Generic Architecture for Biometric and Digital Forensic Analysis
نویسندگان
چکیده
Information Systems and Network Communications has become part of our everyday life. In recent times, there has been a massive growth in computer and electronic devices as well as network-based systems either for e-commerce, e-government or internal processes within organizations. Human beings can no longer be separated from electronic devices and the internet technology. The need for information security is increasing rapidly as a result of the amount of information made available on systems and networks which are connected on the internet. The dependence on information systems and the data that is stored, processed, and transmitted by them has recorded a tremendous increase in the rate of cyber-crimes; rise of information warfare, and threat of cyber terrorism which has even led many companies, organizations and even nations to thoroughly investigate the protection of its critical infrastructures from information, systems, and network based attacks. Therefore, it is very essential to provide an effective security measure and system that ensures the confidentiality, integrity, and availability of information systems, networks, and the services and resources made available. This can be achieved using biometric and digital forensic technology (BDFT).
منابع مشابه
BioFoV - an open platform for forensic video analysis and biometric data extraction
This paper proposes an open platform, Biometric Forensic V ideo analyzer (BioFoV), for forensic video analysis and biometric data extraction. The platform’s architecture and implemented modules are described, sample results are shown, and a list of possible enhancements is included. BioFoV is implemented with open software, can be run in multiple software platforms, and is designed to be easily...
متن کاملDatabase-Centric Chain-of-Custody in Biometric Forensic Systems
Biometric systems gain more and more attention in everyday life regarding authentication and surveillance of persons. This includes, amongst others, the login on a notebook based on fingerprint verification, controlling of airports or train stations, and the biometric identity card. Although these systems have several advantages in comparison to traditional approaches, they exhibit high risks r...
متن کاملEncoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions
In this work we summarize biometric evidence as well as file type evidence extraction “exported” as formal Forensic Lucid language expression in the form of higher-order intensional contexts for further case analysis by a system that interprets Forensic Lucid expressions for claim verification and event reconstruction. The digital evidence is exported from the Modular Audio Recognition Framewor...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014