FaceRadar: Extending Open Source Software to Accelerate Image Processing in Digital Forensic Investigations through Face Detection
|
|
|
- Karin Rodgers
- 9 years ago
- Views:
Transcription
1 FaceRadar: Extending Open Source Software to Accelerate Image Processing in Digital Forensic Investigations through Face Detection Blaize K. Strothers Faculty Advisor: Dr. Chutima Boonthum-Denecke Department of Computer Science Hampton University Hampton, VA ABSTRACT In digital forensics, image analysis represents one of the most labor-intensive tasks during an investigation. However, there is an absence of publicly available, low-cost solutions for streamlining these investigations through image processing automation. Several methods of automated forensic image processing use computer vision to carry out face detection and recognition, but few make use of freely available and extensible open source software. This paper proposes the modification of open source forensic software to add functionality that optimizes forensic image processing through face detection and face recognition addons. An original extension module for the Autopsy open source forensic software was developed using OpenCV open source computer vision libraries to accomplish face detection. FaceRadar was created using original design, implementation, and testing efforts. This open source approach to optimizing image processing in digital forensic investigations creates opportunities for image processing at low time, effort, and financial cost, making efficient image analysis in computer forensics investigations possible in a variety of limited-resource settings. CCS Concepts Applied computing~evidence collection, storage and analysis Computing methodologies~computer vision problems. Keywords Digital forensics; open source; computer vision; face detection; FaceRadar. 1. INTRODUCTION In an age in which technology such as computers, cameras and mobile devices are both ubiquitous and constantly evolving, digital forensics plays a crucial role in procuring evidence for criminal investigations. The same devices used for innocuous legitimate purposes are misused to surreptitiously carry out illegal acts, maintain crime networks, and participate in illicit behaviors. Digital forensic analysis software allows investigators to piece together critical evidence in criminal cases involving the unique challenges posed by modern technology and its inherently Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. complex data lifecycles. However, digital forensics has long relied almost exclusively on closed-source software tools [1]. This means that forensic examinations that depend on data retrieved by closed source tools are based on faith in the tools accuracy and effectiveness, rather than trust earned by comprehension of the tools methods, which can only be derived from a transparent relationship with the source code and its inner workings [1]. Open source digital forensics software helps to shape future computer forensic investigations by providing an avenue for the creation of meaningful extension modules that meet the needs of digital forensic examiners, while endeavoring to maintain the quest for truth that drives digital forensics investigations. As picture analysis constitutes a tedious process usually demanding intensive manual forensic processing [2], one of the most critical needs within digital forensic investigation is a reduction in the time and effort required for law enforcement to analyze forensic images. In creating FaceRadar, an extension module for Autopsy forensics software, open source software is used to strike a balance between the pressing needs for both transparency and efficiency in digital forensic investigations. 2. BACKGROUND 2.1 Digital Forensic Investigation In a digital forensic investigation, evidence is derived from digital sources for verification, examination, record keeping, and dissemination that makes easier the reconstruction of criminal events or facilitates the anticipation of planned criminal operations [1]. In this way, digital forensics procedures are applied to computer-generated data sources to produce evidence for a wide range of investigation types [1]. The recovery of system artifacts created due to user actions, such as logs, time stamps and file deletion records, and system actions, such as changes in memory blocks and other automatic processes, contribute to the main goal of a digital forensic investigation, which is to locate facts that prove true a series of events by finding traces of those events left behind on a system [1]. While the main goal of the digital forensic investigator is to uncover the truth within a supposed series of events to prove or disprove the hypothesis of the case, oftentimes the role of the investigator requires an acceptance or rejection of digital evidence in light of the methods and systems that allegedly produced it, with the establishment of the legitimacy of the evidence sometimes being the only reason for an investigation [1]. ADMI 2016, March 31-April 3, 2016, Winston-Salem, NC, USA. Copyright 2016 ADMI
