Academic literature on the topic 'Multimedia forensic'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multimedia forensic.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multimedia forensic"

1

Okan, Emmanuel Tettey. "Forensic Analysis on Streaming Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.

Full text
Abstract:
Since the advent of technology and digitalization of multimedia, there has been a massive increase in cybercrime. During streaming, with the availability of a network or internet source, multimedia; audio and visual can easily be accessed whiles being aired live. This technology dates as far back as 1990s. Similar to still videos and images, the user is able to download, pause, reverse or forward the show. The ability to stream multimedia has made it easier for users to partake or retrieve multimedia from the comfort of their homes, offices or personal spaces without necessarily being present. However, there are several challenges that affect the functionality of this technology, slow network connection and cybercrime. The issue of slow network may easily be handled by network providers, but cybercrimes has become rampant over the years. These attackers, also known as cyber criminals, use various activities to attack data. Some of their activities include phishing, data breach, identity theft and harassment. The paper has been written to assess forensic analysis of streaming multimedia. While exploring existing studies, it was realized that despite the rich availability of digital image forensics, video forensics hasn’t been explored much. This is because of the difficulty involved in analyzing the video data. Video data is always presented in a compressed form, unlike still images that are obtained in their original state. The compressed data often cancels or totally compromises the existing fingerprints, hence making it difficult to monitor or recover data. It was also revealed that, much has not been done so far as the research area is concerned. Keywords: Mobile Forensics, Cybersecurity, Streaming, Media, Video, Networks BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Tettey Okan (2022): Forensic Analysis On Streaming Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 221-226 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P36
APA, Harvard, Vancouver, ISO, and other styles
2

Lizarti, Nora, Bambang Sugiantoro, and Yudi Prayudi. "PENERAPAN COMPOSITE LOGIC DALAM MENGKOLABORASIKAN FRAMEWORK TERKAIT MULTIMEDIA FORENSIK." JISKA (Jurnal Informatika Sunan Kalijaga) 2, no. 1 (2017): 26. http://dx.doi.org/10.14421/jiska.2017.21-04.

Full text
Abstract:
Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.
APA, Harvard, Vancouver, ISO, and other styles
3

Wisdom, Frey John. "Digital Forensics In Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 239–50. http://dx.doi.org/10.22624/aims/crp-bk3-p39.

Full text
Abstract:
Digital forensics and multimedia forensics are rapidly growing disciplines where electronic information is extracted and interpreted using scientifically accepted and validated processes, to be used in and outside of a court of law. As personal computing and the internet becomes more widespread, these two fields are becoming increasingly important in law enforcement and cybercrime investigation.Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics which focuses on extracting and analyzing contents such as images, videos, and audio to produce forensic evidence from both regular computer systems and special multimedia devices, such as digital cameras, voice recorders etc. This paper seeks to shed some light on digital forensics in multimedia, methods of authentication and challenges. Keywords: Forensics, Multimedia, Scrutiny, Analysis, Video, Voice, Data, Camera, Authentication BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Frey John Wisdom (2022): Digital Forensics In Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 239-250 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P39
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Muhammad Khurram, Mohammed Zakariah, Hafiz Malik, and Kim-Kwang Raymond Choo. "A novel audio forensic data-set for digital multimedia forensics." Australian Journal of Forensic Sciences 50, no. 5 (2017): 525–42. http://dx.doi.org/10.1080/00450618.2017.1296186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.

Full text
Abstract:
In the context of forensic investigations, the traditional understanding of evidence is changing where nowadays most prosecutors, lawyers and judges heavily rely on multimedia signs. This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos as forensic evidences presenting the possibility of their tampering by various easy-to-use, available anti-forensics softwares. We proved that along with the forensic analysis, digital processing, enhancement and authentication via forgery detection algorithms to testify the integrity of the content and the respective source of each, differentiating between an original and altered evidence is now feasible. These operations assist the court to attain higher degree of intelligibility of the multimedia data handled and assert the information retrieved from each that support the success of the investigation process.
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Hao, Pengpeng Yang, Rongrong Ni, and Yao Zhao. "Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network." Security and Communication Networks 2021 (March 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/6663486.

