Skip to main content

Advertisement

Log in

An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications

  • Review Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Humans have benefited greatly from technology, which has helped to raise standards of living and make important discoveries. But there are a lot of hazards associated with using it. The prevalence of digital video through mobile smartphone applications like WhatsApp and YouTube as well as web-based multimedia platforms are likewise gaining in importance as crucial. But there are also global security issues that are arising. These difficulties could cause significant issues, especially in cases where multimedia is a crucial factor in criminal decision-making, such as in child pornography and movie piracy. Consequently, copyright protection and video authentication are required in order to strengthen the reliability of using digital video in daily life. A tampered film may contain the relevant evidence in a legal dispute to convict someone of a violation or clear a guilty party of wrongdoing. Hence, to develop it is crucial to have reliable forensic techniques that would enhance the justice administration systems and enable them to reach just verdicts. This article discusses numerous forensic analysis fields, including network forensics, audio forensics, and video forensics. In this study, many algorithms such as Random Forest, Multilayer Perceptron (MLP), and Convolutional Recurrent Neural Networks (CRNN) are used for implementing different types of forensic analysis. Also, image fusion is used which can provide more information than a single image and extract features from the original images. This study came to the conclusion that the random forest provides the finest results for network forensic analysis with an accuracy of 98.02 percent. A lot of work has been done during the past years, through an analysis of current methods and machine learning strategies in the field of video source authentication and the study aims to provide a thorough summary of that work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Wen CY, Chen JK. Multi-resolution image fusion technique and its application to forensic science. Forensic Sci Int. 2004;140:217–32.

    Article  Google Scholar 

  2. Ali Z, Imran M, Alsulaiman M. An automatic digital audio authentication/forensics system. IEEE Access. 2017. https://doi.org/10.1109/ACCESS.2017.2672681.

    Article  Google Scholar 

  3. Gangwar A, Fidalgo E, Alegre E, Gonzáles V. Castro, pornography and child sexual abuse detection in image and video: a comparative evaluation, Proceedings of the 8th International Conference on Imaging for Crime Detection and Prevention, ISBN: 978-1-78561-687-7. 2017, pp. 37–42.

  4. Perez M, Avila S, Moreira D, Moraes D, Testoni V, Valle E, Goldenstein S, Rocha A. Video pornography detection through deep learning techniques and motion information. Neurocomputing. 2017;230:279–93.

    Article  Google Scholar 

  5. Slay J. Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques, Mobile networks and management. In: 9th international conference, MONAMI (2017), Melbourne, Australia, December 13–15; 2017. Proceedings. Springer. Vol. 235, p. 30.

  6. Xiao J, Li S and Xu Q. Video Based Evidence analysis and extraction in digital forensics investigation. IEEE Access; 2019.

  7. Hosler B, Mayer O, Bayar B, Zhao X, Chen C, Shackleford JA, Stamm MC. A video camera model identification system using deep learning and Fusion. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE; 2019. pp. 8271–8275.

  8. Chhabra GS, Singh VP, Singh M. Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimed Tools Appl. 2020;79:15881–900.

    Article  Google Scholar 

  9. Orozco ALS, Huamán CQ, Álvarez DP, Villalba LJG. A machine learning forensics technique to detect post-processing in digital videos. Future Gener Computer Syst. 2020;111:199–212.

    Article  Google Scholar 

  10. Qamhan MA, Altaheri H, Meftah AH, Muhammad G, Alotaibi YA. Digital audio forensics: microphone and environment classification using deep learning. IEEE Access. 2021. https://doi.org/10.1109/ACCESS.2021.3073786.

    Article  Google Scholar 

  11. Sachdeva S, Ali A. Machine learning with digital forensics for attack classification in the cloud network environment. Int J Syst Assur Eng Manag. 2022;13(Suppl 1):S156–65.

    Article  Google Scholar 

  12. Abbasi A, Javed AR, Yasin A, Jalil Z, Kryvinska N, Tariq U. A large-scale benchmark dataset for anomaly detection and rare event classification for audio forensics. IEEE Access. 2022. https://doi.org/10.1109/ACCESS.2022.3166602.

    Article  Google Scholar 

  13. Akbari Y, Al-Maadeed S, Elharrouss O, Khelifi F, Lawgaly A, Bouridane A. Digital forensic analysis for source video identification: a survey. Forensic Sci Int: Digital Investig. 2022;41:301390.

    Google Scholar 

  14. Akbari Y, Al-Maadeed S, Almaadeed N, Al-ali A, Khelifi F, Lawgaly A, et al. A new forensic video database for source smartphone identification: description and analysis. IEEE Access. 2022. https://doi.org/10.1109/ACCESS.2022.3151406.

    Article  Google Scholar 

  15. Neale C, Kennedy I, Price B, Yijun Yu, Nuseibh B. The case for zero trust digital forensics. Sci Int: Digit Investig. 2022;40:301352.

    Google Scholar 

Download references

Funding

This article has not received any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aishwarya Rajeev.

Ethics declarations

Conflict of interest

It is stated by the authors that they have no conflicting interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Intelligence for Artificial Intelligence, Machine Learning, Internet of Things and Data Analytics” guest edited by S. Meenakshi Sundaram, Young Lee and Gururaj K S.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajeev, A., Raviraj, P. An Insightful Analysis of Digital Forensics Effects on Networks and Multimedia Applications. SN COMPUT. SCI. 4, 186 (2023). https://doi.org/10.1007/s42979-022-01599-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01599-8

Keywords

Navigation