Systematic Review: Anti-Forensic Computer Techniques

The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated,...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 14; no. 12; p. 5302
Main Authors González Arias, Rafael, Bermejo Higuera, Javier, Rainer Granados, J. Javier, Bermejo Higuera, Juan Ramón, Sicilia Montalvo, Juan Antonio
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.06.2024
Subjects
Online AccessGet full text
ISSN2076-3417
2076-3417
DOI10.3390/app14125302

Cover

Loading…
Abstract The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art.
AbstractList The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art.
Audience Academic
Author Bermejo Higuera, Javier
Rainer Granados, J. Javier
Sicilia Montalvo, Juan Antonio
Bermejo Higuera, Juan Ramón
González Arias, Rafael
Author_xml – sequence: 1
  givenname: Rafael
  surname: González Arias
  fullname: González Arias, Rafael
– sequence: 2
  givenname: Javier
  orcidid: 0000-0003-3681-2572
  surname: Bermejo Higuera
  fullname: Bermejo Higuera, Javier
– sequence: 3
  givenname: J. Javier
  surname: Rainer Granados
  fullname: Rainer Granados, J. Javier
– sequence: 4
  givenname: Juan Ramón
  orcidid: 0000-0002-0197-8663
  surname: Bermejo Higuera
  fullname: Bermejo Higuera, Juan Ramón
– sequence: 5
  givenname: Juan Antonio
  orcidid: 0000-0002-5962-4147
  surname: Sicilia Montalvo
  fullname: Sicilia Montalvo, Juan Antonio
BookMark eNptUV1LAzEQDKLgV5_8AwUf5TRfd7n4VopVQRC0Poc1t9GU9nLmror_3tWKiJhAEoaZ2cnuPttuU4uMHQl-qpTlZ9B1QgtZKi632J7kpiqUFmb713uXjfp-wWlZoWrB95i-f-8HXMEQ_fgOXyO-nY8n7RCLWcrY9oRO06pbD5jHc_TPbXxZY3_IdgIsexx93wfsYXYxn14VN7eX19PJTeE1V0PRhACo6lI2XiEYAh81ncaqsoEGbGUrpTjWWnkpg_UY6qopDXqoykqgVgfseuPbJFi4LscV5HeXILovIOUnB5mSL9FZzbHRVEharyUAPGrwCHUQFRAoyOt449Xl9PmHwS3SOrcU3ylupCylNYZYpxvWE5BpbEMaMnjaDa6ip36HSPjEWCu1kVqS4GQj8Dn1fcbwE1Nw9zkW92ssxBZ_2D4O1PvUUpm4_FfzAfpekLM
CitedBy_id crossref_primary_10_1016_j_fsidi_2025_301884
Cites_doi 10.1109/TLA.2012.6222582
10.4018/jdcf.2013070104
10.1016/S1361-3723(07)70023-4
10.1016/j.diin.2016.04.004
10.1109/ICASSP.2013.6638215
10.1109/TIFS.2015.2398362
10.1007/s11042-020-09974-4
10.1007/s11042-014-1927-0
10.1007/s11554-019-00865-y
10.1109/TIFS.2014.2317949
10.1007/s11042-018-6170-7
10.1109/CTEMS.2018.8769121
10.1016/j.iot.2022.100544
10.1109/FGCN.2007.21
10.1109/HICSS.2012.452
10.1007/s11042-019-08599-6
10.1016/B978-0-12-811373-8.00012-4
10.1109/TCSVT.2022.3207310
10.4304/jcp.8.10.2483-2488
10.1016/j.image.2018.07.011
10.1109/ICASSP.2011.5946874
10.14419/ijet.v7i2.7.12230
10.1109/ACCESS.2020.3048246
10.1109/INDICON45594.2018.8987032
10.1109/IC3.2014.6897209
10.1109/CCAA.2016.7813913
10.1016/j.image.2018.02.001
10.1016/j.jss.2013.12.043
10.1109/ICIP.2018.8451503
10.1007/s11036-019-01255-1
10.1109/TCSVT.2022.3177238
10.1145/1854229.1854237
10.1016/B978-0-12-803340-1.00007-0
10.1109/ISCO.2013.6481171
10.1109/TIFS.2016.2543205
10.1007/978-3-642-32205-1_32
10.1109/GC-ElecEng52322.2021.9788230
10.1109/EUSIPCO.2015.7362749
10.23919/EUSIPCO.2018.8553259
10.1016/B978-1-59-749743-5.00010-9
10.1109/ACCESS.2021.3052353
10.1007/s11042-018-7073-3
10.1109/ICIP.2015.7351474
10.1109/IMF.2013.17
10.1145/3082031.3083242
10.1109/LSP.2015.2472561
10.1109/ICASSP.2013.6638220
10.1016/j.infsof.2013.07.010
10.1186/s42400-019-0043-x
10.1016/j.jvcir.2015.02.006
10.1109/TMM.2021.3098422
10.1016/j.diin.2005.04.002
10.1109/JSAC.2011.110806
10.1007/s11042-022-12448-4
10.1109/IS3C.2012.53
10.1109/BWCCA.2011.64
10.1109/IJCNN55064.2022.9892357
10.1007/s11042-019-7734-x
10.1109/ACCESS.2022.3190957
10.1504/IJAHUC.2015.067788
10.1109/ICPCSI.2017.8391771
10.1007/s11432-016-0426-1
10.1109/IDAP.2017.8090341
10.1117/1.JEI.29.4.043026
10.1016/j.scijus.2020.10.002
10.4018/jisp.2008040101
10.1109/MMSP.2013.6659339
10.1016/j.diin.2018.01.014
10.1016/j.jvcir.2019.102682
10.1109/ICDCSW.2012.33
10.1007/978-3-030-95398-0_6
10.1007/978-3-030-43575-2_12
10.1109/ACCESS.2019.2960097
10.1109/ICIP.2011.6115854
10.1504/IJESDF.2017.083992
10.1016/j.diin.2007.01.005
10.1016/j.diin.2016.04.006
10.1109/ICCNC.2013.6504159
10.1109/ISDFS49300.2020.9116192
10.1016/B978-0-12-804449-0.00007-5
10.1145/1413140.1413166
10.1145/3384544.3384571
10.1016/S1361-3723(10)70112-3
10.1109/APSIPAASC47483.2019.9023173
10.1016/j.scijus.2019.06.004
10.1109/HICSS.2014.593
10.1049/iet-ipr.2018.6587
10.1109/TCSVT.2016.2599849
10.1016/j.cose.2020.102083
10.1007/978-3-642-40099-5_29
10.1145/2482513.2482536
10.1111/1556-4029.12618
10.1109/IMF.2018.00014
10.4018/IJDCF.2020070104
10.1007/978-981-19-2719-5_47
10.1109/ICPR.2014.126
10.1007/s11045-019-00637-8
10.1109/ICASSP.2014.6854092
10.1109/ICASSP.2013.6638219
10.1109/ICASSP.2014.6854091
10.1007/s11042-015-2762-7
10.1109/HUMANCOM.2010.5563320
10.1109/ISCTURKEY56345.2022.9931816
10.1007/s11416-014-0221-z
10.1007/978-3-031-08530-7_44
10.3390/fi13110288
10.35940/ijitee.A1037.0881019
10.1080/13682199.2017.1389832
10.1109/ICNIDC.2016.7974588
