Systematic Review: Anti-Forensic Computer Techniques
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated,...
Saved in:
Published in | Applied sciences Vol. 14; no. 12; p. 5302 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.06.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2076-3417 2076-3417 |
DOI | 10.3390/app14125302 |
Cover
Loading…
Abstract | The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art. |
---|---|
AbstractList | The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art. |
Audience | Academic |
Author | Bermejo Higuera, Javier Rainer Granados, J. Javier Sicilia Montalvo, Juan Antonio Bermejo Higuera, Juan Ramón González Arias, Rafael |
Author_xml | – sequence: 1 givenname: Rafael surname: González Arias fullname: González Arias, Rafael – sequence: 2 givenname: Javier orcidid: 0000-0003-3681-2572 surname: Bermejo Higuera fullname: Bermejo Higuera, Javier – sequence: 3 givenname: J. Javier surname: Rainer Granados fullname: Rainer Granados, J. Javier – sequence: 4 givenname: Juan Ramón orcidid: 0000-0002-0197-8663 surname: Bermejo Higuera fullname: Bermejo Higuera, Juan Ramón – sequence: 5 givenname: Juan Antonio orcidid: 0000-0002-5962-4147 surname: Sicilia Montalvo fullname: Sicilia Montalvo, Juan Antonio |
BookMark | eNptUV1LAzEQDKLgV5_8AwUf5TRfd7n4VopVQRC0Poc1t9GU9nLmror_3tWKiJhAEoaZ2cnuPttuU4uMHQl-qpTlZ9B1QgtZKi632J7kpiqUFmb713uXjfp-wWlZoWrB95i-f-8HXMEQ_fgOXyO-nY8n7RCLWcrY9oRO06pbD5jHc_TPbXxZY3_IdgIsexx93wfsYXYxn14VN7eX19PJTeE1V0PRhACo6lI2XiEYAh81ncaqsoEGbGUrpTjWWnkpg_UY6qopDXqoykqgVgfseuPbJFi4LscV5HeXILovIOUnB5mSL9FZzbHRVEharyUAPGrwCHUQFRAoyOt449Xl9PmHwS3SOrcU3ylupCylNYZYpxvWE5BpbEMaMnjaDa6ip36HSPjEWCu1kVqS4GQj8Dn1fcbwE1Nw9zkW92ssxBZ_2D4O1PvUUpm4_FfzAfpekLM |
CitedBy_id | crossref_primary_10_1016_j_fsidi_2025_301884 |
Cites_doi | 10.1109/TLA.2012.6222582 10.4018/jdcf.2013070104 10.1016/S1361-3723(07)70023-4 10.1016/j.diin.2016.04.004 10.1109/ICASSP.2013.6638215 10.1109/TIFS.2015.2398362 10.1007/s11042-020-09974-4 10.1007/s11042-014-1927-0 10.1007/s11554-019-00865-y 10.1109/TIFS.2014.2317949 10.1007/s11042-018-6170-7 10.1109/CTEMS.2018.8769121 10.1016/j.iot.2022.100544 10.1109/FGCN.2007.21 10.1109/HICSS.2012.452 10.1007/s11042-019-08599-6 10.1016/B978-0-12-811373-8.00012-4 10.1109/TCSVT.2022.3207310 10.4304/jcp.8.10.2483-2488 10.1016/j.image.2018.07.011 10.1109/ICASSP.2011.5946874 10.14419/ijet.v7i2.7.12230 10.1109/ACCESS.2020.3048246 10.1109/INDICON45594.2018.8987032 10.1109/IC3.2014.6897209 10.1109/CCAA.2016.7813913 10.1016/j.image.2018.02.001 10.1016/j.jss.2013.12.043 10.1109/ICIP.2018.8451503 10.1007/s11036-019-01255-1 10.1109/TCSVT.2022.3177238 10.1145/1854229.1854237 10.1016/B978-0-12-803340-1.00007-0 10.1109/ISCO.2013.6481171 10.1109/TIFS.2016.2543205 10.1007/978-3-642-32205-1_32 10.1109/GC-ElecEng52322.2021.9788230 10.1109/EUSIPCO.2015.7362749 10.23919/EUSIPCO.2018.8553259 10.1016/B978-1-59-749743-5.00010-9 10.1109/ACCESS.2021.3052353 10.1007/s11042-018-7073-3 10.1109/ICIP.2015.7351474 10.1109/IMF.2013.17 10.1145/3082031.3083242 10.1109/LSP.2015.2472561 10.1109/ICASSP.2013.6638220 10.1016/j.infsof.2013.07.010 10.1186/s42400-019-0043-x 10.1016/j.jvcir.2015.02.006 10.1109/TMM.2021.3098422 10.1016/j.diin.2005.04.002 10.1109/JSAC.2011.110806 10.1007/s11042-022-12448-4 10.1109/IS3C.2012.53 10.1109/BWCCA.2011.64 10.1109/IJCNN55064.2022.9892357 10.1007/s11042-019-7734-x 10.1109/ACCESS.2022.3190957 10.1504/IJAHUC.2015.067788 10.1109/ICPCSI.2017.8391771 10.1007/s11432-016-0426-1 10.1109/IDAP.2017.8090341 10.1117/1.JEI.29.4.043026 10.1016/j.scijus.2020.10.002 10.4018/jisp.2008040101 10.1109/MMSP.2013.6659339 10.1016/j.diin.2018.01.014 10.1016/j.jvcir.2019.102682 10.1109/ICDCSW.2012.33 10.1007/978-3-030-95398-0_6 10.1007/978-3-030-43575-2_12 10.1109/ACCESS.2019.2960097 10.1109/ICIP.2011.6115854 10.1504/IJESDF.2017.083992 10.1016/j.diin.2007.01.005 10.1016/j.diin.2016.04.006 10.1109/ICCNC.2013.6504159 10.1109/ISDFS49300.2020.9116192 10.1016/B978-0-12-804449-0.00007-5 10.1145/1413140.1413166 10.1145/3384544.3384571 10.1016/S1361-3723(10)70112-3 10.1109/APSIPAASC47483.2019.9023173 10.1016/j.scijus.2019.06.004 10.1109/HICSS.2014.593 10.1049/iet-ipr.2018.6587 10.1109/TCSVT.2016.2599849 10.1016/j.cose.2020.102083 10.1007/978-3-642-40099-5_29 10.1145/2482513.2482536 10.1111/1556-4029.12618 10.1109/IMF.2018.00014 10.4018/IJDCF.2020070104 10.1007/978-981-19-2719-5_47 10.1109/ICPR.2014.126 10.1007/s11045-019-00637-8 10.1109/ICASSP.2014.6854092 10.1109/ICASSP.2013.6638219 10.1109/ICASSP.2014.6854091 10.1007/s11042-015-2762-7 10.1109/HUMANCOM.2010.5563320 10.1109/ISCTURKEY56345.2022.9931816 10.1007/s11416-014-0221-z 10.1007/978-3-031-08530-7_44 10.3390/fi13110288 10.35940/ijitee.A1037.0881019 10.1080/13682199.2017.1389832 10.1109/ICNIDC.2016.7974588 10.1109/ICCCI.2013.6466109 10.1016/B978-0-12-801635-0.00006-1 10.1109/WorldCIS.2015.7359431 10.1007/978-981-19-1012-8_11 10.1109/TCSVT.2021.3068294 10.1016/j.forsciint.2017.06.003 10.1109/WDFIA.2008.13 10.1109/TMM.2019.2959443 10.1109/BWCCA.2014.83 10.1016/j.diin.2006.06.005 10.1111/1556-4029.13393 10.1109/ISDFS49300.2020.9116399 10.1109/TIFS.2011.2119314 10.1109/IS.2016.7737401 10.1109/CSNT.2014.187 10.1007/978-981-16-7621-5_17 10.1007/978-3-319-24075-6_10 10.1007/978-3-319-74107-9_8 10.1016/j.infsof.2008.09.009 10.1109/TIP.2015.2390137 10.1109/ISDFS49300.2020.9116375 10.1109/APMediaCast.2016.7878175 10.1109/ICIP.2013.6738920 10.13052/jcsm2245-1439.831 10.14257/jse.2014.12.05 10.1016/j.diin.2016.06.003 10.1109/SISY.2018.8524756 10.1109/IRI.2016.94 10.1109/APSIPA.2013.6694156 10.1109/IAdCC.2014.6779481 10.1109/CSE-EUC.2017.45 10.23919/MIPRO.2017.7973612 10.1080/00450618.2018.1533038 10.1109/BWCCA.2010.85 10.1109/ISSPIT.2016.7886024 10.1016/j.diin.2013.06.012 10.1007/978-3-030-87355-4_63 10.1109/LISAT.2019.8816826 10.1007/978-3-319-53465-7_1 10.4018/978-1-4666-1879-4.ch013 10.1109/ICASSP.2012.6288237 10.1109/ICASSP.2010.5495491 10.4018/ijdcf.2014010103 10.1016/j.diin.2013.10.002 10.1007/978-3-642-36373-3_2 10.1109/ICIP.2010.5652553 10.1007/s12083-020-00975-6 10.1145/1982185.1982227 10.1117/12.2039569 10.1007/978-3-642-32205-1_33 10.1109/TIFS.2018.2871751 10.1109/LSP.2015.2509477 10.1016/j.patrec.2021.03.009 10.1109/ICECDS.2017.8389944 10.1016/j.patcog.2016.12.010 10.1109/NTICT.2017.7976108 10.1016/j.forsciint.2021.111040 10.1109/TIFS.2013.2285515 10.1109/ICASSP.2013.6638221 10.1109/ChinaSIP.2015.7230449 10.1117/12.2182457 10.1109/ICASSP.2013.6638217 10.1016/S1361-3723(20)30030-0 10.1145/2905055.2905134 10.1109/ICIP.2017.8296534 10.1016/j.diin.2019.01.001 10.1145/1980822.1980836 10.1109/WIFS.2016.7823571 10.1109/ICCIC.2013.6724230 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI DOA |
DOI | 10.3390/app14125302 |
DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest Central ProQuest One Academic Middle East (New) ProQuest One Academic UKI Edition ProQuest Central Essentials ProQuest Central Korea ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2076-3417 |
ExternalDocumentID | oai_doaj_org_article_940ed4dc329c42aaab4acea8f16ac321 A799247242 10_3390_app14125302 |
GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS PMFND ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PUEGO |
ID | FETCH-LOGICAL-c403t-dffae3852dc3ea7c40b47c47935dada9696330e843c22f9cef86d57eca6561e43 |
IEDL.DBID | BENPR |
ISSN | 2076-3417 |
IngestDate | Wed Aug 27 01:31:00 EDT 2025 Sun Jun 29 16:37:20 EDT 2025 Tue Jun 10 21:07:53 EDT 2025 Tue Jul 01 01:31:19 EDT 2025 Thu Apr 24 23:04:46 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c403t-dffae3852dc3ea7c40b47c47935dada9696330e843c22f9cef86d57eca6561e43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-0197-8663 0000-0003-3681-2572 0000-0002-5962-4147 |
OpenAccessLink | https://www.proquest.com/docview/3072252977?pq-origsite=%requestingapplication% |
PQID | 3072252977 |
PQPubID | 2032433 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_940ed4dc329c42aaab4acea8f16ac321 proquest_journals_3072252977 gale_infotracacademiconefile_A799247242 crossref_primary_10_3390_app14125302 crossref_citationtrail_10_3390_app14125302 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-06-01 |
PublicationDateYYYYMMDD | 2024-06-01 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Applied sciences |
PublicationYear | 2024 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | ref_139 Ding (ref_143) 2011; 56 ref_91 ref_90 ref_130 Vadlamudi (ref_152) 2018; 7 Singh (ref_75) 2019; 14 ref_97 ref_96 ref_135 ref_95 (ref_146) 2010; 2010 Ahn (ref_165) 2021; 9 Kang (ref_42) 2016; 75 Palmbach (ref_185) 2020; 32 ref_125 Zhang (ref_48) 2022; 33 Li (ref_92) 2015; 22 Kitchenham (ref_7) 2013; 55 Beebe (ref_13) 2005; 2 ref_120 Peng (ref_49) 2022; 32 Fan (ref_79) 2014; 9 ref_121 ref_124 Su (ref_41) 2015; 29 ref_123 Amritha (ref_138) 2019; 8 Peng (ref_58) 2013; 7809 (ref_14) 2017; 9 Cao (ref_24) 2014; 57 ref_72 Wu (ref_110) 2021; 100 ref_71 Liu (ref_55) 2017; 65 ref_70 ref_151 ref_150 Wani (ref_188) 2020; 52 ref_78 ref_153 Horsman (ref_193) 2019; 59 ref_77 ref_76 ref_154 ref_74 ref_73 Fan (ref_67) 2015; 10 Shen (ref_36) 2020; 12022 ref_148 ref_147 ref_80 ref_149 Singh (ref_88) 2017; 277 Cao (ref_99) 2015; 60 ref_89 ref_142 ref_141 ref_144 Eschweiler (ref_160) 2012; 318 Bhardwaj (ref_57) 2018; 68 ref_85 Ding (ref_47) 2022; 24 Lu (ref_35) 2013; 5 Chuang (ref_34) 2013; 7692 Jahankhani (ref_158) 2008; 2 He (ref_117) 2022; 27 Cohen (ref_159) 2013; 10 Choo (ref_172) 2017; 62 ref_214 ref_213 Dong (ref_31) 2017; 35 ref_216 ref_215 Hoelz (ref_11) 2017; 511 Forte (ref_145) 2007; 2007 ref_219 ref_212 ref_211 Sitara (ref_37) 2016; 18 Das (ref_100) 2018; 77 Lees (ref_210) 2013; 10 Harris (ref_12) 2006; 3 Huang (ref_109) 2021; 12888 Sanda (ref_179) 2022; 303 ref_202 ref_205 ref_204 Kwok (ref_27) 2012; 7128 ref_207 ref_208 Zeng (ref_102) 2018; 61 ref_201 Moon (ref_134) 2022; 436 Ratcliffe (ref_217) 2022; 13343 Xie (ref_118) 2022; 32 ref_115 ref_114 Kumar (ref_113) 2020; 79 ref_116 ref_119 Forte (ref_226) 2008; 2008 ref_111 Chandran (ref_168) 2014; 6 ref_112 Kitchenham (ref_6) 2009; 51 Chuang (ref_132) 2013; 8 Cao (ref_32) 2015; 9314 Qian (ref_93) 2013; 8 Liu (ref_129) 2022; 81 ref_225 ref_224 ref_105 Bhat (ref_194) 2021; 61 ref_107 Zou (ref_29) 2021; 2021 ref_221 ref_220 ref_223 ref_101 ref_222 Wang (ref_126) 2022; 13180 Dou (ref_122) 2020; 29 Li (ref_20) 2018; 28 ref_10 Peng (ref_63) 2016; 39 Sang (ref_182) 2017; 9 ref_18 ref_16 ref_15 Berghel (ref_200) 2007; 50 Qian (ref_82) 2014; 91 Cifuentes (ref_180) 2012; 10 Sun (ref_30) 2018; 63 Latzo (ref_3) 2019; 28 Bhardwaj (ref_81) 2021; 328 ref_23 Hilley (ref_209) 2007; 4 Qureshi (ref_21) 2019; 13 Peng (ref_54) 2020; 22 Chen (ref_137) 2015; 18 Gupta (ref_140) 2014; 132 ref_28 Moon (ref_133) 2021; 14 Yu (ref_22) 2017; 10082 Palutke (ref_4) 2020; 33 Ahn (ref_161) 2022; 10 Chu (ref_84) 2015; 24 Sun (ref_136) 2011; 29 Tao (ref_128) 2020; 12 Li (ref_106) 2019; 78 Singh (ref_187) 2019; 569 Li (ref_108) 2015; 74 Wani (ref_17) 2020; 2020 Pajek (ref_2) 2009; 45 Sudhakar (ref_19) 2020; 3 ref_50 Mohiddin (ref_156) 2019; 8 Li (ref_131) 2019; 7 ref_173 Stamm (ref_104) 2011; 6 ref_56 ref_175 ref_174 ref_177 ref_53 ref_176 ref_52 Sheng (ref_103) 2014; 6 ref_178 Kumar (ref_94) 2019; 78 ref_181 Agarwal (ref_218) 2018; 529 ref_61 ref_60 ref_169 Sutthiwan (ref_83) 2012; 7128 Yaacoub (ref_170) 2022; 19 ref_69 ref_162 ref_68 ref_164 ref_66 ref_163 Sang (ref_183) 2016; 8 ref_65 Singh (ref_64) 2019; 30 ref_62 ref_167 Bharathiraja (ref_26) 2019; 24 Yao (ref_46) 2019; 16 ref_171 Kumar (ref_87) 2020; 9 Shelke (ref_38) 2021; 80 Bhardwaj (ref_98) 2018; 841 Sharma (ref_59) 2020; 66 ref_195 Cho (ref_206) 2015; 11 ref_197 ref_33 ref_196 ref_199 ref_198 Conlan (ref_8) 2016; 18 Shelke (ref_86) 2018; 66 Patil (ref_155) 2013; 377 ref_39 Zhao (ref_127) 2016; 11 Baier (ref_186) 2018; 532 Rani (ref_157) 2020; 14 ref_184 ref_45 ref_44 ref_43 Bonetti (ref_166) 2014; 10 Wang (ref_51) 2021; 146 ref_40 ref_189 ref_1 Shin (ref_203) 2014; 11 ref_191 ref_190 ref_192 ref_9 ref_5 Ravi (ref_25) 2016; 23 |
References_xml | – ident: ref_9 – volume: 10 start-page: 1757 year: 2012 ident: ref_180 article-title: Analysis and implementation of anti-forensics techniques on ZFS publication-title: IEEE Lat. Am. Trans. doi: 10.1109/TLA.2012.6222582 – volume: 5 start-page: 53 year: 2013 ident: ref_35 article-title: Anti-forensics for unsharp masking sharpening in digital images publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/jdcf.2013070104 – ident: ref_191 doi: 10.1016/S1361-3723(07)70023-4 – ident: ref_190 doi: 10.1016/j.diin.2016.04.004 – ident: ref_39 doi: 10.1109/ICASSP.2013.6638215 – volume: 10 start-page: 1076 year: 2015 ident: ref_67 article-title: Median filtered image quality enhancement and anti-forensics via variational deconvolution publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2398362 – volume: 80 start-page: 6247 year: 2021 ident: ref_38 article-title: A comprehensive survey on passive techniques for digital video forgery detection publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09974-4 – volume: 74 start-page: 6729 year: 2015 ident: ref_108 article-title: Anti-forensics of double JPEG compression with the same quantization matrix publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-014-1927-0 – volume: 16 start-page: 751 year: 2019 ident: ref_46 article-title: An approach to detect video frame deletion under anti-forensics publication-title: J. Real-Time Image Process. doi: 10.1007/s11554-019-00865-y – volume: 9 start-page: 1211 year: 2014 ident: ref_79 article-title: JPEG anti-forensics with an improved tradeoff between forensic undetectability and image quality publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2317949 – volume: 377 start-page: 162 year: 2013 ident: ref_155 article-title: A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation publication-title: Commun. Comput. Inf. Sci. – volume: 529 start-page: 216 year: 2018 ident: ref_218 article-title: Anti-forensic = suspicious: Detection of stealthy malware that hides its network traffic publication-title: IFIP Adv. Inf. Commun. Technol. – volume: 77 start-page: 31835 year: 2018 ident: ref_100 article-title: Anti-forensics of JPEG compression detection schemes using an approximation of DCT coefficients publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6170-7 – ident: ref_119 doi: 10.1109/CTEMS.2018.8769121 – volume: 19 start-page: 100544 year: 2022 ident: ref_170 article-title: Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations publication-title: Internet Things doi: 10.1016/j.iot.2022.100544 – volume: 33 start-page: 301012 year: 2020 ident: ref_4 article-title: Hiding Process Memory Via Anti-Forensic Techniques publication-title: Forensic Sci. Int. Digit. Investig. – ident: ref_114 – ident: ref_149 doi: 10.1109/FGCN.2007.21 – volume: 27 start-page: 88 year: 2022 ident: ref_117 article-title: Overview of passive forensics and anti-forensics techniques for GAN-generated image publication-title: J. Image Graph. – ident: ref_173 doi: 10.1109/HICSS.2012.452 – volume: 79 start-page: 8061 year: 2020 ident: ref_113 article-title: Anti-forensic approach for JPEG compressed images with enhanced image quality and forensic undetectability publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-08599-6 – ident: ref_175 doi: 10.1016/B978-0-12-811373-8.00012-4 – volume: 33 start-page: 661 year: 2022 ident: ref_48 article-title: A Local Perturbation Generation Method for GAN-generated Face Anti-forensics publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2022.3207310 – volume: 8 start-page: 2483 year: 2013 ident: ref_93 article-title: Simplified anti-forensics of JPEG compression publication-title: J. Comput. doi: 10.4304/jcp.8.10.2483-2488 – volume: 132 start-page: 247 year: 2014 ident: ref_140 article-title: Mozilla firefox browsing artefacts in 3 different anti-forensics modes publication-title: Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. – volume: 68 start-page: 155 year: 2018 ident: ref_57 article-title: A JPEG blocking artefact detector for image forensics publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2018.07.011 – volume: 511 start-page: 169 year: 2017 ident: ref_11 article-title: Anti-forensic threat modelling publication-title: IFIP Adv. Inf. Commun. Technol. – ident: ref_101 doi: 10.1109/ICASSP.2011.5946874 – volume: 318 start-page: 289 year: 2012 ident: ref_160 article-title: Towards sound forensic acquisition of volatile data publication-title: Commun. Comput. Inf. Sci. – volume: 7 start-page: 1072 year: 2018 ident: ref_152 article-title: Analysis on Digital Forensics Challenges and Anti-Forensics Techniques in Cloud Computing publication-title: Int. J. Eng. Technol. doi: 10.14419/ijet.v7i2.7.12230 – volume: 9 start-page: 4364 year: 2020 ident: ref_87 article-title: Digital image forensic approach to counter the JPEG anti-forensic attacks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3048246 – ident: ref_111 doi: 10.1109/INDICON45594.2018.8987032 – ident: ref_199 doi: 10.1109/IC3.2014.6897209 – ident: ref_153 doi: 10.1109/CCAA.2016.7813913 – volume: 63 start-page: 149 year: 2018 ident: ref_30 article-title: A novel contrast enhancement forensics based on convolutional neural networks publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2018.02.001 – volume: 91 start-page: 100 year: 2014 ident: ref_82 article-title: Improved anti-forensics of JPEG compression publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2013.12.043 – ident: ref_45 doi: 10.1109/ICIP.2018.8451503 – ident: ref_177 – volume: 24 start-page: 1174 year: 2019 ident: ref_26 article-title: Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram publication-title: Mob. Netw. Appl. doi: 10.1007/s11036-019-01255-1 – ident: ref_148 – volume: 32 start-page: 6657 year: 2022 ident: ref_49 article-title: BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2022.3177238 – ident: ref_61 doi: 10.1145/1854229.1854237 – ident: ref_201 doi: 10.1016/B978-0-12-803340-1.00007-0 – ident: ref_205 – ident: ref_78 doi: 10.1109/ISCO.2013.6481171 – volume: 11 start-page: 1603 year: 2016 ident: ref_127 article-title: Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2543205 – volume: 7128 start-page: 398 year: 2012 ident: ref_27 article-title: Alternative anti-forensics method for contrast enhancement publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-32205-1_32 – ident: ref_204 doi: 10.1109/GC-ElecEng52322.2021.9788230 – ident: ref_130 doi: 10.1109/EUSIPCO.2015.7362749 – ident: ref_56 doi: 10.23919/EUSIPCO.2018.8553259 – ident: ref_150 doi: 10.1016/B978-1-59-749743-5.00010-9 – volume: 9 start-page: 14130 year: 2021 ident: ref_165 article-title: Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3052353 – volume: 78 start-page: 8577 year: 2019 ident: ref_106 article-title: Detecting double JPEG compression and its related anti-forensic operations with CNN publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-7073-3 – ident: ref_116 doi: 10.1109/ICIP.2015.7351474 – ident: ref_192 doi: 10.1109/IMF.2013.17 – ident: ref_120 doi: 10.1145/3082031.3083242 – volume: 22 start-page: 2219 year: 2015 ident: ref_92 article-title: Anti-Forensics of Lossy Predictive Image Compression publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2015.2472561 – ident: ref_95 doi: 10.1109/ICASSP.2013.6638220 – volume: 55 start-page: 2049 year: 2013 ident: ref_7 article-title: A Systematic Review of Systematic Review Process Research in Software Engineering publication-title: Manuscr. Publ. Inf. Softw. Technol. doi: 10.1016/j.infsof.2013.07.010 – volume: 3 start-page: 1 year: 2020 ident: ref_19 article-title: An emerging threat Fileless malware: A survey and research challenges publication-title: Cybersecurity doi: 10.1186/s42400-019-0043-x – volume: 29 start-page: 103 year: 2015 ident: ref_41 article-title: Forensic and anti-forensic techniques for video shot editing in H.264/AVC publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2015.02.006 – volume: 24 start-page: 3429 year: 2022 ident: ref_47 article-title: Anti-Forensics for Face Swapping Videos via Adversarial Training publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2021.3098422 – volume: 2 start-page: 147 year: 2005 ident: ref_13 article-title: A hierarchical, objectives-based framework for the digital investigations process publication-title: Digit. Investig. doi: 10.1016/j.diin.2005.04.002 – volume: 29 start-page: 1392 year: 2011 ident: ref_136 article-title: Anti-forensics with steganographic data embedding in digital images publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2011.110806 – volume: 81 start-page: 17155 year: 2022 ident: ref_129 article-title: Anti-forensics of fake stereo audio using generative adversarial network publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-022-12448-4 – ident: ref_139 doi: 10.1109/IS3C.2012.53 – ident: ref_141 doi: 10.1109/BWCCA.2011.64 – ident: ref_53 doi: 10.1109/IJCNN55064.2022.9892357 – ident: ref_151 – volume: 78 start-page: 25427 year: 2019 ident: ref_94 article-title: An improved anti-forensic technique for JPEG compression publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-7734-x – volume: 10 start-page: 74207 year: 2022 ident: ref_161 article-title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3190957 – volume: 18 start-page: 54 year: 2015 ident: ref_137 article-title: Anti-forensic steganography using multi-bit MER with flexible bit location publication-title: Int. J. Ad Hoc Ubiquitous Comput. doi: 10.1504/IJAHUC.2015.067788 – ident: ref_96 doi: 10.1109/ICPCSI.2017.8391771 – volume: 61 start-page: 032103 year: 2018 ident: ref_102 article-title: Countering JPEG anti-forensics based on noise level estimation publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-016-0426-1 – ident: ref_15 doi: 10.1109/IDAP.2017.8090341 – volume: 29 start-page: 043026 year: 2020 ident: ref_122 article-title: Anti-forensics of diffusion-based image inpainting publication-title: J. Electron. Imaging doi: 10.1117/1.JEI.29.4.043026 – volume: 61 start-page: 198 year: 2021 ident: ref_194 article-title: Can computer forensic tools be trusted in digital investigations? publication-title: Sci. Justice doi: 10.1016/j.scijus.2020.10.002 – volume: 2 start-page: 1 year: 2008 ident: ref_158 article-title: Memory-Based Antiforensic Tools and Techniques publication-title: Int. J. Inf. Secur. Priv. doi: 10.4018/jisp.2008040101 – ident: ref_105 doi: 10.1109/MMSP.2013.6659339 – volume: 56 start-page: 241 year: 2011 ident: ref_143 article-title: Disguisable symmetric encryption schemes for an anti-forensics purpose publication-title: Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. – volume: 6 start-page: 22 year: 2014 ident: ref_103 article-title: An improved counter-forensic algorithm to erase the JPEG compression artifacts publication-title: Int. J. Mob. Comput. Multimed. Commun. – ident: ref_181 doi: 10.1016/j.diin.2018.01.014 – ident: ref_216 – volume: 66 start-page: 102682 year: 2020 ident: ref_59 article-title: Anti-forensics of median filtering and contrast enhancement publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2019.102682 – ident: ref_72 – ident: ref_219 doi: 10.1109/ICDCSW.2012.33 – volume: 13180 start-page: 72 year: 2022 ident: ref_126 article-title: Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-030-95398-0_6 – volume: 45 start-page: 145 year: 2009 ident: ref_2 article-title: Computer anti-forensics methods and their impact on computer forensic investigation publication-title: Commun. Comput. Inf. Sci. – volume: 12022 start-page: 150 year: 2020 ident: ref_36 article-title: Anti-forensics of Image Sharpening Using Generative Adversarial Network publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-030-43575-2_12 – volume: 7 start-page: 184332 year: 2019 ident: ref_131 article-title: Anti-Forensics of Audio Source Identification Using Generative Adversarial Network publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2960097 – ident: ref_77 doi: 10.1109/ICIP.2011.6115854 – volume: 9 start-page: 167 year: 2017 ident: ref_14 article-title: Forensic artefacts associated with intentionally deleted user accounts publication-title: Int. J. Electron. Secur. Digit. Forensics doi: 10.1504/IJESDF.2017.083992 – volume: 4 start-page: 13 year: 2007 ident: ref_209 article-title: Anti-forensics with a small army of exploits publication-title: Digit. Investig. doi: 10.1016/j.diin.2007.01.005 – volume: 39 start-page: 503 year: 2016 ident: ref_63 article-title: Median filtering forensics based on multi-directional difference of filtering residuals publication-title: JisuanjiXuebao/Chin. J. Comput. – volume: 35 start-page: 745 year: 2017 ident: ref_31 article-title: Contrast Enhancement Forensics Based on Modified Convolutional Neural Network publication-title: Yingyong Kexue Xuebao/J. Appl. Sci. – volume: 18 start-page: S66 year: 2016 ident: ref_8 article-title: Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy publication-title: Digit. Investig. doi: 10.1016/j.diin.2016.04.006 – ident: ref_144 doi: 10.1109/ICCNC.2013.6504159 – ident: ref_176 doi: 10.1109/ISDFS49300.2020.9116192 – ident: ref_10 doi: 10.1016/B978-0-12-804449-0.00007-5 – volume: 841 start-page: 190 year: 2018 ident: ref_98 article-title: A method for detecting JPEG anti-forensics publication-title: Commun. Comput. Inf. Sci. – ident: ref_167 – ident: ref_223 doi: 10.1145/1413140.1413166 – ident: ref_208 doi: 10.1145/3384544.3384571 – volume: 2010 start-page: 17 year: 2010 ident: ref_146 article-title: Fighting forensics publication-title: Comput. Fraud Secur. doi: 10.1016/S1361-3723(10)70112-3 – ident: ref_124 doi: 10.1109/APSIPAASC47483.2019.9023173 – volume: 59 start-page: 565 year: 2019 ident: ref_193 article-title: When finding nothing may be evidence of something: Anti-forensics and digital tool marks publication-title: Sci. Justice doi: 10.1016/j.scijus.2019.06.004 – ident: ref_195 – ident: ref_174 doi: 10.1109/HICSS.2014.593 – volume: 13 start-page: 1811 year: 2019 ident: ref_21 article-title: Bibliography of digital image anti-forensics and anti-anti-forensics techniques publication-title: IET Image Process. doi: 10.1049/iet-ipr.2018.6587 – volume: 2021 start-page: 1 year: 2021 ident: ref_29 article-title: Anti-forensics of image contrast enhancement based on generative adversarial network publication-title: Secur. Commun. Networks – ident: ref_221 – volume: 28 start-page: 31 year: 2018 ident: ref_20 article-title: Identification of Various Image Operations Using Residual-Based Features publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2016.2599849 – volume: 100 start-page: 102083 year: 2021 ident: ref_110 article-title: Towards multi-operation image anti-forensics with generative adversarial networks publication-title: Comput. Secur. doi: 10.1016/j.cose.2020.102083 – volume: 7809 start-page: 344 year: 2013 ident: ref_58 article-title: Robust median filtering detection based on filtered residual publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-40099-5_29 – ident: ref_97 doi: 10.1145/2482513.2482536 – ident: ref_68 – volume: 60 start-page: 197 year: 2015 ident: ref_99 article-title: A new anti-forensic scheme-hiding