Full text
Abstract:
In the multimedia forensics community, anti-forensics of contrast enhancement (CE) in digital images is an important topic to understand the vulnerability of the corresponding CE forensic method. Some traditional CE anti-forensic methods have demonstrated their effective forging ability to erase forensic fingerprints of the contrast-enhanced image in histogram and even gray level cooccurrence matrix (GLCM), while they ignore the problem that their ways of pixel value changes can expose them in the pixel domain. In this paper, we focus on the study of CE anti-forensics based on Generative Adversarial Network (GAN) to handle the problem mentioned above. Firstly, we exploit GAN to process the contrast-enhanced image and make it indistinguishable from the unaltered one in the pixel domain. Secondly, we introduce a specially designed histogram-based loss to enhance the attack effectiveness in the histogram domain and the GLCM domain. Thirdly, we use a pixel-wise loss to keep the visual enhancement effect of the processed image. The experimental results show that our method achieves high anti-forensic attack performance against CE detectors in the pixel domain, the histogram domain, and the GLCM domain, respectively, and maintains the highest image quality compared with traditional CE anti-forensic methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Ruslan, Takdir, Imam Riadi, and Sunardi Sunardi. "FORENSIK MULTIMEDIA BERBASIS MOBILE MENGGUNAKAN METODE NATIONAL INSTITUTE OF JUSTICE." Jurnal SAINTEKOM 12, no. 1 (2022): 69–80. http://dx.doi.org/10.33020/saintekom.v12i1.210.

Full text
Abstract:
Current technological developments make it easier for people to share information and carry out communication activities through instant messaging applications using multimedia features in the form of audio and video. Technology has been able to contribute and facilitate humans in a positive sense, but it can also be misused to carry out negative activities. In solving crime problems using instant messages, investigators need to carry out digital forensics, including on mobile devices such as smartphones. This study aims to obtain digital evidence of online drug sales scenarios via Facebook messenger and WhatsApp using four forensic tools, namely Belkasoft, Oxygen, MOBILedit, and Magnet Axiom. The National Institute of Justice (NIJ) is used as a framework with stages, namely identification, solution, testing, evaluation, and reporting of results. out of the four tools, MOBILedit cannot recover deleted audio and video while the other three tools can recover deleted audio and video.
APA, Harvard, Vancouver, ISO, and other styles
8

Marcon, Federico, Cecilia Pasquini, and Giulia Boato. "Detection of Manipulated Face Videos over Social Networks: A Large-Scale Study." Journal of Imaging 7, no. 10 (2021): 193. http://dx.doi.org/10.3390/jimaging7100193.

Full text
Abstract:
The detection of manipulated videos represents a highly relevant problem in multimedia forensics, which has been widely investigated in the last years. However, a common trait of published studies is the fact that the forensic analysis is typically applied on data prior to their potential dissemination over the web. This work addresses the challenging scenario where manipulated videos are first shared through social media platforms and then are subject to the forensic analysis. In this context, a large scale performance evaluation has been carried out involving general purpose deep networks and state-of-the-art manipulated data, and studying different effects. Results confirm that a performance drop is observed in every case when unseen shared data are tested by networks trained on non-shared data; however, fine-tuning operations can mitigate this problem. Also, we show that the output of differently trained networks can carry useful forensic information for the identification of the specific technique used for visual manipulation, both for shared and non-shared data.
APA, Harvard, Vancouver, ISO, and other styles
9

Zawali, Bako, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell, and Arafat A-Dhaqm. "Realising a Push Button Modality for Video-Based Forensics." Infrastructures 6, no. 4 (2021): 54. http://dx.doi.org/10.3390/infrastructures6040054.

Full text
Abstract:
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video content that, for example, has been manipulated digitally. To address this perennial investigative challenge, this paper proposes the integration of a forensically sound push button forensic modality (PBFM) model for the investigation of the MP4 video file format as a step towards automated video forensic investigation. An open-source multimedia forensic tool was developed based on the proposed PBFM model. A comprehensive evaluation of the efficiency of the tool against file alteration showed that the tool was capable of identifying falsified files, which satisfied the underlying assertion of the PBFM model. Furthermore, the outcome can be used as a complementary process for enhancing the evidence admissibility of MP4 video for forensic investigation.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, H. V., Min Wu, Z. J. Wang, and K. J. Ray Liu. "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting." IEEE Transactions on Image Processing 14, no. 5 (2005): 646–61. http://dx.doi.org/10.1109/tip.2005.846035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!