Academia.eduAcademia.edu

Information Security Digital Forensics

description38 papers
group25 followers
lightbulbAbout this topic
Information Security Digital Forensics is the field that involves the identification, preservation, analysis, and presentation of digital evidence in a manner that is legally admissible. It encompasses techniques and methodologies to investigate cyber incidents, ensuring the integrity of data and supporting legal proceedings related to digital crimes.
lightbulbAbout this topic
Information Security Digital Forensics is the field that involves the identification, preservation, analysis, and presentation of digital evidence in a manner that is legally admissible. It encompasses techniques and methodologies to investigate cyber incidents, ensuring the integrity of data and supporting legal proceedings related to digital crimes.

Key research themes

1. What are the main challenges in managing the increasing volume and diversity of digital evidence in forensic investigations?

This research theme investigates the technical and operational hurdles posed by the rapid growth in digital device usage, leading to massive volumes and varieties of digital evidence. It emphasizes the challenge of backlog management, standardization, and processing efficiency to maintain the legal integrity and timeliness of digital forensic investigations.

Key finding: This paper identifies five core technical challenges contributing to forensic backlogs: complexity due to binary-level acquisition, diversity of devices and formats lacking standardization, consistency and correlation... Read more
Key finding: This study demonstrates that efficiency gains in digital forensics depend not only on task-specific optimizations like parallel processing but also on reengineering the entire forensic process to support decision-making and... Read more
Key finding: This research highlights the tension between investigation thoroughness and data privacy protection in digital forensics, particularly under regulations like GDPR. It proposes an efficient investigative process integrating... Read more

2. How can proactive and live digital forensic approaches enhance investigation readiness and evidence acquisition?

This theme explores frameworks and methodologies for shifting digital forensics from purely reactive post-incident activities to integrative models encompassing proactive readiness and live evidence collection. It investigates how organizations can prepare for forensic investigations systematically and retrieve volatile data during ongoing incidents, improving evidence quality and investigation effectiveness.

Key finding: The paper proposes a tripartite digital forensic framework dividing the domain into proactive (ProDF), active/live (ActDF), and reactive (ReDF) components. ProDF focuses on organizational readiness by structuring processes... Read more
Key finding: This work investigates challenges and adaptations in applying traditional forensic models to cloud computing environments and emphasizes the need for forensic readiness in cloud infrastructures. It uses the Integrated Digital... Read more

3. What intelligent and architectural innovations improve forensic integrity, evidence analysis, and trustworthiness in digital investigations?

This research area examines advanced computational methods and hardware-level security mechanisms that can enhance forensic data integrity, accelerate comprehensive analysis, and guarantee authenticity of digital evidence. It focuses on integrating machine learning for data prioritization, architectural protections against runtime attacks, and the use of trust anchors and physical unclonable functions for authentication.

Key finding: This review highlights the application of intelligent methods, such as big data analytics and machine learning, to address digital forensic challenges like large-scale data analysis, intrusion detection, and timeline... Read more
Key finding: The paper introduces the Dynamic Integrity Checker (DIC), an architectural mechanism integrated with hardware to monitor runtime program execution for detecting Time-of-Check to Time-of-Use (TOCTOU) attacks. DIC enhances... Read more
Key finding: This study presents a novel FPGA authentication technique employing Physical Unclonable Functions (PUFs) derived from self-characterization of timing signatures unique to each device. The mechanism supports time-bounded... Read more

