期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Study on Automatic Latent Fingerprint Identification System
1
作者 Uttam U Deshpande V.S.Malemath 《Journal of Computer Science Research》 2022年第1期38-50,共13页
Latent fingerprints are the unintentional impressions found at the crime scenes and are considered crucial evidence in criminal identification.Law enforcement and forensic agencies have been using latent fingerprints ... Latent fingerprints are the unintentional impressions found at the crime scenes and are considered crucial evidence in criminal identification.Law enforcement and forensic agencies have been using latent fingerprints as testimony in courts.However,since the latent fingerprints are accidentally leftover on different surfaces,the lifted prints look inferior.Therefore,a tremendous amount of research is being carried out in automatic latent fingerprint identification to improve the overall fingerprint recognition performance.As a result,there is an ever-growing demand to develop reliable and robust systems.In this regard,we present a comprehensive literature review of the existing methods utilized in latent fingerprint acquisition,segmentation,quality assessment,enhancement,feature extraction,and matching steps.Later,we provide insight into different benchmark latent datasets available to perform research in this area.Our study highlights various research challenges and gaps by performing detailed analysis on the existing state-of-the-art segmentation,enhancement,extraction,and matching approaches to strengthen the research. 展开更多
关键词 Fingerprint identification system NIST Latent fingerprints forensics fingerprint database
下载PDF
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security 被引量:3
2
作者 Zhen Chen Linyun Ruan +2 位作者 Junwei Cao Yifan Yu Xin Jiang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期406-417,共12页
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora... The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics. 展开更多
关键词 network security traffic archival forensic analysis phishing attack bitmap database hadoop distributed file system cloud computing NoSQL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部