A tour through the realm of anti-forensics

被引:4
|
作者
Forte, Dario
Power, Richard
机构
来源
Computer Fraud and Security | 2007年 / 2007卷 / 06期
关键词
D O I
10.1016/S1361-3723(07)70079-9
中图分类号
学科分类号
摘要
引用
收藏
页码:18 / 20
相关论文
共 50 条
  • [31] Countering Anti-Forensics of Lateral Chromatic Aberration
    Mayer, Owen
    Stamm, Matthew C.
    IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 15 - 20
  • [32] Anti-Forensics of Lossy Predictive Image Compression
    Li, Yuanman
    Zhou, Jiantao
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (12) : 2219 - 2223
  • [33] Countering Anti-Forensics by Means of Data Fusion
    Fontani, Marco
    Bonchi, Alessandro
    Piva, Alessandro
    Barni, Mauro
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2014, 2014, 9028
  • [34] A Dictionary Based Approach to JPEG Anti-Forensics
    Afshin, Nasser
    Razzazi, Farbod
    Moin, Mohammad-Shahram
    2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2016, : 778 - 783
  • [35] FORENSICS VS. ANTI-FORENSICS: A DECISION AND GAME THEORETIC FRAMEWORK
    Stamm, Matthew C.
    Lin, W. Sabrina
    Liu, K. J. Ray
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1749 - 1752
  • [36] Revealing the Traces of JPEG Compression Anti-Forensics
    Valenzise, Giuseppe
    Tagliasacchi, Marco
    Tubaro, Stefano
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 335 - 349
  • [37] Anti-Forensics of Contrast Enhancement in Digital Images
    Cao, Gang
    Zhao, Yao
    Ni, Rongrong
    Tian, Huawei
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 25 - 34
  • [38] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [39] A Framework for Detecting Anti-forensics in Cloud Environment
    Rani, Deevi Radha
    Kumari, G. Geetha
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1277 - 1280
  • [40] Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics
    Wang, Hao
    Wang, Jinwei
    Luo, Xiangyang
    Yin, QiLin
    Ma, Bin
    Sun, Jinsheng
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2021, 2022, 13180 : 72 - 86