Component Forensics [ Theory , methodologies , and applications ] [

نویسندگان

  • Ashwin Swaminathan
  • Min Wu
چکیده

isual sensor technologies have experienced tremendous growth in recent decades, and digital devices are becoming ubiquitous. Digital images taken by various imaging devices have been used in a growing number of applications, from military and reconnaissance to medical diagnosis and consumer photography. Consequently, a series of new forensic issues arise amidst such rapid advancement and widespread adoption of imaging technologies. For example, one can readily ask what kinds of hardware and software components as well as their parameters have been employed inside these devices? Given a digital image, which imaging sensor or which brand of sensor was used to acquire the image? How was the image acquired? Was it captured using a digital camera, cell phone camera, image scanner, or was it created artificially using an imageediting software? Has the image undergone any manipulation after capture? Is it authentic, or has it been tampered in any way? Does it contain any hidden information or steganographic data? Many of these forensic questions are related to tracing the origin of the digital image to its creation process. Evidence obtained from such analysis would provide useful forensic information to law enforcement, security, and intelligence agencies. Knowledge of image acquisition techniques can also help answer further forensic questions regarding the nature of additional processing that the image might have undergone after capture. There are various ways to address the questions at hand. In this article, we survey one of the major class of techniques based on component forensics that aims to answer these forensic questions. Component forensics aims at identifying the algorithms and parameters employed in the various components of the device that was used in capturing the data. Component forensic analysis works by finding the intrinsic fingerprint traces that are left behind in a digital image when it goes through various processing blocks in the information processing chain, and uses such traces for estimating component parameters. Component Forensics [Theory, methodologies, and applications] [ Ashwin Swaminathan, Min Wu, and K.J. Ray Liu]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Novel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics

Novel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics

متن کامل

A Framework for Digital Forensics and Investigations: The Goal-Driven Approach

Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the ...

متن کامل

ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence

Currently there appears to be a lack of research in the area of developing tools, testing methodologies, and creating standards for ADSL router forensics. The paper examines a wide range of literature and introduces the concept of ADSL router forensics as a new and potential field of research for digital forensics investigators. It begins by examining why there is a need for router forensics by...

متن کامل

Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints

Title of Dissertation: MULTIMEDIA FORENSIC ANALYSIS VIA INTRINSIC AND EXTRINSIC FINGERPRINTS Ashwin Swaminathan, Doctor of Philosophy, 2008 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Digital imaging has experienced tremendous growth in recent decades, and digital images have been used in a growing number of applications. With such increasing pop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009