2 2.2 Manual Image Processing Within digital forensic investigations, image processing represents a significant portion of the time required to establish evidence. Computer forensic investigators often manually examine large numbers of images during the search for potential evidence, which requires a formidable amount of scanning and analysis in farreaching investigations [3]. Chen et al. further enumerated the difficulties of this task when quantifying the challenges involved in a typical image processing segment of a digital investigation approximately 34,000 browser cache image files on a lab computer with a 6GB hard drive were calculated to require multiple hours of monotonous analysis if the examiner uses only milliseconds to assess each image [3]. The rapidly decreasing cost of data storage and increasing availability in storage device size electronic searches revealed that a 1TB external hard drive currently costs less than $48 only exacerbates the laboriousness of the work by further eliminating any reason for users to erase any of their stored images [3]. Chen et al. ascertained that an average computer user could be expected to store hundreds of thousands of images, and in the same vein, that a commercial target such as a web hosting service might contain tens of millions of images, creating an exceedingly difficult task for investigators and requiring that the search be narrowed [3]. 2.3 Automated Image Processing The automation of image processing and analysis within computer forensic investigations alleviates digital forensic examiners of the excessive time required to manually sort through and analyze images to determine their relevance and possible value to a case. However, not every form of automated image processing guarantees a level of analysis comparable to that achieved through manual processing. James and Gladyhsev demonstrated that a comparison of automated forensic analysis with manual analysis exhibited that automated forensic triage produced results comparable to manual triage in only a few cases that did not require specialized knowledge, such as detection of images of exploited children, and automated analysis was even less reliable in more involved cases requiring in-depth knowledge of the system [4]. While James and Gladyhsev assert that digital forensic examiner preparation level, the possibility of overlooked evidence, and issues of evidence verification pose specific challenges to automated forensic examination [4], in many cases automated image processing still lessens the workload on examiners while producing at least marginally viable results that can be refined in a much smaller amount of time. 2.4 Open Source Software in Digital Forensics Open source tools aid digital forensic investigations namely through their source code provision access to source code allows examiners to review and change it to suit their needs, as well as verify their evidence by providing as proof the source code from which the data was produced in the case of false negatives or other erroneous results [1]. Open source forensic tools aid digital forensic examiners in their quest to uncover the truth by providing a level of transparency closed-source tools rarely, if ever furnish the open source forensic toolkit and Autopsy predecessor the Sleuth Kit provides at least three separate methods of bug tracking: change logs provided with each release, public bug trackers on its project site, and actual source code build comparisons, allowing examiners to validate any code changes themselves instead of relying on and trusting the software distributor [1]. Open source tools are also generally free of cost, and while the financial benefits support students and burgeoning digital forensic examiners, they also greatly aid digital forensics departments with restricted budgets, as well as those with a full set of commercial, closed-source tools looking to expand their forensic toolkits at low to no cost. The low cost benefits countries with limited budgets, which can use open source software to access modern evidentiary technology without needing to spend time or financial resources not possessed. The portability and flexibility of open source forensics tools means that they can be easily moved among systems without expensive proprietary licenses and can also be used as needed, with a wide range of available installation options, none of which require purchase orders, copy protection, or software provider permissions or licenses [1]. This means that computer forensic investigations can take place on multiple computer systems or networks without the hassle of or consideration for licensing or install stipulations. In addition, open source tools allow would-be examiners to learn from forensic analysis tools by inspecting the options with which the tool was executed, the tool output and the code that produced it, allowing them to better understand how the tool functions [1]. Open source programs are also often accompanied by committed communities of users and developers willing to assist with problems or inquiries [1]. 3. IMPLEMENTATION 3.1 Open Source Computer Vision The Intel Open Source Computer Vision (OpenCV) libraries provide cross-platform programming functions that perform realtime computer vision under the open source BSD license. As seen in Viola and Jones [5], OpenCV face detection using Haar cascades provides accurate detection rates at high speeds based on detection algorithms that iterate over images in multiple stages of Haar-like feature composition using a cascading design that implements strong classifiers [6]. 3.2 Using Haar-like Features Implementing face detecting through the OpenCV Haar cascade classifier allows for the identification of Haar-like features to find faces using an OpenCV cascade classifier, which are classes that can be trained to recognize a type of image through positive and negative examples, and which are then cascaded by being applied successively to an image until the image is accepted or fails to fulfill a classifier stage [7]. Haar-like features are used as input to classifiers and produce detection results through their shapes, placement within the image, and scale [7]. An image detection result is calculated by placing the rectangular features anywhere on the image in question, and finding the difference of the sum of image pixels under the positive (black) and negative (white) areas of the rectangle, thus verifying the existence or absence of image characteristics such as edges, lines, and center-surrounded features as shown in Figure 1 [7].
