mechanism now exists that detect tampering of database through use of cryptographically strong one way hash function. Forensic analysis algorithms can help to determine when and what data tampered. . ...
Shital Jadhav Madam from Bharati Vidyapeeth College of engineering for women for her kind help during the review of this paper. ...
doi:10.17577/ijertv4is030787
fatcat:7gusuhxacrajpje6nduufcw7e4
Data Tamper Detection from NoSQL Database in Forensic Environment
2021
Journal of Cyber Security and Mobility
Tamper detection techniques are useful for the detection of such data tampering which play an important role in database forensic investigation process. ...
So there is a need to propose a mechanism to detect the tampering of NoSQL database systems. ...
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. ...
doi:10.13052/jcsm2245-1439.1025
fatcat:co4hjrlimzc6dft63t3fodzyya
On the Use of Benford's Law to Detect JPEG Biometric Data Tampering
2017
Journal of Information Security
In this paper, the Benford's law features with support vector machine are proposed for the detection of malicious tampering of JPEG fingerprint images. ...
Therefore, there exists a need to propose a method to detect data tampering, as well as differentiate biometric samples in cases of intentional or accidental use for a different application. ...
Mario Hildebrandt for their useful inputs into this work. This paper is part of Iorliam's PhD research [21] at the University of Surrey, UK. ...
doi:10.4236/jis.2017.83016
fatcat:nmvp2m6yjveg3i5tikxmth7adm
Improving Security for Facial Image Using Fragile Digital Watermarking
[chapter]
2011
Face Analysis, Modeling and Recognition Systems
Conclusion In this paper, we proposed a fragile digital watermarking for facial image database authentication, which not only can distinguish any minute tampers of facial image database but also detect ...
Fig. 2 . 2 Valid facial image database detection 2. Tampered facial images detection
Fig. 3 . 3 Tampered facial image detection 3. ...
Improving Security for Facial Image Using Fragile Digital Watermarking, Face Analysis, Modeling and Recognition Systems, Dr. ...
doi:10.5772/20847
fatcat:jfh7jav6hjewlg67hhmrhf5szm
Deduplication Analysis of Products In Digital Marketing
2018
Indonesian Journal of Electrical Engineering and Computer Science
As Digital Marketing is becoming more popular, the number of customer's interpretation on brands is increasing promptly which makes it firmer for companies to evaluate their brand image and to digital ...
We selected these techniques to compare and find the accuracy of the Digital Marketing images with the received product's images to identify the fraudulent activities on images in Digital Marketing. ...
However some people used these tools to create tampered pictures and spread viral throughout the social media. Forensic analysis helps us to stand as an evidence for law enforcement. ...
doi:10.11591/ijeecs.v10.i1.pp392-399
fatcat:edienpytxfhrrj4ricg4pswigi
A GENERIC DATABASE FORENSIC INVESTIGATION PROCESS MODEL
2016
Jurnal Teknologi
Database Forensic investigation is a domain which deals with database contents and their metadata to reveal malicious activities on database systems. ...
Thus, this will potentially facilitate the sharing of knowledge on database forensic investigation among domain stakeholders. ...
Acknowledgement The authors would like to thank the Ministry of Higher Education Malaysia (MoHE) and UniversitiTeknologi Malaysia (UTM) for funding this study under the Fundamental Research Grant Scheme ...
doi:10.11113/jt.v78.9190
fatcat:pyb4unyyzbfo5bj74ovbjmbipi
Preserving Dates and Timestamps for Incident Handling in Android Smartphones
[chapter]
2014
IFIP Advances in Information and Communication Technology
Destroying Evidence: Evidence is deleted to thwart a forensic investigation. For example, the tampering application can delete the contents of a SQLite database and the logcat buffer. ...
Attack Methodology and Anti-Forensics Anti-forensic actions seek to destroy or tamper with digital evidence [9, 13] . ...
doi:10.1007/978-3-662-44952-3_14
fatcat:tqptre3fm5ep7nrhkqojna4ima
Analysis of Digital Image Splicing Detection
2014
IOSR Journal of Computer Engineering
In this paper, we analyze various automatic image forensic techniques for detecting digital image splicing. ...
The availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. ...
in lighting can be used as a factor for detecting digital tampering. ...
doi:10.9790/0661-162111013
fatcat:agzv5zfczbcelmfx4lxewidkm4
Anti-Forensic Resistant Likelihood Ratio Computation
2014
Zenodo
used to detect digital tampering of fingerprint images [18] . ...
digital tampered images; and (3) investigating the impact of various settings for P (T = 1). ...
doi:10.5281/zenodo.44058
fatcat:4tsiyhbwynfd5enh77dvyvpcqy
Image tampering detection based on stationary distribution of Markov chain
2010
2010 IEEE International Conference on Image Processing
We model the edge image of image chroma component as a finite-state Markov chain and extract low dimensional feature vector from its stationary distribution for tampering detection. ...
In this paper, we propose a passive image tampering detection method based on modeling edge information. ...
The authors also thank the anonymous reviewers for their valuable comments. ...
doi:10.1109/icip.2010.5652660
dblp:conf/icip/WangDT10
fatcat:g7ue6fehhne3pnrgjovu54vzi4
A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints
2015
International Journal of Computer Applications
Passive techniques extract and analyze inherent patterns introduced by various image processing steps and use these artifacts to associate the image with source device as well as to detect tampering of ...
Over the past years image processing techniques have been developed that makes it really easy to tamper images. ...
For tampering detection the computed quantization values are compared against database entries which contains quantization values for various popular image editing softwares ...
doi:10.5120/20444-2794
fatcat:ychi5xh4bnd6jp6lu4zyl77mom
Enhancement of Media Splicing Detection: A General Framework
2018
Journal of Digital Forensics, Security and Law
In this paper, a new general framework for enhancing today media splicing detection has been proposed. ...
By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which anomalies are more explicitly shown, providing easier and faster way for ...
Regarding the digital image, CASIA Tampered Image Detection Evaluation Database (2009), a public dataset of color digital images consisting of 7,491 authentic and 5,123 tampered digital images, was adopted ...
doi:10.15394/jdfsl.2018.1481
fatcat:cnunowwsxbbthaejsn7q7angoe
Conceptual Investigation Process Model for Managing Database Forensic Investigation Knowledge
2016
Research Journal of Applied Sciences Engineering and Technology
Database Forensic Investigation (DBFI) discipline has been utilizing in identifying, collecting, preserving, analyzing, reconstructing and documenting database crimes. ...
The functionality of many DBFI analysis algorithms and several DBFI artifacts available for forensics investigator are discussed. The DBFI challenges and issues are highlighted. ...
Detecting database tampering algorithm was developed by Snodgrass et al. (2004) . ...
doi:10.19026/rjaset.12.2377
fatcat:i6hgcdkievbm7pqvvg3r2usv34
Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism
2013
International Journal of Computer Applications
This paper show how to resolve when tampering arises in Database, what data was tampered and the identification of the person to tamper the data. ...
It introduces the concept of a candidate set (all possible place of detected tampering(s)) and gives a full classification of the candidate set and its cardinality and prevent the intruder, the computing ...
Thinking from the attacker's point of view this paper gives a contribution towards the identification of the general locations in a database for collecting the digital evidences. ...
doi:10.5120/10513-5483
fatcat:cc6nxhn3w5f2xfa5suotxsnp7y
« Previous
Showing results 1 — 15 out of 7,037 results