research centers


Search results: Found 2

Listing 1 - 2 of 2
Sort by

Article
Offline vs. Online Digital Forensics of Cloud-based Services

Authors: Nidaa F. Hassan --- Haider M. Jaber
Journal: Al-Nahrain Journal of Science مجلة النهرين للعلوم ISSN: (print)26635453,(online)26635461 Year: 2017 Volume: 20 Issue: 4 Pages: 117-124
Publisher: Al-Nahrain University جامعة النهرين

Loading...
Loading...
Abstract

Digital forensics has become important due to the daily use of digital devices in our life, which may lead to evidence that can be useful to law enforcement in legal cases. When using cloud services, a lot of artifacts that might be useful for investigations are stored in the cloud which means that the extraction must be from cloud computers systems. So, the legacy forensics tools may not be usable or less effective due to the geographically distribution of data and legal issues among other issues. The challenges of the cloud digital forensics are discussed in this paper. Also, this paper shows the types of extracting data from cloud services that are offline and online extraction. The offline extraction is concerned with extracting data from a local device that used to access cloud services. While online data extraction is concerned with remote extraction of data from cloud services. A comparison between such two types are demonstrated from many ways according to the result of recent papers to show the situations that each type is useful in.


Article
Improving Hiding Information Process based on GA Technique with Secure Extraction Process

Authors: Susan .S. Ghazoul* --- Lina Saeed Jajo*
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2010 Volume: 10 Issue: 1 Pages: 98-106
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Abstract:In this paper we propose a new method of hiding information that produces a stego-image which is totally indistinguishable from the original image to extract the hiding message. GA is used as an efficient method to minimize the number of different bits between the cover image and the stego-image as minimum as possible by embedding the message in random locations of cover image, and then modifying the locations containing changed information in original image (cover) to improve stego-image quality. To satisfy excellent security we used a crypto-key which contains encrypted locations from hiding process. This key is used to extract the embedded message.

الخلاصة: في ورقة العمل نقترح طريقة جديدة لإخفاء المعلومات لتوليد صورة تحوي معلومات مخفية بحيث يكون صعب التميز بين الصورتين لاستخلاص الرسالة المخفية . استخدمت الخوارزمية الوراثية كطريقة كفوءة لتقليل عدد البتات المختلفة بين الصورتين إلى اقل حد ممكن وذلك بتضمين الرسالة في مواقع عشوائية داخل صورة الغطاء ثم تحسين مواقع التي تغيرت معلوماتها لتحسين جودة الصورة التي تحوي معلومات مخفية. للتحقيق سرية ممتازة أستخدم المفتاح السري الذي يحوي المواقع المشفرة لعملية الاخفاء. يستخدم المفتاح في استخلاص الرسالة المخفية.

Listing 1 - 2 of 2
Sort by
Narrow your search

Resource type

article (2)


Language

English (2)


Year
From To Submit

2017 (1)

2010 (1)