10.1109/ICCCI.2013.6466109
10.1016/B978-0-12-801635-0.00006-1
10.1109/WorldCIS.2015.7359431
10.1007/978-981-19-1012-8_11
10.1109/TCSVT.2021.3068294
10.1016/j.forsciint.2017.06.003
10.1109/WDFIA.2008.13
10.1109/TMM.2019.2959443
10.1109/BWCCA.2014.83
10.1016/j.diin.2006.06.005
10.1111/1556-4029.13393
10.1109/ISDFS49300.2020.9116399
10.1109/TIFS.2011.2119314
10.1109/IS.2016.7737401
10.1109/CSNT.2014.187
10.1007/978-981-16-7621-5_17
10.1007/978-3-319-24075-6_10
10.1007/978-3-319-74107-9_8
10.1016/j.infsof.2008.09.009
10.1109/TIP.2015.2390137
10.1109/ISDFS49300.2020.9116375
10.1109/APMediaCast.2016.7878175
10.1109/ICIP.2013.6738920
10.13052/jcsm2245-1439.831
10.14257/jse.2014.12.05
10.1016/j.diin.2016.06.003
10.1109/SISY.2018.8524756
10.1109/IRI.2016.94
10.1109/APSIPA.2013.6694156
10.1109/IAdCC.2014.6779481
10.1109/CSE-EUC.2017.45
10.23919/MIPRO.2017.7973612
10.1080/00450618.2018.1533038
10.1109/BWCCA.2010.85
10.1109/ISSPIT.2016.7886024
10.1016/j.diin.2013.06.012
10.1007/978-3-030-87355-4_63
10.1109/LISAT.2019.8816826
10.1007/978-3-319-53465-7_1
10.4018/978-1-4666-1879-4.ch013
10.1109/ICASSP.2012.6288237
10.1109/ICASSP.2010.5495491
10.4018/ijdcf.2014010103
10.1016/j.diin.2013.10.002
10.1007/978-3-642-36373-3_2
10.1109/ICIP.2010.5652553
10.1007/s12083-020-00975-6
10.1145/1982185.1982227
10.1117/12.2039569
10.1007/978-3-642-32205-1_33
10.1109/TIFS.2018.2871751
10.1109/LSP.2015.2509477
10.1016/j.patrec.2021.03.009
10.1109/ICECDS.2017.8389944
10.1016/j.patcog.2016.12.010
10.1109/NTICT.2017.7976108
10.1016/j.forsciint.2021.111040
10.1109/TIFS.2013.2285515
10.1109/ICASSP.2013.6638221
10.1109/ChinaSIP.2015.7230449
10.1117/12.2182457
10.1109/ICASSP.2013.6638217
10.1016/S1361-3723(20)30030-0
10.1145/2905055.2905134
10.1109/ICIP.2017.8296534
10.1016/j.diin.2019.01.001
10.1145/1980822.1980836
10.1109/WIFS.2016.7823571
10.1109/ICCIC.2013.6724230
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
DOA
DOI 10.3390/app14125302
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest Central
ProQuest One Academic Middle East (New)
ProQuest One Academic UKI Edition
ProQuest Central Essentials
ProQuest Central Korea
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_940ed4dc329c42aaab4acea8f16ac321
A799247242
10_3390_app14125302
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
PMFND
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PUEGO
ID FETCH-LOGICAL-c403t-dffae3852dc3ea7c40b47c47935dada9696330e843c22f9cef86d57eca6561e43
IEDL.DBID BENPR
ISSN 2076-3417
IngestDate Wed Aug 27 01:31:00 EDT 2025
Sun Jun 29 16:37:20 EDT 2025
Tue Jun 10 21:07:53 EDT 2025
Tue Jul 01 01:31:19 EDT 2025
Thu Apr 24 23:04:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c403t-dffae3852dc3ea7c40b47c47935dada9696330e843c22f9cef86d57eca6561e43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-0197-8663
0000-0003-3681-2572
0000-0002-5962-4147
OpenAccessLink https://www.proquest.com/docview/3072252977?pq-origsite=%requestingapplication%
PQID 3072252977
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_940ed4dc329c42aaab4acea8f16ac321
proquest_journals_3072252977
gale_infotracacademiconefile_A799247242
crossref_primary_10_3390_app14125302
crossref_citationtrail_10_3390_app14125302
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-06-01
PublicationDateYYYYMMDD 2024-06-01
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_139
Ding (ref_143) 2011; 56
ref_91
ref_90
ref_130
Vadlamudi (ref_152) 2018; 7
Singh (ref_75) 2019; 14
ref_97
ref_96
ref_135
ref_95
(ref_146) 2010; 2010
Ahn (ref_165) 2021; 9
Kang (ref_42) 2016; 75
Palmbach (ref_185) 2020; 32
ref_125
Zhang (ref_48) 2022; 33
Li (ref_92) 2015; 22
Kitchenham (ref_7) 2013; 55
Beebe (ref_13) 2005; 2
ref_120
Peng (ref_49) 2022; 32
Fan (ref_79) 2014; 9
ref_121
ref_124
Su (ref_41) 2015; 29
ref_123
Amritha (ref_138) 2019; 8
Peng (ref_58) 2013; 7809
(ref_14) 2017; 9
Cao (ref_24) 2014; 57
ref_72
Wu (ref_110) 2021; 100
ref_71
Liu (ref_55) 2017; 65
ref_70
ref_151
ref_150
Wani (ref_188) 2020; 52
ref_78
ref_153
Horsman (ref_193) 2019; 59
ref_77
ref_76
ref_154
ref_74
ref_73
Fan (ref_67) 2015; 10
Shen (ref_36) 2020; 12022
ref_148
ref_147
ref_80
ref_149
Singh (ref_88) 2017; 277
Cao (ref_99) 2015; 60
ref_89
ref_142
ref_141
ref_144
Eschweiler (ref_160) 2012; 318
Bhardwaj (ref_57) 2018; 68
ref_85
Ding (ref_47) 2022; 24
Lu (ref_35) 2013; 5
Chuang (ref_34) 2013; 7692
Jahankhani (ref_158) 2008; 2
He (ref_117) 2022; 27
Cohen (ref_159) 2013; 10
Choo (ref_172) 2017; 62
ref_214
ref_213
Dong (ref_31) 2017; 35
ref_216
ref_215
Hoelz (ref_11) 2017; 511
Forte (ref_145) 2007; 2007
ref_219
ref_212
ref_211
Sitara (ref_37) 2016; 18
Das (ref_100) 2018; 77
Lees (ref_210) 2013; 10
Harris (ref_12) 2006; 3
Huang (ref_109) 2021; 12888
Sanda (ref_179) 2022; 303
ref_202
ref_205
ref_204
Kwok (ref_27) 2012; 7128
ref_207
ref_208
Zeng (ref_102) 2018; 61
ref_201
Moon (ref_134) 2022; 436
Ratcliffe (ref_217) 2022; 13343
Xie (ref_118) 2022; 32
ref_115
ref_114
Kumar (ref_113) 2020; 79
ref_116
ref_119
Forte (ref_226) 2008; 2008
ref_111
Chandran (ref_168) 2014; 6
ref_112
Kitchenham (ref_6) 2009; 51
Chuang (ref_132) 2013; 8
Cao (ref_32) 2015; 9314
Qian (ref_93) 2013; 8
Liu (ref_129) 2022; 81
ref_225
ref_224
ref_105
Bhat (ref_194) 2021; 61
ref_107
Zou (ref_29) 2021; 2021
ref_221
ref_220
ref_223
ref_101
ref_222
Wang (ref_126) 2022; 13180
Dou (ref_122) 2020; 29
Li (ref_20) 2018; 28
ref_10
Peng (ref_63) 2016; 39
Sang (ref_182) 2017; 9
ref_18
ref_16
ref_15
Berghel (ref_200) 2007; 50
Qian (ref_82) 2014; 91
Cifuentes (ref_180) 2012; 10
Sun (ref_30) 2018; 63
Latzo (ref_3) 2019; 28
Bhardwaj (ref_81) 2021; 328
ref_23
Hilley (ref_209) 2007; 4
Qureshi (ref_21) 2019; 13
Peng (ref_54) 2020; 22
Chen (ref_137) 2015; 18
Gupta (ref_140) 2014; 132
ref_28
Moon (ref_133) 2021; 14
Yu (ref_22) 2017; 10082
Palutke (ref_4) 2020; 33
Ahn (ref_161) 2022; 10
Chu (ref_84) 2015; 24
Sun (ref_136) 2011; 29
Tao (ref_128) 2020; 12
Li (ref_106) 2019; 78
Singh (ref_187) 2019; 569
Li (ref_108) 2015; 74
Wani (ref_17) 2020; 2020
Pajek (ref_2) 2009; 45
Sudhakar (ref_19) 2020; 3
ref_50
Mohiddin (ref_156) 2019; 8
Li (ref_131) 2019; 7
ref_173
Stamm (ref_104) 2011; 6
ref_56
ref_175
ref_174
ref_177
ref_53
ref_176
ref_52
Sheng (ref_103) 2014; 6
ref_178
Kumar (ref_94) 2019; 78
ref_181
Agarwal (ref_218) 2018; 529
ref_61
ref_60
ref_169
Sutthiwan (ref_83) 2012; 7128
Yaacoub (ref_170) 2022; 19
ref_69
ref_162
ref_68
ref_164
ref_66
ref_163
Sang (ref_183) 2016; 8
ref_65
Singh (ref_64) 2019; 30
ref_62
ref_167
Bharathiraja (ref_26) 2019; 24
Yao (ref_46) 2019; 16
ref_171
Kumar (ref_87) 2020; 9
Shelke (ref_38) 2021; 80
Bhardwaj (ref_98) 2018; 841
Sharma (ref_59) 2020; 66
ref_195
Cho (ref_206) 2015; 11
ref_197
ref_33
ref_196
ref_199
ref_198
Conlan (ref_8) 2016; 18
Shelke (ref_86) 2018; 66
Patil (ref_155) 2013; 377
ref_39
Zhao (ref_127) 2016; 11
Baier (ref_186) 2018; 532
Rani (ref_157) 2020; 14
ref_184
ref_45
ref_44
ref_43
Bonetti (ref_166) 2014; 10
Wang (ref_51) 2021; 146
ref_40
ref_189
ref_1
Shin (ref_203) 2014; 11
ref_191
ref_190
ref_192
ref_9
ref_5
Ravi (ref_25) 2016; 23
References_xml – ident: ref_9
– volume: 10
  start-page: 1757
  year: 2012
  ident: ref_180
  article-title: Analysis and implementation of anti-forensics techniques on ZFS
  publication-title: IEEE Lat. Am. Trans.
  doi: 10.1109/TLA.2012.6222582
– volume: 5
  start-page: 53
  year: 2013
  ident: ref_35
  article-title: Anti-forensics for unsharp masking sharpening in digital images
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/jdcf.2013070104
– ident: ref_191
  doi: 10.1016/S1361-3723(07)70023-4
– ident: ref_190
  doi: 10.1016/j.diin.2016.04.004
– ident: ref_39
  doi: 10.1109/ICASSP.2013.6638215
– volume: 10
  start-page: 1076
  year: 2015
  ident: ref_67
  article-title: Median filtered image quality enhancement and anti-forensics via variational deconvolution
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2398362
– volume: 80
  start-page: 6247
  year: 2021
  ident: ref_38
  article-title: A comprehensive survey on passive techniques for digital video forgery detection
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-020-09974-4
– volume: 74
  start-page: 6729
  year: 2015
  ident: ref_108
  article-title: Anti-forensics of double JPEG compression with the same quantization matrix
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-014-1927-0
– volume: 16
  start-page: 751
  year: 2019
  ident: ref_46
  article-title: An approach to detect video frame deletion under anti-forensics
  publication-title: J. Real-Time Image Process.
  doi: 10.1007/s11554-019-00865-y
– volume: 9
  start-page: 1211
  year: 2014
  ident: ref_79
  article-title: JPEG anti-forensics with an improved tradeoff between forensic undetectability and image quality
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2317949
– volume: 377
  start-page: 162
  year: 2013
  ident: ref_155
  article-title: A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation
  publication-title: Commun. Comput. Inf. Sci.
– volume: 529
  start-page: 216
  year: 2018
  ident: ref_218
  article-title: Anti-forensic = suspicious: Detection of stealthy malware that hides its network traffic
  publication-title: IFIP Adv. Inf. Commun. Technol.
– volume: 77
  start-page: 31835
  year: 2018
  ident: ref_100
  article-title: Anti-forensics of JPEG compression detection schemes using an approximation of DCT coefficients
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6170-7
– ident: ref_119
  doi: 10.1109/CTEMS.2018.8769121
– volume: 19
  start-page: 100544
  year: 2022
  ident: ref_170
  article-title: Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
  publication-title: Internet Things
  doi: 10.1016/j.iot.2022.100544
– volume: 33
  start-page: 301012
  year: 2020
  ident: ref_4
  article-title: Hiding Process Memory Via Anti-Forensic Techniques
  publication-title: Forensic Sci. Int. Digit. Investig.
