Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images. To detect and mitigate the distribution of illegal images, for instance in network traffic of companies or Internet service providers, it is desirable to outsource the recognition of illegal images to these companies. However, law enforcement agencies want to keep their hash databases secret at all costs as an unwanted release may result in misuse which could ultimately render these databases useless. We present SOFIR, a tool for the Secure Outsourcing of For...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Digital evidence is critical in cybercrime investigations because it is used to connect individuals ...
Tampering of biometric samples is becoming an important security concern. Attacks can occur in behav...
Forensic image recognition tools are used by law enforcement agencies all over the world to automati...
Forensic image recognition is an important tool in many areas of law enforcement where an agency wan...
The Internet has been one of the greatest man made achievements of the 20th century. It has revoluti...
<p class="JDFSLParagraph">Steganography is the art and science of hiding information within informat...
Abstract — Nowadays, digital photos have been widely used as historical records and as evidences of ...
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the se...
International audienceThis paper proposes to study the impact of image selective encryption on both ...
The orchestrated manipulation of public opinion, particularly through manipulated images, often spre...
Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for leg...
Child abuse content on the Internet is today an increasing problem and difficult to dealwith. The te...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its fa...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Digital evidence is critical in cybercrime investigations because it is used to connect individuals ...
Tampering of biometric samples is becoming an important security concern. Attacks can occur in behav...
Forensic image recognition tools are used by law enforcement agencies all over the world to automati...
Forensic image recognition is an important tool in many areas of law enforcement where an agency wan...
The Internet has been one of the greatest man made achievements of the 20th century. It has revoluti...
<p class="JDFSLParagraph">Steganography is the art and science of hiding information within informat...
Abstract — Nowadays, digital photos have been widely used as historical records and as evidences of ...
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the se...
International audienceThis paper proposes to study the impact of image selective encryption on both ...
The orchestrated manipulation of public opinion, particularly through manipulated images, often spre...
Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for leg...
Child abuse content on the Internet is today an increasing problem and difficult to dealwith. The te...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its fa...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Digital evidence is critical in cybercrime investigations because it is used to connect individuals ...
Tampering of biometric samples is becoming an important security concern. Attacks can occur in behav...