scholarly journals ANTI-FORENSICS: COUNTERING SENSOR NOISE CAMERA IDENTIFICATION

Author(s):  
Nikhith Suvarna

In simple terms, Anti-Forensics can be told as the techniques used to counter forensic analysis done by forensic investigators. This paper mainly focuses on some of the most used anti-forensics techniques along with the challenges the forensics investigator faces. There are many tools and techniques available that when used properly can be highly effective against the forensic analysis techniques. Various tools assist you against various anti-forensics techniques like Elimination of evidence source, Data hiding, and Trail obfuscation. These techniques are used mainly to make the investigation consume more time and money. Sensor Noise Camera Identification is a way to link a photo with the camera the photo was taken from using a noise signature that is unique for every camera. KEYWORDS: Anti-Forensics (AF), Forensic Analysis, Anti-Forensic Techniques, Sensor Noise Camera Identification

2011 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
John Haggerty ◽  
Alexander J. Karran ◽  
David J. Lamb ◽  
Mark Taylor

The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation.


2010 ◽  
Author(s):  
Miroslav Goljan ◽  
Jessica Fridrich ◽  
Mo Chen

2020 ◽  
Vol 32 (1) ◽  
pp. 70-79
Author(s):  
Faizatur Rofi'ah

The proliferation of the corona virus affects all aspects of life, including education. This led to a revolution in the learning from conventional to digital. The purpose of this study is to 1) describe the general review of learning in mathematics and; 2) analyzing the alternatives to the learning revolution in mathematics with the physical policy of physical distancing. This research uses type of reference research. The validity test uses source data triangulation. Data validity obtained with various sources and extensions. Data analysis techniques use constant methods of comparison. The result of this article, which is 1) in general, math learning has been more conventional (face to face) and; 2) there is an alternative to math related to physical distancing, which is online/long-distance learning by making good use of accessible applications through Internet service. Online math learning by giving both a learning video, the settings are as interesting as possible, online discussions, and assessments through online quizzes.


2016 ◽  
Vol 2 (02) ◽  
pp. 103-120
Author(s):  
Sudjadi Tjipto Rahardjo ◽  
Rossa Dyana Pramusita

AbstrakKemasan pada saat ini telah mengalami penambahan fungsi dimana kemasan tidak lagi sekedar untuk melindungi dan sebagai wadah, tetapi juga berfungsi sebagai media promosi serta komunikasi sebuah produk. Kini desain kemasan telah menjadi bagian penting dalam proses pemasaran. Penelitian ini mengambil objek kajian kemasan Roti Murni di Yogyakarta yang sudah lama tidak mengalami perubahan desain kemasannya. Tujuan dari penelitian adalah untuk mengetahui latar belakang desain kemasan Roti Murni yang sudah lama tidak mengalami perubahan dan meninjau kemasan kardus Roti Murni dengan teori kemasan Desain Komunikasi Visual. Metodologi penelitian kualitatif digunakan dengan sumber data yang diperoleh dengan cara observasi dan wawancara. Data penelitian kemudian dianalisis dengan teknik analisis komponensial menggunakan teori warna, bentuk, ilustrasi, tipografi, dan tata letak menurut Desain Komunikasi Visual. Dari hasil penelitian ditemukan fakta yang menarik bahwa kemasan Roti Murni tidak berubah karena perusahaan tidak memiliki desainer kemasan, dan desain kemasannya tidak secara keseluruhan sesuai dengan teori DKV. Kata kunci: Kemasan, Roti Murni, Tampilan Visual, Yogyakarta  AbstractPackaging at this time is indicating to have some additional functions where the packaging is no longer simply to protect or just as a container of a product inside, but also serves as a media campaign of a product inside. Packaging design then has become an important part of the marketing process. The object of this study is the packaging design used by “Roti Murni”, one of bakery companies in Yogyakarta. The packaging design used by “Roti Murni” has been known that it has not been changed since long time ago. The purpose of the study is to determine the background of “Roti Murni” packaging design that has not changed and to review the design of the packaging with the theory of Visual Communication Design. This study is using qualitative research methodology, while the source data analized were obtained by observation and interviews. Data were analyzed with componential analysis techniques using the theory of color, shape, illustration, typography, and layout in Visual Communication Design. The research found an interesting fact that the packaging of “Roti Murni” has not changed since the company does not have packaging designers, and the overall packaging design itself was not designed by using the theory of Visual Communication Design. Keywords: Packaging, Murni Bakery, Visual Review, Yogyakarta


2012 ◽  
Vol 9 (2) ◽  
pp. 109-118 ◽  
Author(s):  
Jungheum Park ◽  
Hyunji Chung ◽  
Sangjin Lee

Author(s):  
Sonia Rani Chowdhary ◽  
Mr Vikash

The Powerful software tools and techniques required for the development of data mining applications. With the rapid development of technologies and business interest in using electronics and latest technologies plays important role in improvement of data mining field. Data mining access the meaningful and efficient information available in worldwide which is helps in decision making. This paper described the (a) various tools and techniques used by data mining applications. (b) compared features and limitations both in Proprietary and open sources data mining tools. (c) technical analysis of proprietary and open source data mining tools. On the basis of well-designed User interface, short time analysis, statistical and mathematical analysis user can select the best tool as per their requirements. Analysis of these tools makes easy to select appropriate tool.


2022 ◽  
Vol 25 (1) ◽  
pp. 1-26
Author(s):  
Fabio Pagani ◽  
Davide Balzarotti

Despite a considerable number of approaches that have been proposed to protect computer systems, cyber-criminal activities are on the rise and forensic analysis of compromised machines and seized devices is becoming essential in computer security. This article focuses on memory forensics, a branch of digital forensics that extract artifacts from the volatile memory. In particular, this article looks at a key ingredient required by memory forensics frameworks: a precise model of the OS kernel under analysis, also known as profile . By using the information stored in the profile, memory forensics tools are able to bridge the semantic gap and interpret raw bytes to extract evidences from a memory dump. A big problem with profile-based solutions is that custom profiles must be created for each and every system under analysis. This is especially problematic for Linux systems, because profiles are not generic : they are strictly tied to a specific kernel version and to the configuration used to build the kernel. Failing to create a valid profile means that an analyst cannot unleash the true power of memory forensics and is limited to primitive carving strategies. For this reason, in this article we present a novel approach that combines source code and binary analysis techniques to automatically generate a profile from a memory dump, without relying on any non-public information. Our experiments show that this is a viable solution and that profiles reconstructed by our framework can be used to run many plugins, which are essential for a successful forensics investigation.


Sign in / Sign up

Export Citation Format

Share Document