Secret Status and Forensics Analysis System Model

被引:0
|
作者
Wang, Xiao Jing
机构
关键词
Secret analysis; System Model; Information Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The three main stages in secret from the image integrity forensics forensics analysis in this paper set out, mainly for the third stage of the method to determine the hidden and embedded keys and other ways to extract secret information as conclusive evidence of the direction of research, Situation analysis of secret evidence is analyzed and built the system model for the next implementation provides a theoretical basis.
引用
收藏
页码:591 / 596
页数:6
相关论文
共 50 条
  • [1] e-Forensics steganography system for secret information retrieval
    Potdar, VM
    Khan, MA
    Chang, E
    Ulieru, M
    Worthington, PR
    [J]. ADVANCED ENGINEERING INFORMATICS, 2005, 19 (03) : 235 - 241
  • [2] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [3] MicroScout - An Assistance System for Histological Analysis in Forensics
    von Jan, U.
    Ernst, Heinrich
    Matthies, Herbert K.
    Albrecht, U. -V.
    [J]. BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK, 2012, 57 : 34 - 37
  • [4] Digital Forensics Analysis of a Vehicle Tracking System
    Amala R.
    Roy K.R.
    Aravind G.S.
    Dija S.
    Manohar K.
    [J]. SN Computer Science, 4 (6)
  • [5] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [6] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [7] A Comprehensive Collection and Analysis Model for the Drone Forensics Field
    Alotaibi, Fahad Mazaed
    Al-Dhaqm, Arafat
    Al-Otaibi, Yasser D.
    Alsewari, Abdulrahman A.
    [J]. SENSORS, 2022, 22 (17)
  • [8] SEPTIC SYSTEM FORENSICS
    Morrison, Jessica
    [J]. CHEMICAL & ENGINEERING NEWS, 2015, 93 (06) : 23 - 23
  • [9] An Evidential Network Forensics Analysis Model with Adversarial Capability and Layering
    Amran, Ahmad Roshidi
    Saad, Amna
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [10] Analysis and Implementation of UFS File System Based on Computer Forensics
    Yang Lei
    Gao Qinquan
    Luo Delin
    Wu Shunxiang
    [J]. QUANTUM, NANO, MICRO AND INFORMATION TECHNOLOGIES, 2011, 39 : 186 - 191