Computer Crime Investigations – Computer Forensics

Author(s):  
Joseph Migga Kizza
2014 ◽  
Vol 496-500 ◽  
pp. 2208-2215 ◽  
Author(s):  
Zhong Yong Fu ◽  
Zhen Zhou Zhao

With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon more and more. Computer forensics to protect information security and to crack down on computer crime provides scientific methods and means, can provide evidence of the court need. This paper first gives the definition of computer forensics, and then introduces the features of computer evidence, principles and classification of computer forensics, finally describes the research status of computer forensics, points out the problems existing in the computer forensics and its development trend is forecasted.


2005 ◽  
Vol 21 (2) ◽  
pp. 119-127 ◽  
Author(s):  
Yun Wang ◽  
James Cannady ◽  
James Rosenbluth

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Sign in / Sign up

Export Citation Format

Share Document