Digital Forensics Triage Classification Model using Hybrid Learning Approaches

Authors

  • Afridhi L Mohmed M. Tech Scholar, Department of Computer Science, Pondicherry University, Puducherry, India Author
  • K Palanivel Systems Analyst, Department of Computer Science, Pondicherry University, Puducherry, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Cyber security, cyber threatS, cybercrimes, digital forensics, digital triage, multimedia forensics

Abstract

 The Internet and the accessibility of gadgets  with connectivity have resulted in the global spread of cyber  threats and cybercrime, posing significant hurdles for digital  forensics. Consequently, the volume of information that may  need to be investigated is growing, necessitating the  development of new forensic technologies and methods.  Those now in use are, in fact, old-fashioned, as they are more  focused on complete device extraction for case-relevant  device identification. A practical approach, a Digital  Forensics Triage, tries to quickly collect facts and give  essential insight into this circumstance, which could be  described as data-rich but information-poor. In time sensitive scenarios, digital forensics triage approaches can  prioritize some electronic gadgets over others based on their  significance to the criminal case. The Digital Forensic  Laboratories (DFS) make it easier to identify essential  gadgets in criminal proceedings when time, significant  accumulations, and the accused's confidentiality are critical  considerations. Consequently, digital forensics and machine  learning techniques allow for the rapid classification of  appropriate gadgets despite dipping the quantity of  information that has to be adequately studied. This study  presents a digital forensic model that may be utilized to build  a robotic digital device categorization tool employed in real world criminal investigations. 

Downloads

Download data is not yet available.

References

Yisroel Mirsky, Wenke Lee (2021). The Creation and Detection of Deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1): 1–41, 2021.

Ayers R, Jansen W, et al. (2007). Cellphone Forensic Tools: An overview and Analysis Update. Technical Report, National Institute for Standard and Technology (NIST).

Cantrell G, Dampier D A, et al. (2012). Research toward a partially-automated and crime-specific digital triage process model. Computer and Information Science, 5(2), 29–38.

Ying Zhang, Lili Zheng, Vrizlynn LL Thing (2017). Automated face swapping and its detection. The 2nd Int. Conf. on Signal and Image Processing, 15–19. IEEE, 2017.

Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong (2019). On the generalization of GAN image forensics. In Chinese Conference on Biometric Recognition, 134–141. Springer, 2019.

Darius Afchar, Vincent Nozick, et al. (2018). MesoNet: A Compact Facial Video Forgery Detection Network. Int. Workshop on Information Forensics and Security, 1–7. IEEE.

David Guera Edward J. Delp (2018). Deepfake Video Detection Using Recurrent Neural Networks, Video and Image Processing Laboratory (VIPER), Purdue University.

David W Stewart (2021). Forensic Engineering Analysis of a Commercial Dry Storage Marina Reinforced Concrete Runway Slab, National Academy of Forensic Engineers, 38(1), 141-151.

Drezewski R, Sepielak J, Filipkowski W. (2012). System Supporting Money Laundering Detection. Digital Investigation, 9, 8–21.

Ekraam Sabir, Jiaxin Cheng, et al. (2019). Recurrent Convolutional Strategies for Face Manipulation Detection in Videos. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 3(1):80–87, 2019.

Fabio Marturana (2014). Device Classification in Digital Forensics Triage, Ph.D. Thesis, Universita Degli` Studi Di Roma Tor Vergata Dipartimento Di Ingegneria Civile E Ingegneria Informatica.

Witten I H., Frank E, and M. A. (2011). Data Mining Practical Machine Learning Tools and Techniques. Elsevier, 3rd Hall Ed. [13] Garfinkel S L, Farrell P, Roussev V, Dinolt G. (2009). Bringing science to digital forensics with standardized forensic corpora. Digital Investigation, 6(1), S2–S11.

Garfinkel S L (2013). Digital Media Triage with Bulk Analysis and Bulk Extractor, Computers & Security, 32, 56–72. [15] Gomez L S M. (2012). Triage in-lab: Case Backlog Reduction with Forensic Digital Profiling. In Simposio Argentino de Informtica y Derecho.

Grillo A, Lentini A, Me G, et al. (2009). Fast user classifying to establish forensic analysis priorities. In 5th IEEE Int., Conf., on IT Security Incident Management & IT Forensics.

Guarino A (2013). "Digital forensics as a Big Data Challenge," in ISSE 2013 securing electronic business processes: Springer, 197-203.

Haya R Hasan and Khaled Salah (2019). I am combating Deepfake Videos using Blockchain and Smart Contracts. IEEE Access, 7:41596– 41606, 2019.

Hong I, Yu H, Lee S. and Lee K. (2013). A new triage model conforms to the need for selective search and seizure of electronic evidence. Digital Investigation, 10(2), 175–192.

Irene Amerini and Roberto Caldelli (2020). Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos. Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, 97– 102, 2020.

Iryna Korshunova, Wenzhe Shi, Joni Dambre, and Lucas Theis (2017). Fast face-swap using Convolutional Neural Networks. In Proceedings of the IEEE International Conference on Computer Vision, 3677–3685, 2017.

Jan Chorowski, Ron J Weiss, Samy Bengio, Aaron Van Den¨ Oord (2019). Unsupervised Speech Representation Learning using WaveNet Autoencoders. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 27(12):2041–2053.