– ident: ref_114
– ident: ref_149
  doi: 10.1109/FGCN.2007.21
– volume: 27
  start-page: 88
  year: 2022
  ident: ref_117
  article-title: Overview of passive forensics and anti-forensics techniques for GAN-generated image
  publication-title: J. Image Graph.
– ident: ref_173
  doi: 10.1109/HICSS.2012.452
– volume: 79
  start-page: 8061
  year: 2020
  ident: ref_113
  article-title: Anti-forensic approach for JPEG compressed images with enhanced image quality and forensic undetectability
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-08599-6
– ident: ref_175
  doi: 10.1016/B978-0-12-811373-8.00012-4
– volume: 33
  start-page: 661
  year: 2022
  ident: ref_48
  article-title: A Local Perturbation Generation Method for GAN-generated Face Anti-forensics
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2022.3207310
– volume: 8
  start-page: 2483
  year: 2013
  ident: ref_93
  article-title: Simplified anti-forensics of JPEG compression
  publication-title: J. Comput.
  doi: 10.4304/jcp.8.10.2483-2488
– volume: 132
  start-page: 247
  year: 2014
  ident: ref_140
  article-title: Mozilla firefox browsing artefacts in 3 different anti-forensics modes
  publication-title: Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng.
– volume: 68
  start-page: 155
  year: 2018
  ident: ref_57
  article-title: A JPEG blocking artefact detector for image forensics
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2018.07.011
– volume: 511
  start-page: 169
  year: 2017
  ident: ref_11
  article-title: Anti-forensic threat modelling
  publication-title: IFIP Adv. Inf. Commun. Technol.
– ident: ref_101
  doi: 10.1109/ICASSP.2011.5946874
– volume: 318
  start-page: 289
  year: 2012
  ident: ref_160
  article-title: Towards sound forensic acquisition of volatile data
  publication-title: Commun. Comput. Inf. Sci.
– volume: 7
  start-page: 1072
  year: 2018
  ident: ref_152
  article-title: Analysis on Digital Forensics Challenges and Anti-Forensics Techniques in Cloud Computing
  publication-title: Int. J. Eng. Technol.
  doi: 10.14419/ijet.v7i2.7.12230
– volume: 9
  start-page: 4364
  year: 2020
  ident: ref_87
  article-title: Digital image forensic approach to counter the JPEG anti-forensic attacks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3048246
– ident: ref_111
  doi: 10.1109/INDICON45594.2018.8987032
– ident: ref_199
  doi: 10.1109/IC3.2014.6897209
– ident: ref_153
  doi: 10.1109/CCAA.2016.7813913
– volume: 63
  start-page: 149
  year: 2018
  ident: ref_30
  article-title: A novel contrast enhancement forensics based on convolutional neural networks
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2018.02.001
– volume: 91
  start-page: 100
  year: 2014
  ident: ref_82
  article-title: Improved anti-forensics of JPEG compression
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2013.12.043
– ident: ref_45
  doi: 10.1109/ICIP.2018.8451503
– ident: ref_177
– volume: 24
  start-page: 1174
  year: 2019
  ident: ref_26
  article-title: Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram
  publication-title: Mob. Netw. Appl.
  doi: 10.1007/s11036-019-01255-1
– ident: ref_148
– volume: 32
  start-page: 6657
  year: 2022
  ident: ref_49
  article-title: BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2022.3177238
– ident: ref_61
  doi: 10.1145/1854229.1854237
– ident: ref_201
  doi: 10.1016/B978-0-12-803340-1.00007-0
– ident: ref_205
– ident: ref_78
  doi: 10.1109/ISCO.2013.6481171
– volume: 11
  start-page: 1603
  year: 2016
  ident: ref_127
  article-title: Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2543205
– volume: 7128
  start-page: 398
  year: 2012
  ident: ref_27
  article-title: Alternative anti-forensics method for contrast enhancement
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-32205-1_32
– ident: ref_204
  doi: 10.1109/GC-ElecEng52322.2021.9788230
– ident: ref_130
  doi: 10.1109/EUSIPCO.2015.7362749
– ident: ref_56
  doi: 10.23919/EUSIPCO.2018.8553259
– ident: ref_150
  doi: 10.1016/B978-1-59-749743-5.00010-9
– volume: 9
  start-page: 14130
  year: 2021
  ident: ref_165
  article-title: Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3052353
– volume: 78
  start-page: 8577
  year: 2019
  ident: ref_106
  article-title: Detecting double JPEG compression and its related anti-forensic operations with CNN
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-7073-3
– ident: ref_116
  doi: 10.1109/ICIP.2015.7351474
– ident: ref_192
  doi: 10.1109/IMF.2013.17
– ident: ref_120
  doi: 10.1145/3082031.3083242
– volume: 22
  start-page: 2219
  year: 2015
  ident: ref_92
  article-title: Anti-Forensics of Lossy Predictive Image Compression
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2015.2472561
– ident: ref_95
  doi: 10.1109/ICASSP.2013.6638220
– volume: 55
  start-page: 2049
  year: 2013
  ident: ref_7
  article-title: A Systematic Review of Systematic Review Process Research in Software Engineering
  publication-title: Manuscr. Publ. Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2013.07.010
– volume: 3
  start-page: 1
  year: 2020
  ident: ref_19
  article-title: An emerging threat Fileless malware: A survey and research challenges
  publication-title: Cybersecurity
  doi: 10.1186/s42400-019-0043-x
– volume: 29
  start-page: 103
  year: 2015
  ident: ref_41
  article-title: Forensic and anti-forensic techniques for video shot editing in H.264/AVC
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2015.02.006
– volume: 24
  start-page: 3429
  year: 2022
  ident: ref_47
  article-title: Anti-Forensics for Face Swapping Videos via Adversarial Training
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2021.3098422
– volume: 2
  start-page: 147
  year: 2005
  ident: ref_13
  article-title: A hierarchical, objectives-based framework for the digital investigations process
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2005.04.002
– volume: 29
  start-page: 1392
  year: 2011
  ident: ref_136
  article-title: Anti-forensics with steganographic data embedding in digital images
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2011.110806
– volume: 81
  start-page: 17155
  year: 2022
  ident: ref_129
  article-title: Anti-forensics of fake stereo audio using generative adversarial network
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-022-12448-4
– ident: ref_139
  doi: 10.1109/IS3C.2012.53
– ident: ref_141
  doi: 10.1109/BWCCA.2011.64
– ident: ref_53
  doi: 10.1109/IJCNN55064.2022.9892357
– ident: ref_151
– volume: 78
  start-page: 25427
  year: 2019
  ident: ref_94
  article-title: An improved anti-forensic technique for JPEG compression
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-7734-x
– volume: 10
  start-page: 74207
  year: 2022
  ident: ref_161
  article-title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3190957
– volume: 18
  start-page: 54
  year: 2015
  ident: ref_137
  article-title: Anti-forensic steganography using multi-bit MER with flexible bit location
  publication-title: Int. J. Ad Hoc Ubiquitous Comput.
