79,553 research outputs found

    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections

    Get PDF
    One of the most relevant applications of digital image forensics is to accurately identify the device used for taking a given set of images, a problem called source identification. This paper studies recent developments in the field and proposes the mixture of two techniques (Sensor Imperfections and Wavelet Transforms) to get better source identification of images generated with mobile devices. Our results show that Sensor Imperfections and Wavelet Transforms can jointly serve as good forensic features to help trace the source camera of images produced by mobile phones. Furthermore, the model proposed here can also determine with high precision both the brand and model of the device

    A low cost mobile mapping system (LCMMS) for field data acquisition: a potential use to validate aerial/satellite building damage assessment

    Get PDF
    Among the major natural disasters that occurred in 2010, the Haiti earthquake was a real turning point concerning the availability, dissemination and licensing of a huge quantity of geospatial data. In a few days several map products based on the analysis of remotely sensed data-sets were delivered to users. This demonstrated the need for reliable methods to validate the increasing variety of open source data and remote sensing-derived products for crisis management, with the aim to correctly spatially reference and interconnect these data with other global digital archives. As far as building damage assessment is concerned, the need for accurate field data to overcome the limitations of both vertical and oblique view satellite and aerial images was evident. To cope with the aforementioned need, a newly developed Low-Cost Mobile Mapping System (LCMMS) was deployed in Port-au-Prince (Haiti) and tested during a five-day survey in FebruaryMarch 2010. The system allows for acquisition of movies and single georeferenced frames by means of a transportable device easily installable (or adaptable) to every type of vehicle. It is composed of four webcams with a total field of view of about 180 degrees and one Global Positioning System (GPS) receiver, with the main aim to rapidly cover large areas for effective usage in emergency situations. The main technical features of the LCMMS, the operational use in the field (and related issues) and a potential approach to be adopted for the validation of satellite/aerial building damage assessments are thoroughly described in the articl

    A Forensically Sound Adversary Model for Mobile Devices

    Full text link
    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device

    Conceptual evidence collection and analysis methodology for Android devices

    Full text link
    Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android devices that is, as far as practical, device agnostic. Android devices may contain a significant amount of evidential data that could be essential to a forensic practitioner in their investigations. However, the retrieval of this data requires that the practitioner understand and utilize techniques to analyze information collected from the device. The major contribution of this research is an in-depth evidence collection and analysis methodology for forensic practitioners.Comment: in Cloud Security Ecosystem (Syngress, an Imprint of Elsevier), 201

    A comparison of forensic evidence recovery techniques for a windows mobile smart phone

    Get PDF
    <p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.</p> <p>A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.</p> <p>This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.</p&gt
    • …
    corecore