3 Figure 1. Haar-like features [7]. 3.3 Creating the Autopsy Module, FaceRadar Autopsy is a digital forensics program and the graphical user interface to the Sleuth Kit command line forensics framework [8]. FaceRadar was created as an Autopsy file-level ingest module that processes images within an Autopsy case using OpenCV Haar cascades and displays detected faces within the program main window. FaceRadar detects image files through an algorithm developed by Rajmund Witt that identifies.jpeg,.bmp,.png,.gif, and.tiff file headers. The module then scans each image for faces using the OpenCV Haar cascade. The FaceRadar module was implemented using Autopsy ingest module documentation. The module checks the type of each file used as input for the ingest module, checks the user preference for skipping any known files, then checks if the input file is an image file and if so, attempts face detection and creates an array of results to post to the Autopsy Blackboard, which is the left side panel containing the FaceRadar Detected Faces section that can be seen in Figure 4. Figure 3 shows the file processing flow of the FaceRadar ingest module. Figure 3. FaceRadar application flowchart. Figure 2. FaceRadar ingest module during Autopsy case creation. 4. RESULTS During the first test, a set of test images was created from a randomly selected 116-image subset of over 2000 images from 101 different subject categories [9]. FaceRadar identified all 17 images of human faces, but also identified faces in two photos focused on other subjects. In a second test using 91 images from the same original set along with 17 text files, an.mp3 song, a.mobi electronic book, and a.tmp temporary file, FaceRadar selected only the images and then detected all 7 faces in the set, as well as a drawing of a face and an erroneous result. Additional tests were then conducted to determine the accuracy of the module.
4 Figure 4. Set of test images within Autopsy processed by the FaceRadar module during the initial test. Figure 5. Faces detected by the FaceRadar module within Autopsy during the initial test. 4.1 FaceRadar Precision and Recall Statistics The FaceRadar module precision was calculated using the information retrieval definition of precision, in which precision is the fraction of retrieved set elements that are relevant to the search. Precision was documented over a series of 10 test runs with image sets that varied in the number of total images and the proportion of relevant to non-relevant images, as well as the specific images in each set both relevant and non-relevant images were selected at random. Precision was calculated according to the following equation [10]: precision number of relevant items retrieved total number of items retrieved The average precision for FaceRadar was 0.90, meaning that most, but not all of the images retrieved by the module were relevant, or contained faces. The information retrieval definition of recall, in which recall is the fraction of the relevant search elements that are retrieved, was used to determine the recall of FaceRadar. The same 10 test image sets of varying sizes were used to calculate precision were used to calculate recall and the results were documented in the statistics summary table in Figure 6. Recall was calculated using the following formula [10]: recall number of relevant items retrieved number of relevant itemsin collection The average recall for FaceRadar was 0.99, meaning that almost all relevant images were retrieved in each test case, or that each
5 designated face image was usually returned as a hit within the Autopsy Interesting Items section under FaceRadar Detected Faces. Within the Autopsy FaceRadar Detected Faces hit results, nonrelevant images retrieved often included semblances of faces such as the image in the center of U.S. paper currency, high-contrast animals' faces (such as the faces of Dalmatians and pandas), and statues. This contributed to the reduced precision scores, as these images were not designated relevant face-containing images, but with the exception of the animals, did in fact contain human faces. Future tests with different data sets will use better non-relevant images that exclude all forms of faces. Table 1. FaceRadar statistics summary table. 5. DISCUSSION The creation of the FaceRadar Autopsy extension module establishes proof of concept for the use of open source software extensions to optimize both forensic image processing and digital forensic investigations in general. In particular, this approach is significant due to its use of purely open source software and algorithms, with preliminary results supporting the feasibility of using entirely open source software during digital forensic investigations [1]. Extending open source digital forensics software to make computer forensic investigations more efficient not only provides a significant benefit for examiners lacking time resources, but also those lacking the funds for multiple closed-source software products. By extending open source forensic programs, digital forensics examiners can generate the functionality needed to optimize their investigations, replacing the need for time, money, and other resources not previously available. 6. FUTURE WORK Plans to expand the FaceRadar face detection Autopsy module to include face recognition capabilities are underway, with eigenvectors being considered for face recognition implementation by comparing facial features to sets of known individuals. Future work will modify FaceRadar to allow users to locate pictures of a specific person by using face recognition to match an uploaded image to faces detected on a drive image. While face recognition presents unique challenges when faced with factors such as low image quality, subject position, lighting, facial expression and differences in age [11], further research will be conducted into established and new ways of addressing these complexities. 7. ACKNOWLEDGMENTS This work is partly supported by the National Science Foundation CyberCorps: Scholarship for Service program under grant no. DGE (PI/co-PI: Dr. Chutima Boonthum-Denecke, Dr. Jean Muhammad). 8. REFERENCES [1] Altheide, C., and Carvey, H. A Digital Forensics with Open Source Tools. Burlington, MA: Syngress. [2] U.S. Department of Homeland Security (DHS) Cyber Forensics. Retrieved from [3] Chen, Y., Roussev, V., Richard III, G.G. and Gao, Y Content-based image retrieval for digital forensics. Proceedings of the International Conference on Digital Forensics (IFIP 2005). [4] James, J., & Gladyhsev, P Challenges with automation in digital forensic investigations. [5] Viola, P., and Jones, M.J Robust Real-Time Face Detection. International Journal of Computer Vision 57(2), [6] Jimenez, A. E. et al Tag Detection for Preventing Unauthorized Face Image Processing. In Y. Shi, et al., (Eds.), Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014: Revised Selected Papers. Switzerland: Springer, pp [7] OpenCV dev team Cascade Classification. Retrieved from assification.html [8] Carrier, B Autopsy. Retrieved from [9] Fei-Fei, L., Fergus, R., and Perona, P Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories. IEEE. CVPR 2004, Workshop on Generative- Model Based Vision. [10] NIST Common Evaluation Measures (Appendix). Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006). [11] Jain, A. K., Klare, B., and Park, U Face Matching and Retrieval in Forensics Applications. IEEE Multimedia 19(1), 20.
CS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, [email protected] June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
Context-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
PDF Primer PDF. White Paper
White Paper PDF Primer PDF What is PDF and what is it good for? How does PDF manage content? How is a PDF file structured? What are its capabilities? What are its limitations? Version: 1.0 Date: October
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
An Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
Comparing Methods to Identify Defect Reports in a Change Management Database
Comparing Methods to Identify Defect Reports in a Change Management Database Elaine J. Weyuker, Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 (weyuker,ostrand)@research.att.com
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Software-assisted document review: An ROI your GC can appreciate. kpmg.com
Software-assisted document review: An ROI your GC can appreciate kpmg.com b Section or Brochure name Contents Introduction 4 Approach 6 Metrics to compare quality and effectiveness 7 Results 8 Matter 1
Speed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA [email protected], [email protected] Abstract. A speed
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Improved Software Testing Using McCabe IQ Coverage Analysis
White Paper Table of Contents Introduction...1 What is Coverage Analysis?...2 The McCabe IQ Approach to Coverage Analysis...3 The Importance of Coverage Analysis...4 Where Coverage Analysis Fits into your
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change Abstract Although QA and Development managers may see many challenges in creating an automated GUI testing framework, it is
Comprehensive Master Plan. Strategic Security Plan 2010 2015. East Carolina University. December 31, 2009. Prepared by:
East Carolina University Comprehensive Master Plan Strategic Security Plan 2010 2015 December 31, 2009 Prepared by: 14900 Bogle Drive, Suite 200 Chantilly, VA 20151 Telephone: 703-488-9990 This Page Intentionally
Online Detainee Locator System
for the Online Detainee Locator System April 9, 2010 Contact Point James Chaparro Director, Office of Detention and Removal Operations U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
Industrial Challenges for Content-Based Image Retrieval
Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September 2005 www.ltutech.com LTU technologies Page 1 Agenda CBIR what is it good for? Technological challenges
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Enhancing Document Review Efficiency with OmniX
Xerox Litigation Services OmniX Platform Review Technical Brief Enhancing Document Review Efficiency with OmniX Xerox Litigation Services delivers a flexible suite of end-to-end technology-driven services,
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Managing Agile Projects in TestTrack GUIDE
Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
Configuration Management in the Data Center
Configuration Management in the Data Center Using Microsoft System Center Published: May 2008 For the latest information, please see http://www.microsoft.com/systemcenter Contents Executive Summary...1
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
1-04-10 Configuration Management: An Object-Based Method Barbara Dumas
1-04-10 Configuration Management: An Object-Based Method Barbara Dumas Payoff Configuration management (CM) helps an organization maintain an inventory of its software assets. In traditional CM systems,
Intland s Medical Template
Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Overview Software testing is a verification process in which an application of the software or the program meets the business requirements and technology that have dominated
Software Engineering Introduction & Background. Complaints. General Problems. Department of Computer Science Kent State University
Software Engineering Introduction & Background Department of Computer Science Kent State University Complaints Software production is often done by amateurs Software development is done by tinkering or
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
WEBSITE & SOCIAL MEDIA PRIVACY POLICY
WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Voluntary Product Accessibility Template Blackboard Learn Release 9.1 April 2014 (Published April 30, 2014)
Voluntary Product Accessibility Template Blackboard Learn Release 9.1 April 2014 (Published April 30, 2014) Contents: Introduction Key Improvements VPAT Section 1194.21: Software Applications and Operating
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
TIBCO Spotfire and S+ Product Family
TIBCO Spotfire and S+ Product Family Compliance with 21 CFR Part 11, GxP and Related Software Validation Issues The Code of Federal Regulations Title 21 Part 11 is a significant regulatory requirement
Application Lifecycle Management White Paper. Source Code Management Best Practice: Applying Economic Logic to Migration ALM
ALM Application Lifecycle Management White Paper Source Code Management Best Practice: Applying Economic Logic to Migration Summary: Is there a Business Case for Migration? Ultimately, what is the value
International Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research An Implementation Scheme For Software Project Management With Event-Based Scheduler Using Ant Colony Optimization Roshni Jain 1, Monali Kankariya
Track and Trace in the Pharmaceutical Supply Chain
Track and Trace in the Pharmaceutical Supply Chain Edmund W. Schuster Visiting Operations Researcher Robin Koh Associate Director Auto-ID Labs Massachusetts Institute of Technology Cambridge, MA husetts
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Modeling the Mobile Application Development Lifecycle
, March 12-14, 2014, Hong Kong Modeling the Mobile Application Development Lifecycle Tejas Vithani, Member, IAENG and Anand Kumar Abstract Software Development Lifecycle is crucial in Desktop or web application
Commission Accounting User Manual
Commission Accounting User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
SQL Server 2008 is Microsoft s enterprise-class database server, designed
In This Chapter Chapter 1 Introducing SQL Server 2008 Understanding database basics Choosing a SQL Server 2008 edition Using SQL Server components Implementing SQL Server databases Finding additional information
Information Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
Indoor Surveillance System Using Android Platform
Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao
Email security and compliance best practices
E-Guide Email security and compliance best practices Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development Wm. Arthur Conklin University of Houston, College of Technology 312 Technology Bldg, Houston, TX
Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION
Compliance Response Edition 07/2009 SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures simatic wincc DOKUMENTATION Compliance Response Electronic Records / Electronic Signatures
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Solving Big Data Problems in Computer Vision with MATLAB Loren Shure
Solving Big Data Problems in Computer Vision with MATLAB Loren Shure 2015 The MathWorks, Inc. 1 Why Are We Talking About Big Data? 100 hours of video uploaded to YouTube per minute 1 Explosive increase
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER
NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from
AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY
AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY Muhammad Rofi IMTIHAN 1, Mohd. Salihin NGADIMAN, Habibollah HARON Department of Modelling and Industrial Computing Faculty of Computer Science and Information
Improving Traceability of Requirements Through Qualitative Data Analysis
Improving Traceability of Requirements Through Qualitative Data Analysis Andreas Kaufmann, Dirk Riehle Open Source Research Group, Computer Science Department Friedrich-Alexander University Erlangen Nürnberg
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
CA IT Client Manager Asset Inventory and Discovery
DATA SHEET: ASSET INVENTORY AND DISCOVERY CA IT Client Manager Asset Inventory and Discovery CA IT CLIENT MANAGER DELIVERS EXTENSIVE ASSET INVENTORY AND DISCOVERY CAPABILITIES THAT HELP YOU MAINTAIN ACCURATE
Robotic Process Automation: Reenergizing the Directory Publishing Industry
A Point of View Robotic Process Automation: Reenergizing the Directory Publishing Industry Abstract Evolving digital marketing avenues including video, SEM/SEO, mobile, and social media are fast replacing
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Pictavo powerful yearbook software designed to help you collaborate, manage, create and sell yearbooks.
2015-2016 Pictavo powerful yearbook software designed to help you collaborate, manage, create and sell yearbooks. Featuring the ability to gather photos from your entire school community and sell yearbooks,
Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries
Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries Andrew Weidner University of Houston, USA [email protected] Annie Wu University of Houston,
WHITE PAPER Big Data Analytics. How Big Data Fights Back Against APTs and Malware
WHITE PAPER Big Data Analytics How Big Data Fights Back Against APTs and Malware Table of Contents Introduction 3 The Importance of Machine Learning to Big Data 4 Addressing the Long-Tail Nature of Internet
COMPUTER SCIENCE (5651) Test at a Glance
COMPUTER SCIENCE (5651) Test at a Glance Test Name Computer Science Test Code 5651 Time Number of Questions Test Delivery 3 hours 100 selected-response questions Computer delivered Content Categories Approximate
Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES
A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES Sasithorn Rattanarungrot, Martin White and Paul Newbury University of Sussex ABSTRACT
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
MusicGuide: Album Reviews on the Go Serdar Sali
MusicGuide: Album Reviews on the Go Serdar Sali Abstract The cameras on mobile phones have untapped potential as input devices. In this paper, we present MusicGuide, an application that can be used to
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Chapter 3. Application Software. Chapter 3 Objectives. Application Software
Chapter 3 Objectives Chapter 3 Application Software Identify the categories of application software Explain ways software is distributed Explain how to work with application software Identify the key features
Multi Account Manager
Multi Account Manager User Guide Copyright MetaFX,LLC 1 Disclaimer While MetaFX,LLC make every effort to deliver high quality products, we do not guarantee that our products are free from defects. Our
Fraud Detection for Online Retail using Random Forests
Fraud Detection for Online Retail using Random Forests Eric Altendorf, Peter Brende, Josh Daniel, Laurent Lessard Abstract As online commerce becomes more common, fraud is an increasingly important concern.