  doi: 10.1504/IJAHUC.2015.067788
– ident: ref_96
  doi: 10.1109/ICPCSI.2017.8391771
– volume: 61
  start-page: 032103
  year: 2018
  ident: ref_102
  article-title: Countering JPEG anti-forensics based on noise level estimation
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-016-0426-1
– ident: ref_15
  doi: 10.1109/IDAP.2017.8090341
– volume: 29
  start-page: 043026
  year: 2020
  ident: ref_122
  article-title: Anti-forensics of diffusion-based image inpainting
  publication-title: J. Electron. Imaging
  doi: 10.1117/1.JEI.29.4.043026
– volume: 61
  start-page: 198
  year: 2021
  ident: ref_194
  article-title: Can computer forensic tools be trusted in digital investigations?
  publication-title: Sci. Justice
  doi: 10.1016/j.scijus.2020.10.002
– volume: 2
  start-page: 1
  year: 2008
  ident: ref_158
  article-title: Memory-Based Antiforensic Tools and Techniques
  publication-title: Int. J. Inf. Secur. Priv.
  doi: 10.4018/jisp.2008040101
– ident: ref_105
  doi: 10.1109/MMSP.2013.6659339
– volume: 56
  start-page: 241
  year: 2011
  ident: ref_143
  article-title: Disguisable symmetric encryption schemes for an anti-forensics purpose
  publication-title: Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng.
– volume: 6
  start-page: 22
  year: 2014
  ident: ref_103
  article-title: An improved counter-forensic algorithm to erase the JPEG compression artifacts
  publication-title: Int. J. Mob. Comput. Multimed. Commun.
– ident: ref_181
  doi: 10.1016/j.diin.2018.01.014
– ident: ref_216
– volume: 66
  start-page: 102682
  year: 2020
  ident: ref_59
  article-title: Anti-forensics of median filtering and contrast enhancement
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2019.102682
– ident: ref_72
– ident: ref_219
  doi: 10.1109/ICDCSW.2012.33
– volume: 13180
  start-page: 72
  year: 2022
  ident: ref_126
  article-title: Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-030-95398-0_6
– volume: 45
  start-page: 145
  year: 2009
  ident: ref_2
  article-title: Computer anti-forensics methods and their impact on computer forensic investigation
  publication-title: Commun. Comput. Inf. Sci.
– volume: 12022
  start-page: 150
  year: 2020
  ident: ref_36
  article-title: Anti-forensics of Image Sharpening Using Generative Adversarial Network
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-030-43575-2_12
– volume: 7
  start-page: 184332
  year: 2019
  ident: ref_131
  article-title: Anti-Forensics of Audio Source Identification Using Generative Adversarial Network
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2960097
– ident: ref_77
  doi: 10.1109/ICIP.2011.6115854
– volume: 9
  start-page: 167
  year: 2017
  ident: ref_14
  article-title: Forensic artefacts associated with intentionally deleted user accounts
  publication-title: Int. J. Electron. Secur. Digit. Forensics
  doi: 10.1504/IJESDF.2017.083992
– volume: 4
  start-page: 13
  year: 2007
  ident: ref_209
  article-title: Anti-forensics with a small army of exploits
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2007.01.005
– volume: 39
  start-page: 503
  year: 2016
  ident: ref_63
  article-title: Median filtering forensics based on multi-directional difference of filtering residuals
  publication-title: JisuanjiXuebao/Chin. J. Comput.
– volume: 35
  start-page: 745
  year: 2017
  ident: ref_31
  article-title: Contrast Enhancement Forensics Based on Modified Convolutional Neural Network
  publication-title: Yingyong Kexue Xuebao/J. Appl. Sci.
– volume: 18
  start-page: S66
  year: 2016
  ident: ref_8
  article-title: Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2016.04.006
– ident: ref_144
  doi: 10.1109/ICCNC.2013.6504159
– ident: ref_176
  doi: 10.1109/ISDFS49300.2020.9116192
– ident: ref_10
  doi: 10.1016/B978-0-12-804449-0.00007-5
– volume: 841
  start-page: 190
  year: 2018
  ident: ref_98
  article-title: A method for detecting JPEG anti-forensics
  publication-title: Commun. Comput. Inf. Sci.
– ident: ref_167
– ident: ref_223
  doi: 10.1145/1413140.1413166
– ident: ref_208
  doi: 10.1145/3384544.3384571
– volume: 2010
  start-page: 17
  year: 2010
  ident: ref_146
  article-title: Fighting forensics
  publication-title: Comput. Fraud Secur.
  doi: 10.1016/S1361-3723(10)70112-3
– ident: ref_124
  doi: 10.1109/APSIPAASC47483.2019.9023173
– volume: 59
  start-page: 565
  year: 2019
  ident: ref_193
  article-title: When finding nothing may be evidence of something: Anti-forensics and digital tool marks
  publication-title: Sci. Justice
  doi: 10.1016/j.scijus.2019.06.004
– ident: ref_195
– ident: ref_174
  doi: 10.1109/HICSS.2014.593
– volume: 13
  start-page: 1811
  year: 2019
  ident: ref_21
  article-title: Bibliography of digital image anti-forensics and anti-anti-forensics techniques
  publication-title: IET Image Process.
  doi: 10.1049/iet-ipr.2018.6587
– volume: 2021
  start-page: 1
  year: 2021
  ident: ref_29
  article-title: Anti-forensics of image contrast enhancement based on generative adversarial network
  publication-title: Secur. Commun. Networks
– ident: ref_221
– volume: 28
  start-page: 31
  year: 2018
  ident: ref_20
  article-title: Identification of Various Image Operations Using Residual-Based Features
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2016.2599849
– volume: 100
  start-page: 102083
  year: 2021
  ident: ref_110
  article-title: Towards multi-operation image anti-forensics with generative adversarial networks
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2020.102083
– volume: 7809
  start-page: 344
  year: 2013
  ident: ref_58
  article-title: Robust median filtering detection based on filtered residual
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-40099-5_29
– ident: ref_97
  doi: 10.1145/2482513.2482536
– ident: ref_68
– volume: 60
  start-page: 197
  year: 2015
  ident: ref_99
  article-title: A new anti-forensic scheme-hiding the single JPEG compression trace for a digital image
  publication-title: J. Forensic Sci.
  doi: 10.1111/1556-4029.12618
– ident: ref_154
  doi: 10.1109/IMF.2018.00014
– volume: 12
  start-page: 45
  year: 2020
  ident: ref_128
  article-title: Anti-forensics of double compressed MP3 audio
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/IJDCF.2020070104
– volume: 303
  start-page: 497
  year: 2022
  ident: ref_179
  article-title: VM Anti-forensics: Detecting File Wiping Using File System Journals
  publication-title: Smart Innov. Syst. Technol.