the single JPEG compression trace for a digital image publication-title: J. Forensic Sci. doi: 10.1111/1556-4029.12618 – ident: ref_154 doi: 10.1109/IMF.2018.00014 – volume: 12 start-page: 45 year: 2020 ident: ref_128 article-title: Anti-forensics of double compressed MP3 audio publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/IJDCF.2020070104 – volume: 303 start-page: 497 year: 2022 ident: ref_179 article-title: VM Anti-forensics: Detecting File Wiping Using File System Journals publication-title: Smart Innov. Syst. Technol. doi: 10.1007/978-981-19-2719-5_47 – ident: ref_198 – ident: ref_125 doi: 10.1109/ICPR.2014.126 – ident: ref_1 – ident: ref_123 – volume: 30 start-page: 1951 year: 2019 ident: ref_64 article-title: An improved median filtering anti-forensics with better image quality and forensic undetectability publication-title: Multidimens. Syst. Signal Process. doi: 10.1007/s11045-019-00637-8 – ident: ref_169 – ident: ref_43 doi: 10.1109/ICASSP.2014.6854092 – ident: ref_107 doi: 10.1109/ICASSP.2013.6638219 – ident: ref_66 doi: 10.1109/ICASSP.2014.6854091 – volume: 75 start-page: 13833 year: 2016 ident: ref_42 article-title: Forensics and counter anti-forensics of video inter-frame forgery publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-015-2762-7 – ident: ref_211 doi: 10.1109/HUMANCOM.2010.5563320 – ident: ref_212 doi: 10.1109/ISCTURKEY56345.2022.9931816 – volume: 10 start-page: 255 year: 2014 ident: ref_166 article-title: Black-box forensic and antiforensic characteristics of solid-state drives publication-title: J. Comput. Virol. Hacking Tech. doi: 10.1007/s11416-014-0221-z – volume: 13343 start-page: 516 year: 2022 ident: ref_217 article-title: Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-031-08530-7_44 – volume: 8 start-page: 31 year: 2016 ident: ref_183 article-title: Data Hiding in NTFS Timestamps for Anti-Forensics-All Databases publication-title: Int. J. Internet Broadcast. Commun. – ident: ref_50 doi: 10.3390/fi13110288 – volume: 8 start-page: 1569 year: 2019 ident: ref_156 article-title: Unique methodology to mitigate anti-forensics in cloud using attack-graphs publication-title: Int. J. Innov. Technol. Explor. Eng. doi: 10.35940/ijitee.A1037.0881019 – volume: 66 start-page: 169 year: 2018 ident: ref_86 article-title: An improved anti-forensics JPEG compression using Least Cuckoo Search algorithm publication-title: Imaging Sci. J. doi: 10.1080/13682199.2017.1389832 – ident: ref_162 doi: 10.1109/ICNIDC.2016.7974588 – ident: ref_115 doi: 10.1109/ICCCI.2013.6466109 – ident: ref_147 doi: 10.1016/B978-0-12-801635-0.00006-1 – ident: ref_189 doi: 10.1109/WorldCIS.2015.7359431 – volume: 436 start-page: 157 year: 2022 ident: ref_134 article-title: Authentication and Security Aspect of Information Privacy Using Anti-forensic Audio–Video Embedding Technique publication-title: Lect. Notes Networks Syst. doi: 10.1007/978-981-19-1012-8_11 – volume: 32 start-page: 1701 year: 2022 ident: ref_118 article-title: Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2021.3068294 – volume: 277 start-page: 133 year: 2017 ident: ref_88 article-title: Improved JPEG anti-forensics with better image visual quality and forensic undetectability publication-title: Forensic Sci. Int. doi: 10.1016/j.forsciint.2017.06.003 – ident: ref_164 doi: 10.1109/WDFIA.2008.13 – volume: 22 start-page: 2511 year: 2020 ident: ref_54 article-title: CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network publication-title: IEEE Trans. Multimed. doi: 10.1109/TMM.2019.2959443 – ident: ref_73 doi: 10.1109/BWCCA.2014.83 – volume: 3 start-page: 44 year: 2006 ident: ref_12 article-title: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem publication-title: Digit. Investig. doi: 10.1016/j.diin.2006.06.005 – ident: ref_220 – ident: ref_163 – volume: 62 start-page: 1054 year: 2017 ident: ref_172 article-title: Windows 7 Antiforensics: A Review and a Novel Approach publication-title: J. Forensic Sci. doi: 10.1111/1556-4029.13393 – ident: ref_196 doi: 10.1109/ISDFS49300.2020.9116399 – volume: 6 start-page: 1050 year: 2011 ident: ref_104 article-title: Anti-forensics of digital image compression publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2011.2119314 – ident: ref_71 doi: 10.1109/IS.2016.7737401 – ident: ref_70 doi: 10.1109/CSNT.2014.187 – ident: ref_23 doi: 10.1007/978-981-16-7621-5_17 – volume: 9314 start-page: 97 year: 2015 ident: ref_32 article-title: On the security of image manipulation forensics publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-319-24075-6_10 – ident: ref_213 doi: 10.1007/978-3-319-74107-9_8 – volume: 11 start-page: 69 year: 2015 ident: ref_206 article-title: A Problem Solving Method for Non-Admittable Characters of a Windows File Name in a Directory Index Anti-Forensic Technique publication-title: J. Korea Soc. Digit. Ind. Inf. Manag. – volume: 51 start-page: 7 year: 2009 ident: ref_6 article-title: Systematic literature reviews in software engineering—A systematic literature review publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2008.09.009 – volume: 24 start-page: 1087 year: 2015 ident: ref_84 article-title: On antiforensic concealability with rate-distortion tradeoff publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2015.2390137 – volume: 50 start-page: 15 year: 2007 ident: ref_200 article-title: Hiding data, forensics, and anti-forensics publication-title: Commun. ACM – ident: ref_207 doi: 10.1109/ISDFS49300.2020.9116375 – ident: ref_171 doi: 10.1109/APMediaCast.2016.7878175 – ident: ref_28 doi: 10.1109/ICIP.2013.6738920 – volume: 8 start-page: 295 year: 2019 ident: ref_138 article-title: Anti-forensic approach to remove stego content from images and videos publication-title: J. Cyber Secur. Mobil. doi: 10.13052/jcsm2245-1439.831 – volume: 9 start-page: 17 year: 2017 ident: ref_182 article-title: A Maximum Data Allocation Rule for an Anti-forensic Data Hiding Method in NTFS Index Record-All Databases publication-title: Int. J. Internet Broadcast. Commun. – ident: ref_142 – ident: ref_5 – volume: 11 start-page: 605 year: 2014 ident: ref_203 article-title: Countermeasures against Anti-forensics by Analyzing Anti-forensics Techniques publication-title: J. Secur. Eng. doi: 10.14257/jse.2014.12.05 – volume: 18 start-page: 8 year: 2016 ident: ref_37 article-title: Digital video tampering detection: An overview of passive techniques publication-title: Digit. Investig. doi: 10.1016/j.diin.2016.06.003 – ident: ref_224 doi: 10.1109/SISY.2018.8524756 – ident: ref_18 doi: 10.1109/IRI.2016.94 – ident: ref_85 doi: 10.1109/APSIPA.2013.6694156 – volume: 14 start-page: 403 year: 2021 ident: ref_133 article-title: Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility publication-title: Int. J. Inf. Comput. Secur. – ident: ref_90 – ident: ref_135 doi: 10.1109/IAdCC.2014.6779481 – ident: ref_178 doi: 10.1109/CSE-EUC.2017.45 – ident: ref_197 doi: 10.23919/MIPRO.2017.7973612 – volume: 52 start-page: 371 year: 2020 ident: ref_188 article-title: An analysis of anti-forensic capabilities of B-tree file system (Btrfs) publication-title: Aust. J. Forensic Sci. doi: 10.1080/00450618.2018.1533038 – ident: ref_215 doi: 10.1109/BWCCA.2010.85 – ident: ref_91 doi: 10.1109/ISSPIT.2016.7886024 – volume: 10 start-page: S105 year: 2013 ident: ref_159 article-title: Anti-forensic resilient memory acquisition publication-title: Digit. Investig. doi: 10.1016/j.diin.2013.06.012 – volume: 12888 start-page: 759 year: 2021 ident: ref_109 article-title: Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-030-87355-4_63 – ident: ref_16 doi: 10.1109/LISAT.2019.8816826 – volume: 10082 start-page: 3 year: 2017 ident: ref_22 article-title: A multi-purpose image counter-anti-forensic method using convolutional neural networks publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-319-53465-7_1 – ident: ref_225 doi: 10.4018/978-1-4666-1879-4.ch013 – ident: ref_202 – ident: ref_52 – ident: ref_40 doi: 10.1109/ICASSP.2012.6288237 – ident: ref_76 doi: 10.1109/ICASSP.2010.5495491 – volume: 6 start-page: 28 year: 2014 ident: ref_168 article-title: Attack graph analysis for network anti-forensics publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/ijdcf.2014010103 – volume: 10 start-page: 300 year: 2013 ident: ref_210 article-title: Determining removal of forensic artefacts using the USN change journal publication-title: Digit. Investig. doi: 10.1016/j.diin.2013.10.002 – volume: 7692 start-page: 16 year: 2013 ident: ref_34 article-title: Robustness of color interpolation identification against anti-forensic operations publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-36373-3_2 – ident: ref_89 doi: 10.1109/ICIP.2010.5652553 – volume: 14 start-page: 2385 year: 2020 ident: ref_157 article-title: A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment—All Databases publication-title: Peer-to-Peer Netw. Appl. doi: 10.1007/s12083-020-00975-6 – ident: ref_184 doi: 10.1145/1982185.1982227 – ident: ref_33 doi: 10.1117/12.2039569 – volume: 7128 start-page: 411 year: 2012 ident: ref_83 article-title: Anti-forensics of double JPEG compression detection publication-title: Lect. Notes Comput. Sci. doi: 10.1007/978-3-642-32205-1_33 – volume: 14 start-page: 1194 year: 2019 ident: ref_75 article-title: Counter JPEG anti-forensic approach based on the second-order statistical analysis publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2871751 – volume: 23 start-page: 212 year: 2016 ident: ref_25 article-title: ACE-An effective anti-forensic contrast enhancement technique publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2015.2509477 – volume: 146 start-page: 15 year: 2021 ident: ref_51 article-title: Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection publication-title: Pattern Recognit. Lett. doi: 10.1016/j.patrec.2021.03.009 – ident: ref_74 doi: 10.1109/ICECDS.2017.8389944 – volume: 65 start-page: 35 year: 2017 ident: ref_55 article-title: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2016.12.010 – ident: ref_69 doi: 10.1109/NTICT.2017.7976108 – volume: 2007 start-page: 18 year: 2007 ident: ref_145 article-title: A tour through the realm of anti-forensics publication-title: Comput. Fraud Secur. – volume: 2008 start-page: 18 year: 2008 ident: ref_226 article-title: Dealing with forensic software vulnerabilities: Is anti-forensics a real danger? publication-title: Netw. Secur. – volume: 328 start-page: 111040 year: 2021 ident: ref_81 article-title: An approach to expose dithering-based JPEG anti-forensics publication-title: Forensic Sci. Int. doi: 10.1016/j.forsciint.2021.111040 – volume: 32 start-page: 300920 year: 2020 ident: ref_185 article-title: Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability publication-title: Forensic Sci. Int. Digit. Investig. – volume: 8 start-page: 2073 year: 2013 ident: ref_132 article-title: Anti-forensics and countermeasures of electrical network frequency analysis publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2285515 – volume: 532 start-page: 87 year: 2018 ident: ref_186 article-title: Anti-forensic capacity and detection rating of hidden data in the ext4 filesystem publication-title: IFIP Adv. Inf. Commun. Technol. – ident: ref_80 doi: 10.1109/ICASSP.2013.6638221 – volume: 569 start-page: 159 year: 2019 ident: ref_187 article-title: Analyzing Windows Subsystem for Linux metadata to detect timestamp forgery publication-title: IFIP Adv. Inf. Commun. Technol. – ident: ref_60 doi: 10.1109/ChinaSIP.2015.7230449 – ident: ref_121 doi: 10.1117/12.2182457 – volume: 57 start-page: 1 year: 2014 ident: ref_24 article-title: Attacking contrast enhancement forensics in digital images publication-title: Sci. China Inf. Sci. – ident: ref_62 doi: 10.1109/ICASSP.2013.6638217 – volume: 2020 start-page: 14 year: 2020 ident: ref_17 article-title: File system anti-forensics–types, techniques and tools publication-title: Comput. Fraud. Secur. doi: 10.1016/S1361-3723(20)30030-0 – ident: ref_112 doi: 10.1145/2905055.2905134 – ident: ref_44 doi: 10.1109/ICIP.2017.8296534 – volume: 28 start-page: 56 year: 2019 ident: ref_3 article-title: Freiling. A universal taxonomy and survey of forensic memory acquisition techniques publication-title: Digit. Investig. doi: 10.1016/j.diin.2019.01.001 – ident: ref_222 doi: 10.1145/1980822.1980836 – ident: ref_65 doi: 10.1109/WIFS.2016.7823571 – ident: ref_214 doi: 10.1109/ICCIC.2013.6724230 |
SSID | ssj0000913810 |
Score | 2.3253195 |
SecondaryResourceType | review_article |
Snippet | The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 5302 |
SubjectTerms | Analysis Bibliographic data bases Case studies Classification computer anti-forensic computer forensic Computer forensics Computer hackers computer security Computers Cyberterrorism Forensic sciences Fugitives Software Systematic review Taxonomy |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3NS8MwFMCD7KQHcX5gdUoPAz-guOajbbxNcQxBL26wW3hJUxCkiqv_vy9pOnpQvHjpIeSQvtf3lSa_R8i49Fi0QiamkFigZNQmoAt3BKqQljIrpIfpPD1n8yV_XIlVr9WXOxPW4oFbwd1IPrElLw2j0nAKAJqDsVBUaQY46AsfjHm9Ysr7YJk6dFV7IY9hXe_-B6ccozkLGyhdCPKk_t_8sQ8ysz2yG7LDeNquaki2bL1PdnrMwH0yDNa4ji8DMvrqgPCXDZA5bnf7b-Np3bwmrvNmjYqIu-4N8aKDtq4PyXL2sLifJ6EfQmL4hDVJWVVgWSEoSsNCjoOa4xMtTJRQguPcMDaxBWeG0koaWxVZKXJrAJO21HJ2RAb1e22PSay5NMAoY1porgVAmlYY61MLLM-NFRG57kSkTICFu54VbwqLBidP1ZNnRMabyR8tI-PnaXdO1pspDmztB1DdKqhb_aXuiFw4TSlnfrggA-EWAb6WA1mpaS6xoswx8YjIqFOmCna5VujR0IFRTHpP_mM1p2SbYpLTHh0bkUHz-WXPMElp9Ln_Hr8B3QrkQw priority: 102 providerName: Directory of Open Access Journals |
Title | Systematic Review: Anti-Forensic Computer Techniques |
URI | https://www.proquest.com/docview/3072252977 https://doaj.org/article/940ed4dc329c42aaab4acea8f16ac321 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFH_ovOhBnB84naMHwQ8orkm6Jl5kinMIDvEDvIXXNBVBurnN_9-XNp0e1EsPaQ7J-34vye8BHGYlLJpUoZGKEpQesyGm0l2BksoybmNVguncjXrDZ3H7Er_4gtvMX6usbWJpqLOxcTXyM5JFEj1G4crF5CN0XaPc6apvobEMK2SCJSVfK5fXo_uHRZXFoV7KqFs9zOOU37tz4UiQV-e-kFK7ohKx_y-7XDqbwQas-ygx6FdsbcKSLTZh7Qd24CY0vVbOgmMPHX2yBeJxAcwcVFX_86BfzN9C14GzIIYEdReH4KkGb51tw_Pg-ulqGPq-CKERXT4PszxHy2XMMsMtJjSYCvqSpsUZZujwbjjvWim4YSxXxuayl8WJNUjBW2QF34FGMS7sLgSpUAY54zyNU5HGiFGUk8-PLPIkMTZuwWlNIm08aLjrXfGuKXlw9NQ_6NmCw8XkSYWV8fu0S0frxRQHcF0OjKev2uuLVqJrM0EbZMoIhoipQGNR5lEPaTBqwZHjlHZqSAsy6F8T0LYcoJXuJ4oyy4QCkBa0a2Zqr58z_S1Ne___3odVRmFMdTmsDY359NMeUBgyTzuwLAc3HS9xnTKZ_wJuyt2f |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOFS0glhbIoYiHFLGxnY2NhNDyWLb0cWEr9WYmzgQhoWzb3Qrxp_iNzCTO0gNw6yUH24qSmc_2N358A7BbtbJo1qXBOg5QRopSLK0cgbKOlKbctWI6h0ej6bH5dJKfrMGv_i6MHKvsx8R2oK7mQdbIXzIWGXqK6cqb07NUskbJ7mqfQqODxT79_MEh2-L13nv27xOlJh9m76ZpzCqQBjPUy7SqayRtc1UFTVhwYWn4yTjNK6xQ1GI4xidrdFCqdoFqO6ryggIy9cnIaH7vNbhutHbSo-zk42pNRzQ2bTbsrgFy_VB2oTPDHELHZZt-4mvzA_xrFmintslt2IicNBl3INqENWq24NYlpcIt2IxjwCJ5FoWqn98B83klA510ewyvknGz_JZKvs-G3Z_0OSOSWS8Vu7gLx1dir3uw3swbug9JaVxArbQu89KUOWKW1cwwMkJdFIHyAbzoTeRDlCiXTBnfPYcqYk9_yZ4D2F01Pu2UOf7e7K3YetVE5LTbgvn5Vx97p3dmSJXhH1QuGIWIpcFAaOtshFyYDeCpeMpLp-cPChjvLvBviXyWHxeO49iC6c4Adnpn-jgaLPwf7D74f_VjuDGdHR74g72j_W24qZhAdcfSdmB9eX5BD5kALctHLeoS-HLVMP8Nr8oYWQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VrYToAdEC6kKhORQVkKImtrOxkRDafqz6AasKWqk3d-JMqkooW7qLEH-NX8c4cbY9UG695OBYUTJ-Gb-xx28ANspGFk2b2GnDAcpAUIyF9ilQ2pCQlJlGTOfLeLB_qg7PsrMF-NOdhfFplZ1PbBx1OXF-jXyLscjQE0xXtqqQFnG8O_p09SP2FaT8TmtXTqOFyBH9_sXh2_TjwS6P9RshRnsnO_txqDAQO5XIWVxWFZLUmSidJMy5sVB8ZcxmJZbolWM43ietpBOiMo4qPSiznBwyDUpJSX7uA1jMOSpKerC4vTc-_jpf4fGKmzpN2kOBUprE70mnihmFDIs43TTYVAu4a05oJrrRE3gcGGo0bCG1DAtUr8DSLd3CFVgOHmEavQ2y1e-egvo2F4WO2h2HD9Gwnl3GvvpnzWCIugoS0UknHDt9Bqf3YrHn0KsnNa1CVCjjUAopi6xQRYaYphXzjZRQ5rmjrA_vOxNZFwTLfd2M75YDF29Pe8uefdiYd75qdTr-3W3b23rexYtrNw2T6wsb_lVrVEKl4g8UximBiIVCR6irdIDcmPZh04-U9S6AX8hhOMnAn-XFtOwwNxzV5kx--rDWDaYNvmFqb5D84v-31-EhQ9x-PhgfvYRHgtlUm6O2Br3Z9U96xWxoVrwOsIvg_L6R_hc-Th3r |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Systematic+Review%3A+Anti-Forensic+Computer+Techniques&rft.jtitle=Applied+sciences&rft.au=Gonz%C3%A1lez+Arias%2C+Rafael&rft.au=Bermejo+Higuera%2C+Javier&rft.au=Rainer+Granados%2C+J.+Javier&rft.au=Bermejo+Higuera%2C+Juan+Ram%C3%B3n&rft.date=2024-06-01&rft.pub=MDPI+AG&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=14&rft.issue=12&rft_id=info:doi/10.3390%2Fapp14125302&rft.externalDocID=A799247242 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |