Figure 2 - uploaded by Stefan K. Braun
Content may be subject to copyright.
A frequency spectrum in a real-time frequency analysis with a linear graph at a randomly selected point in time of the investigated sample (Source: Stefan K. Braun).  

A frequency spectrum in a real-time frequency analysis with a linear graph at a randomly selected point in time of the investigated sample (Source: Stefan K. Braun).  

Source publication
Article
Full-text available
In recent years, the number of attempts to use digital audio and video evidence in litigation in civil and criminal proceedings has increased. Technical progress makes editing and changing music, film and picture recordings much easier, faster and better. The methods of digital sampling differ from the conventional pirated copy in that using a samp...

Contexts in source publication

Context 1
... this case, the frequency spectrum is represented as a lin- ear graph. Peak levels are depicted as short horizontal lines showing the last reached maximum values (see Figure 2). Spectrometer measurements are also used in forensic analy- ses, e.g. ...
Context 2
... comparisons in the field of criminology. In Figures 2 and 3, the amplitude of the wave of + / -0 dB (decibels) is represented by -96 dB on the vertical Y-axis, the horizontal X axis indi- cates the frequency band of 0 Hz to about 16 kHz. As described above, the recordings A and B are compared directly. ...

Citations

... Cyber Security can also be defined as a set of principles and practices that are designed to protect computing resources and online information against threats. Internet and advanced technologies have an influence on modern society covering a large spectrum of businesses, academic institutions, governments, and IT sector [5]. Identity theft is having access or misusing someone's personal information for their personal gain [6]. ...
Article
Full-text available
ABSTARCT The paper titled " Identity Theft in Cyber Security : Literature Survey " discusses the different security issues facing over Internet with possible literature. The paper also gives the basic idea of cyber security. It also provides possible cyber frauds deals specifically in Identity Theft over the Internet and also various Identity Theft Techniques. This paper mainly focuses on literature survey or review of few research papers from different authors and scholars. This paper explains the various opinions of different authors or scholars on different research papers and articles on cyberspace, cyber security, identity theft in cyberspace and also cyber crimes.
... Without a doubt, the resulting sound is unlike anything you have ever heard, but my interest in Freedman's compositional process' temporal implications is greater. In order to construct a new work out of an old one, he superimposed eighteen hours into three minutes [83]. Such tempering software are present which make it difficult for the experts to find out the match through digital forensics. ...
Article
Full-text available
Forensic musicology is the scientific study of music in a legal context. It can be used to help identify the composer of a piece of music, to determine the ownership of a copyright, or to resolve disputes over the use of musical works. Forensic musicologists may also be called upon to give expert testimony in court cases involving questions of music. Forensic musicology is a relatively new field, and there are no formal educations or training requirements for becoming a forensic musicologist. However, most forensic musicologists have advanced degrees in music theory, musicology, or a related field, and many also have experience working as professional musicians. Forensic musicologists use their knowledge of musical composition, history, and performance to answer questions raised in legal cases. Forensic musicologists typically collaborate with attorneys, judges, and other legal professionals to provide expert testimony or analysis in court cases. In some cases, they may also be asked to testify in front of a grand jury or give depositions. Forensic mu�sicologists may also be consulted by law enforcement agencies to help identify unknown pieces of music or to authenticate record�ings. This review will focus on the application of forensic musicol�ogy in civil and criminal case
... While it is useless against false data insertion, data alteration, and selective forwarding, the developed LKR watermarking technology can guard against copyright data erasure, packet replication, and multiple data identities (data Sybil attack). By using Digital Audio Sampling Analysis -Identification, [24] provided forensic proof of copyright violation. They discussed audio analysis techniques that included the use of watermarking for copyright-protected music. ...
Article
Full-text available
With the growth of the Internet, cyberattacks are evolving quickly, and the state of cyber security is not promising. Cyber security is often an extension of traditional information technology (IT) security that aims to safeguard systems, applications, and data that are vulnerable to various online assaults, such as data theft and espionage as well as data manipulation and denial of service attacks. Due to the losses incurred by countries, companies, and people as a result of numerous cybercrime assaults, there is a need for an increase in cyber security research. This study examines deep learning (DL), watermarking techniques for cyber security applications and illustrates how deep learning and water making is used in cybersecurity and how state-of-the-art solutions may be outperformed by deep learning ones. We advise professionals to think about integrating deep learning into security systems.
... Internet and advanced technologies have an influence on modern society covering a large spectrum of businesses, academic institutions, governments, and IT sector (1) . Online users often suffer from identity fraud, hacking, child pornography, etc. ...
Article
Full-text available
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
Conference Paper
Full-text available
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage being experienced by nations, businesses and individuals from various cybercrime attacks. This paper takes a look at the applications digital watermarking to the process of protection in cyber space called cyber watermarking particularly focusing on theft of information (identity & credit card theft).The methodology of the research is through literature search and case study. The rest of the paper presents a brief overview of the digital watermarking and issues in cyber security.