Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,996,176 papers from all fields of science
Search
Sign In
Create Free Account
Anti-computer forensics
Known as:
Anti-forensics
, Counter forensics
Anti-computer forensics (sometimes counter forensics) is a general term for a set of techniques used as countermeasures to forensic analysis.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Ciphertext indistinguishability
Computer case
Cryptographic hash function
Darik's Boot and Nuke
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Comprehensive expansion in Anti-Forensics Techniques (AFTs) based compressed image
Jumana Waleed
,
T. Hasan
,
Thekra Abbas
Annual Conference on New Trends in Information…
2017
Corpus ID: 222983
Digital images have become an important tool of providing evidences for personal imageries; several Forensic techniques have been…
Expand
2016
2016
Improving JPEG Image Anti-forensics
P. Shelke
,
R. Prasad
Italian Conference on Theoretical Computer…
2016
Corpus ID: 15240560
This paper proposes a forensic method for identifying whether an image was previously compressed by JPEG and also proposes an…
Expand
2016
2016
Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool
B. Rahardjo
,
I. Pratama
2016
Corpus ID: 64362877
Komputer forensik dan anti komputer forensik adalah dua bidang yang saling berlawanan. Komputer forensik dilakukan oleh ahli…
Expand
Review
2016
Review
2016
Digital Image Forensics and Counter Anti-forensics
Neha Singh
,
Sandeep Joshi
2016
Corpus ID: 63253363
The use of digital images in journalism and as evidence in the court of law for crime investigation and law enforcement are some…
Expand
2013
2013
JPEG compression anti-forensics based on first significant digit distribution
Cecilia Pasquini
,
G. Boato
IEEE International Workshop on Multimedia Signal…
2013
Corpus ID: 1278422
Traces left by lossy compression processes have been widely studied in digital image forensics. In particular, the artifacts…
Expand
2010
2010
Wavelet-based image compression anti-forensics
M. Stamm
,
K. Liu
IEEE International Conference on Image Processing
2010
Corpus ID: 8763078
Because digital images can be modified with relative ease, considerable effort has been spent developing image forensic…
Expand
2009
2009
Anti-Forensics: The Rootkit Connection
B. Blunden
,
Principal Investigator
2009
Corpus ID: 61966702
Conventional rootkits tend to focus on defeating forensic live incident response and network monitoring using a variety of…
Expand
2008
2008
The Malware Analysis Body of Knowledge (MABOK)
C. Valli
2008
Corpus ID: 16928490
The ability to forensically analyse malicious software (malware) is becoming an increasingly important discipline in the field of…
Expand
2007
2007
Taxonomy of Anti-Computer Forensics Threats
J. Sremack
,
A. Antonov
International Conference on IT-Incidents…
2007
Corpus ID: 29511687
An improved valve system for obtaining access to a container of fluid. In a container of fluid, and particularly a keg for beer…
Expand
2003
2003
Computer Forensics and Its Future Trend
Wang Ling
,
Qian Hua-lin
2003
Corpus ID: 64461060
Computer forensics is the technology field that attempts to prove thorough, efficient, and secure means to investigate computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE