一种调查被篡改录像的法医方法

Q1 Social Sciences
Ilker Kara, Ceren Korkmaz, Alihan Karatatar, M. Aydos
{"title":"一种调查被篡改录像的法医方法","authors":"Ilker Kara, Ceren Korkmaz, Alihan Karatatar, M. Aydos","doi":"10.12968/s1361-3723(23)70003-1","DOIUrl":null,"url":null,"abstract":"Forensic image analysis can be used to resolve difficult incidents, such as the increasing number of child sexual abuse cases. Although the United Nations and European Union countries are trying to fight these crimes, criminals are developing new methods to circumvent the measures taken. Sharing videos that do not contain any criminal elements and inserting child sexual abuse videos between frames is a new method that has been seen recently. This article proposes a new method to analyse the videos prepared this way. The proposed method is particularly advantageous for detecting and analysing videos that have been manipulated and embedded in different content and can be applied as a new technique.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"58 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A forensic method for investigating manipulated video recordings\",\"authors\":\"Ilker Kara, Ceren Korkmaz, Alihan Karatatar, M. Aydos\",\"doi\":\"10.12968/s1361-3723(23)70003-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Forensic image analysis can be used to resolve difficult incidents, such as the increasing number of child sexual abuse cases. Although the United Nations and European Union countries are trying to fight these crimes, criminals are developing new methods to circumvent the measures taken. Sharing videos that do not contain any criminal elements and inserting child sexual abuse videos between frames is a new method that has been seen recently. This article proposes a new method to analyse the videos prepared this way. The proposed method is particularly advantageous for detecting and analysing videos that have been manipulated and embedded in different content and can be applied as a new technique.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"58 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(23)70003-1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70003-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0

摘要

法医图像分析可以用来解决棘手的事件,比如越来越多的儿童性虐待案件。虽然联合国和欧洲联盟国家正在努力打击这些犯罪,但犯罪分子正在开发新的方法来规避所采取的措施。分享没有犯罪内容的视频,并在画面之间插入儿童性侵视频,是最近出现的新手法。本文提出了一种新的视频分析方法。该方法对于检测和分析被篡改和嵌入到不同内容中的视频特别有利,可以作为一种新技术加以应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A forensic method for investigating manipulated video recordings
Forensic image analysis can be used to resolve difficult incidents, such as the increasing number of child sexual abuse cases. Although the United Nations and European Union countries are trying to fight these crimes, criminals are developing new methods to circumvent the measures taken. Sharing videos that do not contain any criminal elements and inserting child sexual abuse videos between frames is a new method that has been seen recently. This article proposes a new method to analyse the videos prepared this way. The proposed method is particularly advantageous for detecting and analysing videos that have been manipulated and embedded in different content and can be applied as a new technique.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Fraud and Security
Computer Fraud and Security Social Sciences-Law
自引率
0.00%
发文量
61
期刊介绍: Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信