Cyber Security and Digital Forensics 2022
DOI: 10.1002/9781119795667.ch6
|View full text |Cite
|
Sign up to set email alerts
|

An Insight into Digital Forensics: History, Frameworks, Types and Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Multimedia forensics involves the attempts to explore, analyze, and retrieve information about multimedia such as images, audio, video, and text. Specifically, it is the analysis of digital multimedia content to produce evidence in the forensics domain [34]. Image forensics as an aspect of multimedia forensics investigates images by analyzing the authenticity and integrity of data to detect forgeries or manipulations as well as trace the history of the image.…”
Section: ) Multimedia Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Multimedia forensics involves the attempts to explore, analyze, and retrieve information about multimedia such as images, audio, video, and text. Specifically, it is the analysis of digital multimedia content to produce evidence in the forensics domain [34]. Image forensics as an aspect of multimedia forensics investigates images by analyzing the authenticity and integrity of data to detect forgeries or manipulations as well as trace the history of the image.…”
Section: ) Multimedia Forensicsmentioning
confidence: 99%
“…Computer forensics focuses on the procedure of obtaining and analyzing computer-related information including data files, hard disk, file storage, hard disk, etc. [34]. Some aspects of computer forensics include disk forensics, memory forensics, and file system forensics.…”
Section: ) Computer Forensicsmentioning
confidence: 99%
“…Choosing the appropriate tools for the acquisition and analysis of memory forensics depends upon the compatibility between digital devices and operating systems, which may pose challenges to investigators [11]. Therefore, many existing studies have attempted to understand the strengths and weaknesses of memory acquisition tools.…”
Section: Related Workmentioning
confidence: 99%