  doi: 10.1007/978-981-19-2719-5_47
– ident: ref_198
– ident: ref_125
  doi: 10.1109/ICPR.2014.126
– ident: ref_1
– ident: ref_123
– volume: 30
  start-page: 1951
  year: 2019
  ident: ref_64
  article-title: An improved median filtering anti-forensics with better image quality and forensic undetectability
  publication-title: Multidimens. Syst. Signal Process.
  doi: 10.1007/s11045-019-00637-8
– ident: ref_169
– ident: ref_43
  doi: 10.1109/ICASSP.2014.6854092
– ident: ref_107
  doi: 10.1109/ICASSP.2013.6638219
– ident: ref_66
  doi: 10.1109/ICASSP.2014.6854091
– volume: 75
  start-page: 13833
  year: 2016
  ident: ref_42
  article-title: Forensics and counter anti-forensics of video inter-frame forgery
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-015-2762-7
– ident: ref_211
  doi: 10.1109/HUMANCOM.2010.5563320
– ident: ref_212
  doi: 10.1109/ISCTURKEY56345.2022.9931816
– volume: 10
  start-page: 255
  year: 2014
  ident: ref_166
  article-title: Black-box forensic and antiforensic characteristics of solid-state drives
  publication-title: J. Comput. Virol. Hacking Tech.
  doi: 10.1007/s11416-014-0221-z
– volume: 13343
  start-page: 516
  year: 2022
  ident: ref_217
  article-title: Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-031-08530-7_44
– volume: 8
  start-page: 31
  year: 2016
  ident: ref_183
  article-title: Data Hiding in NTFS Timestamps for Anti-Forensics-All Databases
  publication-title: Int. J. Internet Broadcast. Commun.
– ident: ref_50
  doi: 10.3390/fi13110288
– volume: 8
  start-page: 1569
  year: 2019
  ident: ref_156
  article-title: Unique methodology to mitigate anti-forensics in cloud using attack-graphs
  publication-title: Int. J. Innov. Technol. Explor. Eng.
  doi: 10.35940/ijitee.A1037.0881019
– volume: 66
  start-page: 169
  year: 2018
  ident: ref_86
  article-title: An improved anti-forensics JPEG compression using Least Cuckoo Search algorithm
  publication-title: Imaging Sci. J.
  doi: 10.1080/13682199.2017.1389832
– ident: ref_162
  doi: 10.1109/ICNIDC.2016.7974588
– ident: ref_115
  doi: 10.1109/ICCCI.2013.6466109
– ident: ref_147
  doi: 10.1016/B978-0-12-801635-0.00006-1
– ident: ref_189
  doi: 10.1109/WorldCIS.2015.7359431
– volume: 436
  start-page: 157
  year: 2022
  ident: ref_134
  article-title: Authentication and Security Aspect of Information Privacy Using Anti-forensic Audio–Video Embedding Technique
  publication-title: Lect. Notes Networks Syst.
  doi: 10.1007/978-981-19-1012-8_11
– volume: 32
  start-page: 1701
  year: 2022
  ident: ref_118
  article-title: Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics
  publication-title: IEEE Trans. Circuits Syst. Video Technol.
  doi: 10.1109/TCSVT.2021.3068294
– volume: 277
  start-page: 133
  year: 2017
  ident: ref_88
  article-title: Improved JPEG anti-forensics with better image visual quality and forensic undetectability
  publication-title: Forensic Sci. Int.
  doi: 10.1016/j.forsciint.2017.06.003
– ident: ref_164
  doi: 10.1109/WDFIA.2008.13
– volume: 22
  start-page: 2511
  year: 2020
  ident: ref_54
  article-title: CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network
  publication-title: IEEE Trans. Multimed.
  doi: 10.1109/TMM.2019.2959443
– ident: ref_73
  doi: 10.1109/BWCCA.2014.83
– volume: 3
  start-page: 44
  year: 2006
  ident: ref_12
  article-title: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2006.06.005
– ident: ref_220
– ident: ref_163
– volume: 62
  start-page: 1054
  year: 2017
  ident: ref_172
  article-title: Windows 7 Antiforensics: A Review and a Novel Approach
  publication-title: J. Forensic Sci.
  doi: 10.1111/1556-4029.13393
– ident: ref_196
  doi: 10.1109/ISDFS49300.2020.9116399
– volume: 6
  start-page: 1050
  year: 2011
  ident: ref_104
  article-title: Anti-forensics of digital image compression
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2011.2119314
– ident: ref_71
  doi: 10.1109/IS.2016.7737401
– ident: ref_70
  doi: 10.1109/CSNT.2014.187
– ident: ref_23
  doi: 10.1007/978-981-16-7621-5_17
– volume: 9314
  start-page: 97
  year: 2015
  ident: ref_32
  article-title: On the security of image manipulation forensics
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-319-24075-6_10
– ident: ref_213
  doi: 10.1007/978-3-319-74107-9_8
– volume: 11
  start-page: 69
  year: 2015
  ident: ref_206
  article-title: A Problem Solving Method for Non-Admittable Characters of a Windows File Name in a Directory Index Anti-Forensic Technique
  publication-title: J. Korea Soc. Digit. Ind. Inf. Manag.
– volume: 51
  start-page: 7
  year: 2009
  ident: ref_6
  article-title: Systematic literature reviews in software engineering—A systematic literature review
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2008.09.009
– volume: 24
  start-page: 1087
  year: 2015
  ident: ref_84
  article-title: On antiforensic concealability with rate-distortion tradeoff
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2015.2390137
– volume: 50
  start-page: 15
  year: 2007
  ident: ref_200
  article-title: Hiding data, forensics, and anti-forensics
  publication-title: Commun. ACM
– ident: ref_207
  doi: 10.1109/ISDFS49300.2020.9116375
– ident: ref_171
  doi: 10.1109/APMediaCast.2016.7878175
– ident: ref_28
  doi: 10.1109/ICIP.2013.6738920
– volume: 8
  start-page: 295
  year: 2019
  ident: ref_138
  article-title: Anti-forensic approach to remove stego content from images and videos
  publication-title: J. Cyber Secur. Mobil.
  doi: 10.13052/jcsm2245-1439.831
– volume: 9
  start-page: 17
  year: 2017
  ident: ref_182
  article-title: A Maximum Data Allocation Rule for an Anti-forensic Data Hiding Method in NTFS Index Record-All Databases
  publication-title: Int. J. Internet Broadcast. Commun.
– ident: ref_142
– ident: ref_5
– volume: 11
  start-page: 605
  year: 2014
  ident: ref_203
  article-title: Countermeasures against Anti-forensics by Analyzing Anti-forensics Techniques
  publication-title: J. Secur. Eng.
  doi: 10.14257/jse.2014.12.05
– volume: 18
  start-page: 8
  year: 2016
  ident: ref_37
  article-title: Digital video tampering detection: An overview of passive techniques
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2016.06.003
– ident: ref_224
  doi: 10.1109/SISY.2018.8524756
– ident: ref_18
  doi: 10.1109/IRI.2016.94
– ident: ref_85
  doi: 10.1109/APSIPA.2013.6694156
– volume: 14
  start-page: 403
  year: 2021
  ident: ref_133
  article-title: Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility
  publication-title: Int. J. Inf. Comput. Secur.
