Computer Forensic Investigation

نویسندگان

  • Nanhay Singh
  • Bhoopesh Singh Bhati
  • R. S. Raw
چکیده

This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the help of Steganalysis, it detect the hide message which is transfer in the network. Furthermore, we have described the security system classification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping Process of Digital Forensic Investigation Framework

Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court of law. Therefore, for digital forensic investigation to be performed successfu...

متن کامل

Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework

Computer Forensics has grown rapidly in recent years. The current computer forensic investigation paradigm is laborious and requires significant expertise on the part of the investigators. This paper proposes a highly automatic and efficient framework to provide the Case-Relevance information, by binding computer intelligence technology to the current computer forensic framework. Computer intel...

متن کامل

Computer Forensics for Computer-based Assessment: the Preparation Phase

When conducting a computer-based assessment, several infringements of assessment regulations could arise. Examples are illegal communication (e.g. by email, web, cell phone), hiding of computer objects with the aim of accessing or utilizing it, impersonation of another learner and presenting the project of another learner. If infringement is suspected, a computer forensic investigation should b...

متن کامل

A Digital Investigation Tool based on Data Fusion in Management of Cyber Security Systems

With overwhelming use of Internet, security in Cyberspace has become a prime concern. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in that it is inherently mathemati...

متن کامل

Building FBI computer forensics capacity: one lab at a time

The Federal Bureau of Investigation (FBI) is on a mission: to strengthen law enforcement’s computer forensic capabilities throughout the United States. How are we fulfilling such a sweeping and ambitious mandate? Through an innovative initiative entitled the Regional Computer Forensic Laboratory (RCFL) Program. RCFLs provide much needed computer forensic expertise and training to thousands of l...

متن کامل

Crime Investigation: A Course in Computer Forensics

The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a sixdimensional ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012