Completing the Picture Fragments and Back Again

Better methods and tools are needed in the fight against child pornography. This thesis presents a method for file type categorisation of unknown data fragments, a method for reassembly of JPEG fra ...

[1]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.

[2]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Jan Lukás,et al.  Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.

[4]  Nasir D. Memon,et al.  Nabs: a system for detecting resource abuses via characterization of flow content type , 2004, 20th Annual Computer Security Applications Conference.

[5]  Mohammad Hossain Heydari,et al.  Content based file type detection algorithms , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[6]  Simson L. Garfinkel,et al.  Carving contiguous and fragmented files with fast object validation , 2007, Digit. Investig..

[7]  Adi Shamir,et al.  Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.

[8]  Michael I. Cohen Advanced carving techniques , 2007, Digit. Investig..

[9]  N. Shahmehri,et al.  File Type Identification of Data Fragments by Their Binary Structure , 2006, 2006 IEEE Information Assurance Workshop.

[10]  Nasir D. Memon,et al.  Automated reassembly of file fragmented images using greedy algorithms , 2006, IEEE Transactions on Image Processing.

[11]  Nasir Memon,et al.  Automatic Reassembly of Document Fragments via Data Compression , 2002 .

[12]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[13]  Salvatore J. Stolfo,et al.  A Study of Malcode-Bearing Documents , 2007, DIMVA.

[14]  Nasir D. Memon,et al.  Automated reassembly of fragmented images , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[15]  Nahid Shahmehri,et al.  Oscar — Using Byte Pairs to Find File Type and Camera Make of Data Fragments , 2007 .

[16]  Nahid Shahmehri,et al.  Oscar - File Type and Camera Identification Using the Structure of Binary Data Fragments , 2006 .

[17]  Nahid Shahmehri,et al.  Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages , 2006, SEC.

[18]  Keith Marzullo,et al.  Second International Workshop on Systematic Approaches to Digital Forensic Engineering , 2007 .

[19]  R. Wortley,et al.  Child pornography on the Internet , 2006 .

[20]  Salvatore J. Stolfo,et al.  Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.

[21]  L. Råde,et al.  Mathematics handbook for science and engineering , 1995 .

[22]  Cor J. Veenman Statistical Disk Cluster Classification for File Carving , 2007, Third International Symposium on Information Assurance and Security.

[23]  Matthew M. Shannon Forensic Relative Strength Scoring: ASCII and Entropy Scoring , 2004, Int. J. Digit. EVid..

[24]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[25]  Mark John Taylor,et al.  FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints , 2007, SEC.

[26]  Ke Wang,et al.  Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[27]  Brian D. Carrier,et al.  File System Forensic Analysis , 2005 .

[28]  Golden G. Richard,et al.  Scalpel: A Frugal, High Performance File Carver , 2005, DFRWS.

[29]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[30]  M Damashek,et al.  Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.

[31]  Jan Lukás,et al.  Digital "bullet scratches" for images , 2005, IEEE International Conference on Image Processing 2005.

[32]  Salvatore J. Stolfo,et al.  SPARSE: A Hybrid System to Detect Malcode-Bearing Documents , 2008 .

[33]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.

[34]  Nasir D. Memon,et al.  Automatic reassembly of document fragments via context based statistical models , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[35]  Robert F. Erbacher,et al.  Identification and Localization of Data Types within Large-Scale File Systems , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).

[36]  Gregory A. Hall,et al.  Sliding Window Measurement for File Type Identification , 2007 .

[37]  Michaela Poremská,et al.  Child Pornography on the Internet in , 2009 .

[38]  Golden G. Richard,et al.  In-Place File Carving , 2007, IFIP Int. Conf. Digital Forensics.

[39]  Peter Deutsch,et al.  DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.