scholarly journals Anti- Forensics: The Tampering of Videos

2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Fayyad Kazan H

In the context of forensic investigations, the traditional understanding of evidence is changing nowadays where most prosecutors, lawyers and judges heavily rely on multimedia substantiations. However, the evolution of easy-to-use media manipulating tools, made it very easy for almost any (technical) person to alter the content of a digital media (e.g. digital image, audio or video) without leaving any traces that can be detectable by human's basic perceptions. Therefore, the validity of the digital media can no longer be guaranteed which in turn leads to a serious problem regarding digital crime investigation. As there are tools which can tamper media, there are also ones that can do the reverse: detect the tampering. This paper sheds the light on the available anti-forensics tools. Experiments were done using some of these tools to detect tampered media – more specifically video tampering. Our experiments showed the efficiency of these tools by differentiating between original and altered evidences.

2020 ◽  
Vol 189 ◽  
pp. 03013
Author(s):  
Shan Li

In the context of the development of digital image era and digital media art, watercolor art, as a traditional form of painting, will inevitably experience a subversive change and transformation of painting methods and ideas. By analyzing the artistic expression and construction process of watercolor art in digital painting, this paper finds out the aesthetic value and significance of watercolor art in digital painting, discusses the relationship between traditional watercolor painting and digital painting and the new space of watercolor development in the future.


Author(s):  
Thomas M. Chen ◽  
Chris Davis

This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A comprehensive understanding of attackers, their motives, and their methods is a prerequisite for digital crime investigation. The range of possible cyber attacks is almost unlimited, but many attacks generally follow the basic steps of reconnaissance, gaining access, and cover-up. We highlight common methods and tools used by attackers in each step. In addition, attacks are not necessarily directed toward specific targets. Viruses, worms, and spam are examples of large-scale attacks directed at compromising as many systems as possible.


2014 ◽  
Vol 543-547 ◽  
pp. 2435-2439
Author(s):  
Wei Li ◽  
Xin Yu Zhang

From rest to exercise and from two-dimensional to three-dimensional, digital image processing software can be multi-angle, multi-dimension, multi-direction infiltration for the various fields of design, which has wide applications in every corner of digital media. Firstly, the digital image processing software can analyze the common digital processing system model. On the basis of the principle of RGB color histogram, it also can analyze its application in the ceramic design. According to the set of image transformation principle, the analysis of the geometric transformation plays an important role in in ceramic set, to provide the theoretical basis for the digital image processing software to a certain extent.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Lifang Chen

A required course for students majoring in digital media technology, computer science and technology, or artificial intelligence is “digital image processing technology.” Aviation, medical image processing, intelligent manufacturing, and many more fields may benefit from the knowledge and skills gained in this course. It contains the qualities of “many conceptions, numerous principles, and various formulae,” according to the curriculum. As a result, traditional teaching techniques only pay attention to the explanation of theoretical information, which may easily lead students to create uninteresting feelings; they have abandoned the in-depth investigation and learning of the course material. The PBL approach is used to provide an interest-driven and problem-solving-driven grounded teaching technique that naturally connects the theoretical foundation with real-world examples and problems. We utilize case teaching to assist students better comprehend theoretical information and to teach them how to apply theoretical knowledge to actual difficulties they encounter in their lives. During the course of many semesters of practice, we discovered that our teaching approaches are quite popular with students. The deployment of a teaching style focused on problem-based learning has resulted in significant improvements in students’ learning initiative, practical ability, and innovative ability.


Author(s):  
Davidson C. Onwubiko ◽  
Felix E. Eboibi

The increased use of the internet and information technology in Nigeria has led to the need to utilize technologies to identify and prosecute perpetrators of crimes. In today’s world, the application of forensics in the investigation and prosecution of crimes is essential. This paper critically examines the effect of the absence of a coordinated standard for the execution and presentation of forensic investigations utilizing electronic evidence in Nigeria. It examines the nature and scope of the various forensic models proposed, while questioning the appropriateness or otherwise of their usefulness in criminal prosecutions. The paper suggests the need for the regulation of forensics practices, the provision of standards, and a universal model for the successful prosecution of crimes in Nigeria. Index words: Nigeria; forensic examination; digital crime; standardization


In today’s world, the enhancement in internet technologies, digital data are mostly used to share the information in public networks. There are many traditional security techniques used to provide security to the digital information. But the existing methods don’t provide much of the security to digital media like image, video, audio, etc. The digital watermarking is employed in the protection of digital information. This paper gives a review on digital image watermarking based on the visual cryptography to reach secure protection for the images. The secret information can be inserted in the original images. The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. Various types of Visual Cryptography and Digital Image Watermarking techniques are explained in real time application.


2002 ◽  
Vol 27 (3) ◽  
pp. 26-29 ◽  
Author(s):  
Max Marmor

ArtSTOR is a digital imaging initiative of The Andrew W. Mellon Foundation. ArtSTOR seeks to create digital image collections that respond to the needs of scholars, curators, teachers and students in the history of art and related fields of study. As a public utility, it also aims to create a secure, regulated, networked space, defined by a framework of licensing agreements that embraces content providers, subscribers and service administrators - a precinct in which educational and scholarly activities can flourish in ways that simultaneously respect intellectual property rights and encourage the ‘fair use’ of digital media.


2011 ◽  
Vol 4 (5) ◽  
pp. 278-283 ◽  
Author(s):  
Mayur Patankar ◽  
◽  
Deepika Bhandari

2021 ◽  
Vol 14 (3) ◽  
pp. 578-591
Author(s):  
Christoph Bareither

This article develops the concept of emotional affordances, which is first used to describe the capacities of heritage sites to enable, prompt and restrict particular emotional experiences of their visitors. Secondly, the article asks how the emotional affordances of digital media, particularly those taking effect in digital photography and social media practices, allow visitors to mediate the emotional affordances of a particular heritage site. The argument builds on an ethnographic study of visitors’ digital image practices at the ‘Memorial to the Murdered Jews of Europe’ in Berlin and it demonstrates how visitors ‘capture the feeling’ of the memorial through such practices while also reshaping the experiences the place affords.


Digital watermarking is a digital data that can be embedded in digital documents, images, audio and video. This watermark technique uses the unique biometric data of individuals. The individuals biometric of eye, vein and fingerprint is embedded in the digital image. These unique data are fused and encrypted. The fusion of three biometric data is output as a digital image. The host image is processed for embedding the fusion image in it. The process of embedding image in another image is watermarking. It is also the domain of image processing. Generally it means hiding an image in the host image. It is a technique to secure the unique data of owner in an image to prove the ownership of the owner. Watermarking the unique features in a digital image establish that the digital image is belongs to the user whose biometric data watermarked. The watermarking process is robust and perceptual transparency. The unique biometric data will logically prove the ownership of digital media.


Sign in / Sign up

Export Citation Format

Share Document