– ident: ref_90
– ident: ref_135
  doi: 10.1109/IAdCC.2014.6779481
– ident: ref_178
  doi: 10.1109/CSE-EUC.2017.45
– ident: ref_197
  doi: 10.23919/MIPRO.2017.7973612
– volume: 52
  start-page: 371
  year: 2020
  ident: ref_188
  article-title: An analysis of anti-forensic capabilities of B-tree file system (Btrfs)
  publication-title: Aust. J. Forensic Sci.
  doi: 10.1080/00450618.2018.1533038
– ident: ref_215
  doi: 10.1109/BWCCA.2010.85
– ident: ref_91
  doi: 10.1109/ISSPIT.2016.7886024
– volume: 10
  start-page: S105
  year: 2013
  ident: ref_159
  article-title: Anti-forensic resilient memory acquisition
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2013.06.012
– volume: 12888
  start-page: 759
  year: 2021
  ident: ref_109
  article-title: Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-030-87355-4_63
– ident: ref_16
  doi: 10.1109/LISAT.2019.8816826
– volume: 10082
  start-page: 3
  year: 2017
  ident: ref_22
  article-title: A multi-purpose image counter-anti-forensic method using convolutional neural networks
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-319-53465-7_1
– ident: ref_225
  doi: 10.4018/978-1-4666-1879-4.ch013
– ident: ref_202
– ident: ref_52
– ident: ref_40
  doi: 10.1109/ICASSP.2012.6288237
– ident: ref_76
  doi: 10.1109/ICASSP.2010.5495491
– volume: 6
  start-page: 28
  year: 2014
  ident: ref_168
  article-title: Attack graph analysis for network anti-forensics
  publication-title: Int. J. Digit. Crime Forensics
  doi: 10.4018/ijdcf.2014010103
– volume: 10
  start-page: 300
  year: 2013
  ident: ref_210
  article-title: Determining removal of forensic artefacts using the USN change journal
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2013.10.002
– volume: 7692
  start-page: 16
  year: 2013
  ident: ref_34
  article-title: Robustness of color interpolation identification against anti-forensic operations
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-36373-3_2
– ident: ref_89
  doi: 10.1109/ICIP.2010.5652553
– volume: 14
  start-page: 2385
  year: 2020
  ident: ref_157
  article-title: A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment—All Databases
  publication-title: Peer-to-Peer Netw. Appl.
  doi: 10.1007/s12083-020-00975-6
– ident: ref_184
  doi: 10.1145/1982185.1982227
– ident: ref_33
  doi: 10.1117/12.2039569
– volume: 7128
  start-page: 411
  year: 2012
  ident: ref_83
  article-title: Anti-forensics of double JPEG compression detection
  publication-title: Lect. Notes Comput. Sci.
  doi: 10.1007/978-3-642-32205-1_33
– volume: 14
  start-page: 1194
  year: 2019
  ident: ref_75
  article-title: Counter JPEG anti-forensic approach based on the second-order statistical analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2871751
– volume: 23
  start-page: 212
  year: 2016
  ident: ref_25
  article-title: ACE-An effective anti-forensic contrast enhancement technique
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2015.2509477
– volume: 146
  start-page: 15
  year: 2021
  ident: ref_51
  article-title: Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/j.patrec.2021.03.009
– ident: ref_74
  doi: 10.1109/ICECDS.2017.8389944
– volume: 65
  start-page: 35
  year: 2017
  ident: ref_55
  article-title: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2016.12.010
– ident: ref_69
  doi: 10.1109/NTICT.2017.7976108
– volume: 2007
  start-page: 18
  year: 2007
  ident: ref_145
  article-title: A tour through the realm of anti-forensics
  publication-title: Comput. Fraud Secur.
– volume: 2008
  start-page: 18
  year: 2008
  ident: ref_226
  article-title: Dealing with forensic software vulnerabilities: Is anti-forensics a real danger?
  publication-title: Netw. Secur.
– volume: 328
  start-page: 111040
  year: 2021
  ident: ref_81
  article-title: An approach to expose dithering-based JPEG anti-forensics
  publication-title: Forensic Sci. Int.
  doi: 10.1016/j.forsciint.2021.111040
– volume: 32
  start-page: 300920
  year: 2020
  ident: ref_185
  article-title: Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability
  publication-title: Forensic Sci. Int. Digit. Investig.
– volume: 8
  start-page: 2073
  year: 2013
  ident: ref_132
  article-title: Anti-forensics and countermeasures of electrical network frequency analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2285515
– volume: 532
  start-page: 87
  year: 2018
  ident: ref_186
  article-title: Anti-forensic capacity and detection rating of hidden data in the ext4 filesystem
  publication-title: IFIP Adv. Inf. Commun. Technol.
– ident: ref_80
  doi: 10.1109/ICASSP.2013.6638221
– volume: 569
  start-page: 159
  year: 2019
  ident: ref_187
  article-title: Analyzing Windows Subsystem for Linux metadata to detect timestamp forgery
  publication-title: IFIP Adv. Inf. Commun. Technol.
– ident: ref_60
  doi: 10.1109/ChinaSIP.2015.7230449
– ident: ref_121
  doi: 10.1117/12.2182457
– volume: 57
  start-page: 1
  year: 2014
  ident: ref_24
  article-title: Attacking contrast enhancement forensics in digital images
  publication-title: Sci. China Inf. Sci.
– ident: ref_62
  doi: 10.1109/ICASSP.2013.6638217
– volume: 2020
  start-page: 14
  year: 2020
  ident: ref_17
  article-title: File system anti-forensics–types, techniques and tools
  publication-title: Comput. Fraud. Secur.