All papers in Information Security Digital Forensics

A Matrix Pencil method using a single snapshot is used to compute the Direction of arrival by measuring the incident angles down from the perpendicular direction along an antenna array. The Multiple Signal Classification (MUSIC) algorithm... more
Image steganalysis has attracted increasing attention recently. LSB steganalysis is one of the most active research topics. The paper proposes a method for LSB steganalysis of images, where the secret message is embedded in a given number... more
Steganography is the process of embedding secret information discreetly within a carrier, ensuring secure exchange of confidential data. The Adaptive Pixel Value Differencing (APVD) steganography method, while effective, encounters... more
Pixel-value differencing (PVD) steganography generates step effects or abnormal high fluctuations in PVD histogram. Since steganalysis exploits these artifacts to defeat the PVD steganography, modified PVD (MPVD) steganography preserving... more
Modern computer systems are plagued with security flaws, making them vulnerable to various malicious attacks. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting an attack... more
In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security... more
Digital image scrambling can not only be a usual image encryption, but also a pre-progress of digital watermark and image hiding. Image scrambling technologies have been widely used in digital watermarking technology, and the watermarking... more
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be... more
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot time. Security can often be compromised due to the presence of vulnerabilities in the trusted software that... more
Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime/terrorism prevention whereby law enforcing personals need to remotely compare facial images captured at the... more
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media using steganography. Both steganography and steganalysis have received a great deal of attention from... more
Blind quality assessment is an important feature required by many modern multimedia communication systems. Reduced reference approaches employing fragile watermarking techniques have been proposed earlier for this purpose. This paper... more
Iris is one of the most distinguishable features of a human body, which remains fairly stable throughout the lifetime of an individual. This makes iris recognition one of the most reliable methods for biometric based identification. This... more
This paper investigates a new approach for personal authentication using finger back surface imaging. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier.... more
Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper... more
Security is a paramount concern in Wireless Mesh Networks (WMN) and also one of the core components in making WMNs successful and an enabler into different markets. A core challenge in securing the WMN is the large number of communication... more
Data loss poses a significant and increasing problem for organisations. This is shown by the regular stories of data loss reported daily in the media, such as the mailing of 2 CDs containing 25 million personal records by the Revenue and... more
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications.... more
Iris is one of the most distinguishable features of a human body, which remains fairly stable throughout the lifetime of an individual. This makes iris recognition one of the most reliable methods for biometric based identification. This... more
In this paper a robust video watermarking method is presented, which embeds data in the wavelet domain using edge detection. The algorithm uses the luminance values around the edges where changes are less noticeable for the human visual... more
This paper proposes a hybrid steganographic approach using the least significant bit (LSB) technique for grayscale images. The proposed approach uses both LSB matching (LSB-M) and LSB replacement to hide the secret data in images. Using... more
The problems of classification and reporting of suspicious security violations often degenerate to other complex problems. However, efforts of system administrators to mitigate these flaws by reclassifying intrusive datasets so that... more
Spread Transform Dither Modulation (STDM), as an extension of Quantization Index Modulation (QIM) is a blind watermarking scheme that achieves high robustness against random noise and re-quantization attacks, with a limitation against the... more
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed to be generated autonomously as unknown/secret internal... more
Steganography has attracted an outstanding area of research nowadays. Being the science of hiding information, it focuses on the concept of hiding a message in plain sight [1]. It can be confusing and frustrating to pointedly understand... more
This paper investigates a new approach for personal authentication using finger back surface imaging. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier.... more
Iris is one of the most distinguishable features of a human body, which remains fairly stable throughout the lifetime of an individual. This makes iris recognition one of the most reliable methods for biometric based identification. This... more
This paper investigates a new approach for personal authentication using finger back surface imaging. The texture pattern produced by the finger knuckle bending is highly unique and makes the surface a distinctive biometric identifier.... more
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds... more
A physical unclonable function (PUF) is a promising security primitive which utilizes the manufacturing process variations to generate a unique unclonable digital fingerprint for a chip. It is especially suitable for resource constrained... more
Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data... more
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic... more
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic... more
The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve... more
Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime/terrorism prevention whereby law enforcing personals need to remotely compare facial images captured at the... more
As the Internet of Things continues to spread, devices within it are given more personal information which must be protected. To provide this protection, a device known as a physical unclonable function (PUF) has been devised which takes... more
Data loss poses a significant and increasing problem for organisations. This is shown by the regular stories of data loss reported daily in the media, such as the mailing of 2 CDs containing 25 million personal records by the Revenue and... more
Iris is one of the most distinguishable features of a human body, which remains fairly stable throughout the lifetime of an individual. This makes iris recognition one of the most reliable methods for biometric based identification. This... more
This paper presents a new blind and robust image watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT). Two DCT-transformed sub-vectors are used to embed the bits of the watermark sequence in a... more
This paper proposes a built-in self-test (BIST) method to measure accurately the combinatorial circuit delays on an FPGA. The flexibility of the on-chip clock generation capability found in modern FPGAs is employed to step through a range... more
Steganography is the science and art of covert communication. Conversely, steganalysis is the study of uncovering the steganographic process. The evolution of steganography has been paralleled by the development of steganalysis. In this... more
Network Intrusion Detection Systems (NIDS) have gained substantial importance in today's network security infrastructure. The performance of these devices in modern day traffic conditions is however found limited. It has been observed... more
The main goal of this paper is to authenticate people according to their finger textures. We propose to extract Finger Texture (FT) features of the four finger images (index, middle, ring and little) from a low resolution contactless hand... more
Wireless LANs offer many advantages in its utilization. Flexibility, mobility, and can be implemented by individuals or industries, are a little example from that. Since the security standards SSID, WEP and MAC address filtering that... more
The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this method over other security... more
Physical Unclonable Functions (PUFs) are used for securing electronic designs across the implementation spectrum ranging from lightweight FPGA to server-class ASIC designs. However, current PUF implementations are vulnerable to... more
The main goal of this paper is to authenticate people according to their finger textures. We propose to extract Finger Texture (FT) features of the four finger images (index, middle, ring and little) from a low resolution contactless hand... more
Continuing to estimate the Direction-of-arrival (DOA) of the signals impinging on the antenna array, even when a few elements of the underlying Uniform Linear Antenna Array (ULA) fail to work will be of practical interest in RADAR, SONAR... more
Embedding data into smooth regions introduces stego-images with poor security and visual quality. Edge adaptive steganography, in which the flat regions are not employed to carry a message at low embedding rates, was proposed. However,... more
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been applied in an additional area of computer science, the data... more
Download research papers for free!