Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,325,641 papers from all fields of science
Search
Sign In
Create Free Account
Anti-computer forensics
Known as:
Anti-forensics
, Counter forensics
Anti-computer forensics (sometimes counter forensics) is a general term for a set of techniques used as countermeasures to forensic analysis.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Ciphertext indistinguishability
Computer case
Cryptographic hash function
Darik's Boot and Nuke
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Frame Based Anti-Forensics Technique
R. Chandna
,
K. Sharma
2015
Corpus ID: 43919557
The paper describes a frame based anti-forensics technique. This technique works on the concept of compression antiforensics and…
Expand
2015
2015
An Improved Anti-Forensics method for JPEG Image Enhancement undetectability & Improved Image quality
R. Joseph
,
Asso.Profesor
2015
Corpus ID: 212509423
— The blind detection of image enhancement in digital images has attracted much attention of the forensic analyzers. The…
Expand
2014
2014
Digital image forensics and anti-forensics
Chun Wing Kwok
2014
Corpus ID: 64520981
2012
2012
DEFEATING ANTI-FORENSICS IN CONTEMPORARY COMPLEX THREATS
E. Rodionov
,
A. Matrosov
2012
Corpus ID: 58924657
Forensic analysis plays a crucial role in cybercrime group investigation as it allows investigators to obtain such information as…
Expand
2012
2012
Digital Multimedia Forensics and Anti-Forensics
M. Stamm
2012
Corpus ID: 34243329
2011
2011
Guest Editorial: Advances in Applied Security
E. Weippl
,
A. Tjoa
,
G. Pernul
J. Wirel. Mob. Networks Ubiquitous Comput…
2011
Corpus ID: 39332280
In this special issue, we have selected five papers from the 6th International Conference on Availability, Reliability and…
Expand
2010
2010
Wavelet-based image compression anti-forensics
M. Stamm
,
K. Liu
IEEE International Conference on Image Processing
2010
Corpus ID: 8763078
Because digital images can be modified with relative ease, considerable effort has been spent developing image forensic…
Expand
2009
2009
Anti-Forensics: The Rootkit Connection
B. Blunden
,
Principal Investigator
2009
Corpus ID: 61966702
Conventional rootkits tend to focus on defeating forensic live incident response and network monitoring using a variety of…
Expand
2009
2009
A Trusted Platform Module Based Anti-Forensics System
Weihan Goh
,
P. Leong
,
C. Yeo
International Conference on Network and Service…
2009
Corpus ID: 16218189
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a…
Expand
2003
2003
Computer Forensics and Its Future Trend
Wang Ling
,
Qian Hua-lin
2003
Corpus ID: 64461060
Computer forensics is the technology field that attempts to prove thorough, efficient, and secure means to investigate computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE