Questions related to Digital Forensics
Dear Research Gate Community,
I'm finally able to publish my dissertation paper and I'm keen to find the right place to publish it. My old university has just given me permission to publish it online.
First I looked at arXiv however it requires you to have someone who can endorse you for your subject area (My supervisor has now left the University that I originally did my studies at so I'm not expecting to be able to get the endorsement.)
Ideally I'm looking for an open access journal for Digital Forensics and one that accepts submissions in a PDF format.
Another part of me has considered just posting the paper up on my own website however it would be nice to have it in an open journal.
Any tips, tricks or information will be greatly appreicated.
Thank you for your time!
Please I am looking for a document listing technical artefacts used as evidence in digital forensics classified according to their evidential strength. Example IP address could be spoofed so it is a weak evidence, malware code similarity is a strong evidence etc.
Smartphones are fast becoming an ubiquitous device used throughout the day to undertake a variety of activities which may have been traditionally completed using a PC. What are the implications in the rise of smartphones for forensic practitioners?
can reversible data hiding in encrypted images be carried out in digital forensics? what are the future researches that can be done on reversible data hiding for increasing the embedding capacity
Because a mobile device forensics has become a significant part of digital forensics. I am looking for Important parts of a device which used in the digital forensics.
Talking about a multi-platform digital forensic software that supports computer and smartphones, including tablets.
I need the database of digital crimes committed especially for cases already established may be in a court of law.
We all or some of us have an idea of the capabilities of Zeus which is still commercial as we speak. Zeus has managed to steal a lot of millions of $$ and a pretty good amount of personal information through the herders. Why is the pace of stopping Zeus or take down so slow? I know the binaries keep changing each day. Nevertheless, can we attribute that the anti-forensics techniques are still far much ahead of the available digital forensic tools?Other than EnCase and other major FTKs, what can stop this mess once and for all?
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar research that discusses about metadata (standard / specification / schema / element) for digital evidence ?
If we employ a forensic agent/multi-agent to gather digital forensic data "potential" across diverse platforms, we all know that, this data will be streaming from different platforms. So if this is true, How can we solve the problem of Time synchronization across the different platforms if all agents in the machines are synchronized within the same time zone
*Take note: If we have to normalize based on attributes.
If we are only collecting logs, content may be gone by the time someone initiates an investigation. On the same note if we are collecting all content/data on the system and the logs, this becomes an impossible proposition, since you need more storage than all of the content on the system to contain content and logs. Whenever i see analysis being addressed (although MapReduce is now on the way as other, more effective analysis methods have been brought to bear). Whenever we experience storage problems, is it an advantage if you have effective data computation mechanisms or still the suspect would have erased the traces. From an expert opinion: You might be removing what you are looking for WRT analysis.What is what in this context?
I am working on Data hiding at Edges. In my contribution i am getting PSNR value greater than 100 for some images.
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone.
It is possible to use Shot boudaries por counter the problem of synchronization (Time shift) in video systems fingerpinting. and also what is the extent of this timing shift in the accuracy of results. thanks and best regards.
Given that a piece of malware generally has escalated privileges when it has infected a host, it should be plausible to change/fake the MAC address for traffic coming from the infected host. Has anyone come across any malware that does this?
Here is the steps that I am successful so far :
1.Apply 3Level of DWT to host image
2.Apply SVD to one of the subbands
3.convert the subband and SV's to semi-binary using my own algorithm which will convert a number such as 205.36 to a semi-binary form like :
1.36 0 1 1 0 0 1 1
4.insert my watermark inside the frist and second LSB of the semi-binary form
5.Apply the reverse SVD
6.Apply the IDWT
Until here my watermark is remain intact But when I am going to write the image like
% convert back to uint8
After extracting the watermark , the watermark is something else, I was wondering if I am doing something wrong? DO I have to convert the whole thing to uint8? because otherwise the written image is one blank image if I don't convert it to unit8