Skip to main content

Combining Genetic Algorithms and Neural Networks for File Forgery Detection

  • Chapter
  • First Online:
Machine Learning Paradigms

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 149 ))

  • 1564 Accesses

Abstract

Today’s electronic devices are so ubiquitous that the collection and use of digital evidence has become a standard part of many criminal and civil investigations. The uncovering and examination of those shreds of evidence is a relatively new and important process to provide crucial information in a court of law. Suspects routinely have their laptops and cell phones examined for corroborating evidence. However, digital forensic investigators are facing several challenges such as file obfuscation, encryption, alteration and a massive amount of evidence. These challenges often lead to incomplete analysis and inadequate conclusions. Consequently, a digital forensic examiner uses specialized forensic software to accurately identify the file types to determine which of them may contain potential evidence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McKemmish, R.: What is forensic computing? Trends Issues Crime Crim. Justice 118(118), 1–6 (1999)

    Google Scholar 

  2. Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response (2006)

    Google Scholar 

  3. Kessler, G.: File signatures (2015). http://www.garykessler.net/library/file_sigs.html. Accessed 26 Oct 2015

  4. McDaniel, M.: Automatic File Type Detection Algorithm. James Madison University (2001)

    Google Scholar 

  5. McDaniel, M., Heydari, M.H.: Content based file type detection algorithms. In:. Proceedings of 36th Annual Hawaii International Conference on System Sciences (2003)

    Google Scholar 

  6. Li, W.J., Wang, K., Stolfo, S.J., Herzog, B.: Fileprints: identifying file types by n-gram analysis. In: Proceedings from 6th Annual IEEE Systems Man and Cybernetics (SMC) Information Assurance Workshop 2005, vol. 2005, pp. 64–71, June 2005

    Google Scholar 

  7. Dunham, J., Sun, M., Tseng, J.: Classifying file type of stream ciphers in depth using neural networks. In: The 3rd ACS/IEEE International Conference on Computer Systems and Applications (2005)

    Google Scholar 

  8. Amirani, M.C., Toorani, M., Shirazi, A.A.B: A new approach to content-based file type detection. In: IEEE Symposium on Computers and Communications, 2008, pp. 1103–1108, July 2008

    Google Scholar 

  9. Cao, D., Luo, J., Yin, M., Yang, H.: Feature selection based file type identification algorithm. In: 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 58–62 (2010)

    Google Scholar 

  10. Ahmed, I., Lhee, K., Shin, H., Hong, M.: Content-based File-type identification using cosine similarity and a divide-and-conquer approach. IETE Tech. Rev. 27(6), 465 (2010)

    Article  Google Scholar 

  11. Ahmed, I., Lhee, K., Shin, H., Hong, M.: Fast content-based file-type identification. In: 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, pp. 65–75 (2011)

    Chapter  Google Scholar 

  12. Amirani, M.C., Toorani, M., Mihandoost, S.: Feature-based type identification of file fragments. Secur. Commun. Netw. 6(1), 115–128 (2013)

    Article  Google Scholar 

  13. Evensen, J.D., Lindahl, S., Goodwin, M.: File-type detection using naïve Bayes and n-gram analysis. In: Norwegian Information Security Conference, NISK, vol. 7, no. 1. Fredrikstad (2014)

    Google Scholar 

  14. Vafaie, H., De Jong, K.: Genetic algorithms as a tool for feature selection in machine learning. In: International Conference on Tools with AI, pp. 200–203 (1992)

    Google Scholar 

  15. Qian, J., Zhuo, L., Zheng, J., Wang, F., Li, X., Ai, B.: A genetic algorithm based wrapper feature selection method for classification of hyper spectral data using support vector machine. Geogr. Res. 27(3), 493–501 (2008)

    Google Scholar 

  16. Jourdan, L., Dhaenens, C., Talbi, E.: A genetic algorithm for feature selection in data-mining for genetics. In: Proceedings of the 4th Metaheuristics International Conference (2001)

    Google Scholar 

  17. Hall, M.: Correlation-based feature selection for machine learning. The University of Waicato (1999)

    Google Scholar 

  18. Harris, R.: Using artificial neural networks for forensic file type identification. Master’s Thesis, Purdue Univ. (2007)

    Google Scholar 

  19. Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. Int. J. Conf. Artif. Intell. 14(12), 1137–1143 (1995)

    Google Scholar 

  20. Fei-Fei, L., Fergus, R., Perona, P.: Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories. Comput. Vis. Image Underst. 106(1), 59–70 (2007)

    Google Scholar 

  21. CoolUtils, Powerful image converter yet easy-to-use (2017)

    Google Scholar 

  22. T.E.I of Crete, E-Thesis (2015). http://nefeli.lib.teicrete.gr/search/. Accessed 26 Oct 2015

  23. The MathWorks Inc., MATLAB. The MathWorks Inc., Natick, Massachusetts (2016)

    Google Scholar 

  24. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11(1), 10 (2009)

    Article  Google Scholar 

  25. Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Oct 1989

    Google Scholar 

  26. Salzberg, S.L.: In: Quinlan, J.R. (ed) C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, Inc. (1993); Mach. Learn. 16(3), 235–240 (1994)

    Google Scholar 

  27. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1–27:27 (2011)

    Article  Google Scholar 

  28. NCH Software, Convert Between All Popular Image Formats with Pixillion (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos Κarampidis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Κarampidis, K., Deligiannis, I., Papadourakis, G. (2019). Combining Genetic Algorithms and Neural Networks for File Forgery Detection. In: Tsihrintzis, G., Sotiropoulos, D., Jain, L. (eds) Machine Learning Paradigms. Intelligent Systems Reference Library, vol 149 . Springer, Cham. https://doi.org/10.1007/978-3-319-94030-4_12

Download citation

Publish with us

Policies and ethics