Further, in an infamous case that was disputed before the Dubai Court of Cassation, a person disputed his signature on a guarantee and consecutively, the court ordered in its remitting judgment that the document be passed to the crime laboratory for a comparison to be made between the true sig...
Detection of frame duplication type of forgery in digital video using sub-block based features. In: James J, Bre- itinger F, editors. Digital forensics and cyber crime. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunica- tions Engineering. Vol. 157. Cham...
The research focuses on historical attacks, the attack surface and mitigation strategies in order to solve cyber security concerns for SCADA systems in pow... M. S. Sujatha,S. Shabana Banu,V. Sai Sriyesh,... - 2024 10th International Conference on Electrical Energy Systems (ICEES) 被引量:...
File sharing ofintellectualproperty is only one aspect of the problem with copies. Another moremundaneaspect lies in the ability of digital devices to render nearly perfect copies of materialartifacts. Take the traditionalcrimeofcounterfeiting. Until recently, creating passable currency required a signific...
In: International conference on digital forensics and cyber crime. Springer, pp 29–38 Sitara K, Mehtre BM (2016) Digital video tampering detection: an overview of passive techniques. Digit Invest 18:8–22 Google Scholar Sitara K, Mehtre BM (2017) A comprehensive approach for exposing inter...
Further, in an infamous case that was disputed before the Dubai Court of Cassation, a person disputed his signature on a guarantee and consecutively, the court ordered in its remitting judgment that the document be passed to the crime laboratory for a comparison to be made between the true sig...
Image forgery detectionCyber crimeMD5 hashingCryptographyAESSteganographyDue to the widespread of advanced digital imaging devices, forgery of digital images became more serious attack patterns. In this attack scenario, the attacker tries to manipulate the digital image to conceal some meaningful information...
authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensi...