Secret Status and Forensics Analysis System Model

被引:0
|
作者
Wang, Xiao Jing
机构
关键词
Secret analysis; System Model; Information Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The three main stages in secret from the image integrity forensics forensics analysis in this paper set out, mainly for the third stage of the method to determine the hidden and embedded keys and other ways to extract secret information as conclusive evidence of the direction of research, Situation analysis of secret evidence is analyzed and built the system model for the next implementation provides a theoretical basis.
引用
收藏
页码:591 / 596
页数:6
相关论文
共 50 条
  • [21] Network Forensics Attack-Analysis Model Based on Similarity of Intention
    Rasmi, Mohammad
    Jantan, Aman
    Ahmed, Abdulghani Ali
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
  • [22] An investigation into Unmanned Aerial System (UAS) forensics: Data extraction & analysis
    Thornton, Greg
    Zadeh, Pooneh Bagheri
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 41
  • [23] File system journal forensics
    Swenson, Christopher
    Phillips, Raquel
    Shenoi, Sujeet
    [J]. ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 231 - +
  • [24] System Forensics, Investigation, and Response
    Keith, Nate
    Vacca, J. R.
    Rudolph, K.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2012, 7 (02) : 143 - 147
  • [25] Blockchain Model of Cloud Forensics
    [J]. 1600, Beijing University of Posts and Telecommunications (40):
  • [26] File system journal forensics
    University of Tulsa, Tulsa, OK, United States
    [J]. IFIP Advances in Information and Communication Technology, (231-244):
  • [27] AN INCIDENT RESPONSE MODEL FOR INDUSTRIAL CONTROL SYSTEM FORENSICS BASED ON HISTORICAL EVENTS
    Yau, Ken
    Chow, Kam-Pui
    Yiu, Siu-Ming
    [J]. CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 311 - 328
  • [28] Secret Sharing Database System for Preventing Frequency Analysis
    Teramura, Keisuke
    Inaba, Hiroyuki
    [J]. 2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
  • [29] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow
    Prem, T.
    Selwin, V. Paul
    Mohan, Ashok Kumar
    [J]. 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [30] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log
    Jing, He
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461