Jansohn C, Ulges A, Breuel T M. (2009). Detecting Pornographic Video Content by Combining image features with motion information. In the 17th ACM Int., Conf., on Multimedia.

Kent K, Chevalier S, Grance T, Dang H. (2006). Guide to Integrating Forensic Techniques into Incident Response. Technical Report, National Institute for Standard & Technology (NIST).

Khormali A, Yuan J S (2022). DFDT: An End-to-End DeepFake Detection Framework Using Vision Transformer. Appl. Sci. 2022, 12, 2953. https://doi.org/10.3390/ app12062953

Luisa Verdoliva (2020). Media Forensics and Deepfakes: an overview. IEEE Journal of Selected Topics in Signal Processing, 14(5): 910–932, 2020.

Marturana F, Bert, R., Me G, Tacconi S. (2011b). A Quantitative Approach to Triaging in Mobile Forensics. In IEEE International Joint Conference of TrustCom-11/ICESS 11/FCST-11.

Marturana F. Tacconi S. (2013). A Machine Learning-Based Triage Methodology for Automated Categorization of Digital Media. Digital Investigation, 10(2), 193–204.

Matthew Groha, Ziv Epsteina, Chaz Firestoneb, Rosalind Picard (2021). Deepfake Detection by Human Crowds, Machines, and Machine-Informed Crowds, PNAS 2022 119(1), e2110013119, 1-11. DOI:10.1073/pnas.2110013119

Ming-Yu Liu, Xun Huang, et al. (2021). Generative Adversarial Networks for Image and Video Synthesis: Algorithms and applications. Proceedings of the IEEE, 109(5):839–862, 2021.

Mislan R P, Casey E, and Kessler G C. (2010). The growing need for on-scene triage of mobile devices. Digital Investigation, 6(3-4), 112–124.

Oscar de Lima, Sean Franklin, et al. (2020). Deepfake Detection using Spatiotemporal Convolutional Networks. arXiv preprint arXiv:2006.14749, 2020.

Wang W, Dong J, and Tan T. (2009). A survey of passive image tampering detection. In 8th International Workshop on Digital Watermarking.

Pan D, Sun L, Wang R, Zhang X, and Sinnott R. O. (2020). "Deepfake Detection through Deep Learning," 2020 IEEE/ACM Intel., Conf., on Big Data Computing, Applications and Technologies (BDCAT), 134-143, DOI: 10.1109/BDCAT50828.2020.00001.

Walls R J, Learned-Miller E, and Levine B N. (2011). Forensic triage for mobile phones with dec0de. In the 20th USENIX Conference on Security.

Pavel Korshunov, Sebastien Marcel (2019). Vulnerability Assessment and Detection of Deepfake Videos. In 2019 International Conference on Biometrics (ICB), 1–6. IEEE.

Pearson S. and Watson R. (2010). Digital Triage Forensics Processing the Digital Crime Scene. Syngress.

Tianchen Zhao, Xiang Xu, et al. (2021). Learning self consistency for deepfake detection. In Proc. of IEEE/CVF Int., Con., on Computer Vision, 15023–15033, 2021.

Thanh Thi Nguyena, Quoc Viet Hung Nguyenb, et al., (2022). Deep Learning for Deepfakes Creation and Detection: A Survey, arXiv:1909.11573v4.

Pollitt M. M. (2013). Triage: A Practical Solution or Admission of Failure. Digital Investigation, 10(2), 87–88. [41] Siwei Lyu (2020). Deepfake Detection: Current Challenges

and Next Steps. In IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 1–6. IEEE, 2020.

Robert Chesney, Danielle Keats Citron (2018). Deep fakes: A looming challenge for privacy, democracy, and national security. Democracy, and National Security, 107, 2018.

Rogers M. K, Goldman J, Mislan R, and Wedge T. (2006). Computer forensics field triage process model. In Conference on Digital Forensics, Security and Law.

Sakshi Agarwal and Lav R Varshney (2019). Limits of deepfake detection: A robust estimation viewpoint. arXiv preprint arXiv:1905.03493, 2019.

Samuel Henrique Silva, Mazal Bethany, et al. (2021). Deepfake Forensics Analysis: An Explainable Hierarchical Ensemble of Weakly Supervised Models, Forensic Science International: Synergy 4 (2022) 100217.

Samuel S (2019). A Guy Made a Deepfake App to Turn Photos of Women into Nudes. it didn't Go Well. https://www.vox.com/2019/6/27/18761639/ai-deepfake deepnude-app-nudewomen-porn

Santosh Kolagati, Thenuga Priyadharshini V, Mary Anita Rajam (2022). Exposing Deepfakes using a Deep Multilayer Perceptron – Convolutional Neural Network Model, I Information Management Data Insights, 2(1), 100054. DOI: 10.1016/j.jjimei.2021.100054.

Shruti Agarwal, Hany Farid, et al. (2019). Protecting World Leaders Against Deep Fakes. Computer Vision and Pattern Recognition Workshops, 1, 38–45, 2019.

Downloads

Published

2022-05-30

How to Cite

Digital Forensics Triage Classification Model using Hybrid Learning Approaches . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(3), 29–39. https://doi.org/10.55524/