Professional Documents
Culture Documents
Digital Assessment-2: Name-Asmit Gupta REG. NO.-18BCE0904 Slot-L57+L58 Faculty - Sureshkumar N
Digital Assessment-2: Name-Asmit Gupta REG. NO.-18BCE0904 Slot-L57+L58 Faculty - Sureshkumar N
NAME-ASMIT GUPTA
REG. NO.-18BCE0904
SLOT- L57+L58
FACULTY- SURESHKUMAR N
DATE:- 28.01.2020
AUTHOR:-
ABSTRACT:-
The problem context that inspired and motivated this project idea is that as the quote says a picture
or image speaks a thousand words. An Image is forensically rich media it contains a lot of metadata
you can extract for any Digital Forensics investigation and it can answer the 3 w’s. which is what
(what device is used to capture the picture or Image), where (The location where the picture or
image was capture) and when (the exact time and date when the image was capture). The current
issues are that most of the current image forensics tools is their output is too complex to
understand, for students starting out their studies into digital forensics its quite difficult for them to
comprehend some details of their output. The tool will also detect if the image has been tempered
with if any hidden messages or items is stored inside using steganography. The project is an Image
Forensics Tool with Steganography Detection, which can aid in a digital forensics’ investigation
where by the investigator is required to get metadata out of any Digital image.
RESEARCH PAPER :- 2
TITLE:- Digital Forensics Tools
AUTHOR:-
1. Vedanta Kapoor,
2. Sanya Taneja,
3. Kakelli Anil Kumar
ABSTRACT:-
AUTHOR:-
ABSTRACT:-
AUTHOR:-
1. Kambiz Ghazinour,
2. Deep M Vakharia,
3. Krishna Chaitanya Kannaji,
4. Rohit Satyakumar
ABSTRACT:-
AUTHOR:-
ABSTRACT:-
This article will address a very important issue in the computer world,
even more so considering that has had great growth over time as well as
the area of Computer Forensics. The great value and importance of the
information that is stored on a single hard drive to a storage cloud, causes
a great interest in many individuals, who perform unethical acts such as
theft and alteration of information through the use large network called
the Internet. These tools used in Computer Forensics are programs or
critical applications that are dedicated to obtaining information for use as
evidence or evidence necessary for certain legal act, where the main
crime scenes could say, are the computers and network it is connected.
That is why proceed to analyze tools that meet features and functions
solely for processes in the aforementioned area. So this research is based
on an analytical, bibliographical, documentary and correlational study;
because it has proceeded to obtain reliable information from literature
sources such as books and scientific papers; besides having a rigorous
process of analysis. Was obtained as a result that "Paraben's P2
Commander 3.6" tool showed a wide range of functionality for process
computer forensics, this tool offers many processes that the computer
forensic need for their work in computer security, all focused from the
view of the functions that allow a thorough analysis of computer
evidence in the case or incident.
RESEARCH PAPER :- 6
TITLE:- A Literature Review on Cyber Forensic and its Analysis tools
AUTHOR:-
1. Mandeep Kaur1 ,
2. Navreet Kaur2 ,
3. Suman Khurana3
ABSTRACT:-
AUTHOR:-
1. Mayur Patankar
2. Deepika Bhandari
ABSTRACT:-
AUTHOR:-
1. Vishal R. Ambhire1 ,
2. Dr. B.B. Meshram
ABSTRACT:-
Digital Forensics has rapidly evolved over the last decade and
continues to gain significance in both the law enforcement and the
scientific community. The subject of digital forensics can be quite
challenging. Digital forensics is in its infancy and teaching digital
forensics includes the techniques as well as the tools that assist in
the process. This paper provides an overview of Digital Forensics
methodologies, modeling, analysis and applications.
RESEARCH PAPER :- 9
TITLE:- A Complete Study on Tools & Techniques for Digital Forensic
Analysis
AUTHOR:-
1. Abirami Sivaprasad
2. Prof. Smita Jangale
ABSTRACT:-
AUTHOR:-
1. Raza Hasan
2. Akshyadeep Raghav
3. Salman Mahmood
ABSTRACT:-
Different tools are used to aid the investigation process. The need of
specialized software is required for the acquisition and examination
of data gathered from the crime scene. To abide by chain of custody
proper crime scene reconstruction or image is acquired from the
original source that can be admissible to the court. This paper
focuses on the various hardware and software tools that are widely
used during a Computer Forensics Investigation.