  doi: 10.1016/S1361-3723(20)30030-0
– ident: ref_112
  doi: 10.1145/2905055.2905134
– ident: ref_44
  doi: 10.1109/ICIP.2017.8296534
– volume: 28
  start-page: 56
  year: 2019
  ident: ref_3
  article-title: Freiling. A universal taxonomy and survey of forensic memory acquisition techniques
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2019.01.001
– ident: ref_222
  doi: 10.1145/1980822.1980836
– ident: ref_65
  doi: 10.1109/WIFS.2016.7823571
– ident: ref_214
  doi: 10.1109/ICCIC.2013.6724230
SSID ssj0000913810
Score 2.3253195
SecondaryResourceType review_article
Snippet The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 5302
SubjectTerms Analysis
Bibliographic data bases
Case studies
Classification
computer anti-forensic
computer forensic
Computer forensics
Computer hackers
computer security
Computers
Cyberterrorism
Forensic sciences
Fugitives
Software
Systematic review
Taxonomy
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3NS8MwFMCD7KQHcX5gdUoPAz-guOajbbxNcQxBL26wW3hJUxCkiqv_vy9pOnpQvHjpIeSQvtf3lSa_R8i49Fi0QiamkFigZNQmoAt3BKqQljIrpIfpPD1n8yV_XIlVr9WXOxPW4oFbwd1IPrElLw2j0nAKAJqDsVBUaQY46AsfjHm9Ysr7YJk6dFV7IY9hXe_-B6ccozkLGyhdCPKk_t_8sQ8ysz2yG7LDeNquaki2bL1PdnrMwH0yDNa4ji8DMvrqgPCXDZA5bnf7b-Np3bwmrvNmjYqIu-4N8aKDtq4PyXL2sLifJ6EfQmL4hDVJWVVgWSEoSsNCjoOa4xMtTJRQguPcMDaxBWeG0koaWxVZKXJrAJO21HJ2RAb1e22PSay5NMAoY1porgVAmlYY61MLLM-NFRG57kSkTICFu54VbwqLBidP1ZNnRMabyR8tI-PnaXdO1pspDmztB1DdKqhb_aXuiFw4TSlnfrggA-EWAb6WA1mpaS6xoswx8YjIqFOmCna5VujR0IFRTHpP_mM1p2SbYpLTHh0bkUHz-WXPMElp9Ln_Hr8B3QrkQw
  priority: 102
  providerName: Directory of Open Access Journals
Title Systematic Review: Anti-Forensic Computer Techniques
URI https://www.proquest.com/docview/3072252977
https://doaj.org/article/940ed4dc329c42aaab4acea8f16ac321
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFH_ovOhBnB84naMHwQ8orkm6Jl5kinMIDvEDvIXXNBVBurnN_9-XNp0e1EsPaQ7J-34vye8BHGYlLJpUoZGKEpQesyGm0l2BksoybmNVguncjXrDZ3H7Er_4gtvMX6usbWJpqLOxcTXyM5JFEj1G4crF5CN0XaPc6apvobEMK2SCJSVfK5fXo_uHRZXFoV7KqFs9zOOU37tz4UiQV-e-kFK7ohKx_y-7XDqbwQas-ygx6FdsbcKSLTZh7Qd24CY0vVbOgmMPHX2yBeJxAcwcVFX_86BfzN9C14GzIIYEdReH4KkGb51tw_Pg-ulqGPq-CKERXT4PszxHy2XMMsMtJjSYCvqSpsUZZujwbjjvWim4YSxXxuayl8WJNUjBW2QF34FGMS7sLgSpUAY54zyNU5HGiFGUk8-PLPIkMTZuwWlNIm08aLjrXfGuKXlw9NQ_6NmCw8XkSYWV8fu0S0frxRQHcF0OjKev2uuLVqJrM0EbZMoIhoipQGNR5lEPaTBqwZHjlHZqSAsy6F8T0LYcoJXuJ4oyy4QCkBa0a2Zqr58z_S1Ne___3odVRmFMdTmsDY359NMeUBgyTzuwLAc3HS9xnTKZ_wJuyt2f
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOFS0glhbIoYiHFLGxnY2NhNDyWLb0cWEr9WYmzgQhoWzb3Qrxp_iNzCTO0gNw6yUH24qSmc_2N358A7BbtbJo1qXBOg5QRopSLK0cgbKOlKbctWI6h0ej6bH5dJKfrMGv_i6MHKvsx8R2oK7mQdbIXzIWGXqK6cqb07NUskbJ7mqfQqODxT79_MEh2-L13nv27xOlJh9m76ZpzCqQBjPUy7SqayRtc1UFTVhwYWn4yTjNK6xQ1GI4xidrdFCqdoFqO6ryggIy9cnIaH7vNbhutHbSo-zk42pNRzQ2bTbsrgFy_VB2oTPDHELHZZt-4mvzA_xrFmintslt2IicNBl3INqENWq24NYlpcIt2IxjwCJ5FoWqn98B83klA510ewyvknGz_JZKvs-G3Z_0OSOSWS8Vu7gLx1dir3uw3swbug9JaVxArbQu89KUOWKW1cwwMkJdFIHyAbzoTeRDlCiXTBnfPYcqYk9_yZ4D2F01Pu2UOf7e7K3YetVE5LTbgvn5Vx97p3dmSJXhH1QuGIWIpcFAaOtshFyYDeCpeMpLp-cPChjvLvBviXyWHxeO49iC6c4Adnpn-jgaLPwf7D74f_VjuDGdHR74g72j_W24qZhAdcfSdmB9eX5BD5kALctHLeoS-HLVMP8Nr8oYWQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VrYToAdEC6kKhORQVkKImtrOxkRDafqz6AasKWqk3d-JMqkooW7qLEH-NX8c4cbY9UG695OBYUTJ-Gb-xx28ANspGFk2b2GnDAcpAUIyF9ilQ2pCQlJlGTOfLeLB_qg7PsrMF-NOdhfFplZ1PbBx1OXF-jXyLscjQE0xXtqqQFnG8O_p09SP2FaT8TmtXTqOFyBH9_sXh2_TjwS6P9RshRnsnO_txqDAQO5XIWVxWFZLUmSidJMy5sVB8ZcxmJZbolWM43ietpBOiMo4qPSiznBwyDUpJSX7uA1jMOSpKerC4vTc-_jpf4fGKmzpN2kOBUprE70mnihmFDIs43TTYVAu4a05oJrrRE3gcGGo0bCG1DAtUr8DSLd3CFVgOHmEavQ2y1e-egvo2F4WO2h2HD9Gwnl3GvvpnzWCIugoS0UknHDt9Bqf3YrHn0KsnNa1CVCjjUAopi6xQRYaYphXzjZRQ5rmjrA_vOxNZFwTLfd2M75YDF29Pe8uefdiYd75qdTr-3W3b23rexYtrNw2T6wsb_lVrVEKl4g8UximBiIVCR6irdIDcmPZh04-U9S6AX8hhOMnAn-XFtOwwNxzV5kx--rDWDaYNvmFqb5D84v-31-EhQ9x-PhgfvYRHgtlUm6O2Br3Z9U96xWxoVrwOsIvg_L6R_hc-Th3r
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Systematic+Review%3A+Anti-Forensic+Computer+Techniques&rft.jtitle=Applied+sciences&rft.au=Gonz%C3%A1lez+Arias%2C+Rafael&rft.au=Bermejo+Higuera%2C+Javier&rft.au=Rainer+Granados%2C+J.+Javier&rft.au=Bermejo+Higuera%2C+Juan+Ram%C3%B3n&rft.date=2024-06-01&rft.pub=MDPI+AG&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=14&rft.issue=12&rft_id=info:doi/10.3390%2Fapp14125302&rft.externalDocID=A799247242
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon