Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp...Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies.展开更多
Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hate...Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset.展开更多
With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important forc...With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important force in the global economy, and the progress of the BRICS countries' trade facilitation level has an important impact on the global trade environment. This paper conducts an in-depth study of the dynamic changes in BRICS trade facilitation from 2013 to 2022, and uses an extended gravity model to analyze the specific impact of this change on China's exports using cross-border e-commerce. The results show that although the BRICS countries have made some progress in trade facilitation, the overall level still needs to be improved, and there are obvious differences among member countries. However, the improvement of trade facilitation among BRICS countries has undoubtedly brought significant positive effects to China's exports using cross-border e-commerce.展开更多
This study delves into the bilateral relations between Iran and Turkmenistan,focusing on the multidimensional impacts of cross-border ethnic groups,cultural diplomacy,and energy cooperation.The research reveals that d...This study delves into the bilateral relations between Iran and Turkmenistan,focusing on the multidimensional impacts of cross-border ethnic groups,cultural diplomacy,and energy cooperation.The research reveals that despite challenges in security cooperation,such as regional political ideological differences and uneven power distribution,Iran has adopted diverse strategies to enhance cultural identity,social cohesion,and promote economic cooperation.Iran actively seeks to repair relations with Turkmenistan by emphasizing shared historical and cultural backgrounds,particularly the presence of cross-border Turkmen ethnic groups.Specific measures include developing cultural tourism,organizing cultural weeks,and establishing commemorative days.In the economic sphere,the two countries have signed significant natural gas supply agreements,strengthening energy cooperation.Iranian leaders often emphasize“blood ties”and deep cultural connections in diplomatic statements,combining cultural diplomacy with practical economic cooperation.The study’s findings indicate that Iran’s initiatives have led to the reorganization of national space and social reconstruction in border regions,promoting changes in public policy.By integrating cultural identity,historical connections,and economic interests,Iran has adopted a sophisticated diplomatic approach,laying the foundation for more stable and enduring bilateral relations while contributing to regional stability and sustainable development.展开更多
This paper explores the operational strategies of cross-border micro, small, and medium enterprises (MSMEs). Against the backdrop of globalization and digitalization, cross-border trade has become one of the important...This paper explores the operational strategies of cross-border micro, small, and medium enterprises (MSMEs). Against the backdrop of globalization and digitalization, cross-border trade has become one of the important pathways for many MSMEs to achieve growth and competitive advantage. Firstly, the paper outlines the concept and characteristics of cross-border MSMEs, as well as the analysis of their operational environment in the context of globalization, including political, economic, social, technological, environmental, and legal factors. Secondly, the paper proposes operational strategies for cross-border MSMEs, including international market selection and positioning, cross-border marketing strategies, supply chain management, cross-border financial management, and cross-border risk management. Finally, the paper summarizes the importance of effectively implementing these strategies for cross-border MSMEs to seize international market opportunities, reduce operational risks, and enhance competitiveness and profitability.展开更多
The development of high technology,for public life to provide a justification at the same time,also encouraged the spirit of cybercrime,to become more and more rampant.In network crime,electronic data is usually used ...The development of high technology,for public life to provide a justification at the same time,also encouraged the spirit of cybercrime,to become more and more rampant.In network crime,electronic data is usually used as the main evidence to determine the facts of the crime and plays an important role in the smooth trial of the case.But because electronic data on dependent,concealment,easy destructive strong science and technology,the forensics work is now in trouble.The mature use of blockchain technology can avoid existing problems to a certain extent,which is helpful to the smooth progress of electronic forensics.This paper on electronic evidence how to more effectively,combined with research blockchain technology,improve the efficiency of electronic evidence collection work.展开更多
As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it ma...As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it may lead to potential social,legal or private consequences.To this end,it is very necessary and also challenging to find effective methods to differentiate between them.In this paper,a novel leading digit law,also called Benford's law,based method to identify computer graphics is proposed.More specifically,statistics of the most significant digits are extracted from image's Discrete Cosine Transform(DCT) coefficients and magnitudes of image's gradient,and then the Support Vector Machine(SVM) based classifiers are built.Results of experiments on the image datasets indicate that the proposed method is comparable to prior works.Besides,it possesses low dimensional features and low computational complexity.展开更多
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th...Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.展开更多
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and...Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.展开更多
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A...Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.展开更多
The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is ...The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is not effective in practice. In fact,memory images are usually acquired by using forensics tools instead of using snapshots. Therefore,the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper,we study the problem in a novel viewpoint. Firstly,several definitions about memory acquisition measure error are introduced to describe the trusty. Then,we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision,which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated,that is,it accounts for the whole error from 30% to 50%.展开更多
The meteoric rise of cross-border e-commerce has become one of the pillars of our foreign trade, while the lack of quali-fied talents in the industry may restrict its benign development. This paper analyzes the major ...The meteoric rise of cross-border e-commerce has become one of the pillars of our foreign trade, while the lack of quali-fied talents in the industry may restrict its benign development. This paper analyzes the major problems existing in the BusinessEnglish talents cultivation in university, and offers advice for the construction of training modal for Business English talents basedon the cross-border e-commerce.展开更多
As an emerging industry in China, cross-border e-commerce has enjoyed the leap-forward development, along with increasingly prominent problems. This paper aims at finding out the problems and related roots that hinder...As an emerging industry in China, cross-border e-commerce has enjoyed the leap-forward development, along with increasingly prominent problems. This paper aims at finding out the problems and related roots that hinder its development, through conducting an analysis on the export development of cross-border e-commerce, in order to look for solutions and countermeasures in favor of its sound development and to promote the liberalization development of foreign trade in China.展开更多
As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.T...As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.Thus,in digital forensics,it is necessary to understand the manipulating history of images.That requires to verify all possible manipulations applied to images.Among all the image editing manipulations,recoloring is widely used to adjust or repaint the colors in images.The color information is an important visual information that image can deliver.Thus,it is necessary to guarantee the correctness of color in digital forensics.On the other hand,many image retouching or editing applications or software are equipped with recoloring function.This enables ordinary people without expertise of image processing to apply recoloring for images.Hence,in order to secure the color information of images,in this paper,a recoloring detection method is proposed.The method is based on convolutional neural network which is quite popular in recent years.Unlike the traditional linear classifier,the proposed method can be employed for binary classification as well as multiple labels classification.The classification performance of different structure for the proposed architecture is also investigated in this paper.展开更多
In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be proces...In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be processed in a holistic manner in the proposed scheme,which makes full use of the correlation between RGB channels.And due to the use of convolutional neural network,it can effectively avoid the one-sidedness of artificial features.Experimental results have shown the scheme’s improvement over the state-of-the-art scheme on the accuracy of color image median filtering detection.展开更多
The multi-purpose forensics is an important tool for forge image detection.In this paper,we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typica...The multi-purpose forensics is an important tool for forge image detection.In this paper,we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typical image manipulations,including spatial low-pass Gaussian blurring,median filtering,re-sampling,and JPEG compression.To eliminate the influences caused by diverse image contents on the effectiveness and robustness of the feature,a residual group which contains several high-pass filtered residuals is introduced.The partial correlation coefficient is exploited from the residual group to purely measure neighborhood correlations in a linear way.Besides that,we also combine autoregressive coefficient and transition probability to form the proposed composite feature which is used to measure how manipulations change the neighborhood relationships in both linear and non-linear way.After a series of dimension reductions,the proposed feature set can accelerate the training and testing for the multi-purpose forensics.The proposed feature set is then fed into a multi-classifier to train a multi-purpose detector.Experimental results show that the proposed detector can identify several typical image manipulations,and is superior to the complicated deep CNN-based methods in terms of detection accuracy and time efficiency for JPEG compressed image with low resolution.展开更多
This study examines the factors that affect the performance of foreign acquiring firms in Chinese M&As (mergers and acquisitions) market. Comparing between overseas Sino-Group and Anglo-Group, this study found that...This study examines the factors that affect the performance of foreign acquiring firms in Chinese M&As (mergers and acquisitions) market. Comparing between overseas Sino-Group and Anglo-Group, this study found that familiarity and location were the most important factors influencing performance of M&A transactions in China. It also found that unrelated M&A deals should be merged with familiarity for gaining positive acquisition performance. The total sample used in this study was 3,442 cases from October 1980 to March 2005. Because this period included all deals of M&As after the opening of Chinese market in China. The authors' finding provided a more universal explanation in the cross-border M&As in China.展开更多
With the global economy integration and progress in energy transformation,it has become a general trend to surpass national boundaries to achieve wider and optimal energy resource allocations.Consequently,there is a c...With the global economy integration and progress in energy transformation,it has become a general trend to surpass national boundaries to achieve wider and optimal energy resource allocations.Consequently,there is a critical n eed to adopt scie ntific approaches in assessi ng cross-border power grid interconnection projects.First,con sidering the promotion of large-scale renewable energy resources and improvements in system adequacy,a comprehensive assessment index system,including costs,socio-economic benefits,environmental benefits,and technical benefits,is established in this study.Second,a synthetic assessment framework is proposed for cross-border power grid interconnection projects based on the index system comprising cost-benefit analysis,with market and network simulations,iterative methods for indicator weight evaluation,and technique for order preferenee by similarity to an ideal solution(TOPSIS)method for the project rankings.Fin ally,by assessi ng and comparing three cross-border projects betwee n Europe and Asia,the proposed index system and assessment framework have been proved to be effective and feasible;the results of this system can thus support investment decision-making related to such projects in the future.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
In recent years,while the traditional trade sectors have been shrinking,China’s cross-border e-commerce has undergone rapid development and has become a new driver of its international trade.Based on analysis of the ...In recent years,while the traditional trade sectors have been shrinking,China’s cross-border e-commerce has undergone rapid development and has become a new driver of its international trade.Based on analysis of the evolution pattern of China’s cross-border e-commerce,this paper uses a revised gravity model to test empirically the driving factors and the resistance factors in the development of the country’s cross-border e-commerce.The results show that the total GDP,per capita disposable income of urban residents,total imports and exports,and the scale of the online shopping market have a positive relationship with cross-border e-commerce transactions,which are conducive to the development of cross-border e-commerce,while logistics costs inhibit the development of cross-border e-commerce.Accordingly,the paper puts forward several policy recommendations.展开更多
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2024-RS-2024-00437494)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies.
文摘Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset.
基金Supported by Western Project of National Social Science Fund of China(23XJY013)Project of Social Science Foundation of Shaanxi Province(2022D032).
文摘With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important force in the global economy, and the progress of the BRICS countries' trade facilitation level has an important impact on the global trade environment. This paper conducts an in-depth study of the dynamic changes in BRICS trade facilitation from 2013 to 2022, and uses an extended gravity model to analyze the specific impact of this change on China's exports using cross-border e-commerce. The results show that although the BRICS countries have made some progress in trade facilitation, the overall level still needs to be improved, and there are obvious differences among member countries. However, the improvement of trade facilitation among BRICS countries has undoubtedly brought significant positive effects to China's exports using cross-border e-commerce.
文摘This study delves into the bilateral relations between Iran and Turkmenistan,focusing on the multidimensional impacts of cross-border ethnic groups,cultural diplomacy,and energy cooperation.The research reveals that despite challenges in security cooperation,such as regional political ideological differences and uneven power distribution,Iran has adopted diverse strategies to enhance cultural identity,social cohesion,and promote economic cooperation.Iran actively seeks to repair relations with Turkmenistan by emphasizing shared historical and cultural backgrounds,particularly the presence of cross-border Turkmen ethnic groups.Specific measures include developing cultural tourism,organizing cultural weeks,and establishing commemorative days.In the economic sphere,the two countries have signed significant natural gas supply agreements,strengthening energy cooperation.Iranian leaders often emphasize“blood ties”and deep cultural connections in diplomatic statements,combining cultural diplomacy with practical economic cooperation.The study’s findings indicate that Iran’s initiatives have led to the reorganization of national space and social reconstruction in border regions,promoting changes in public policy.By integrating cultural identity,historical connections,and economic interests,Iran has adopted a sophisticated diplomatic approach,laying the foundation for more stable and enduring bilateral relations while contributing to regional stability and sustainable development.
文摘This paper explores the operational strategies of cross-border micro, small, and medium enterprises (MSMEs). Against the backdrop of globalization and digitalization, cross-border trade has become one of the important pathways for many MSMEs to achieve growth and competitive advantage. Firstly, the paper outlines the concept and characteristics of cross-border MSMEs, as well as the analysis of their operational environment in the context of globalization, including political, economic, social, technological, environmental, and legal factors. Secondly, the paper proposes operational strategies for cross-border MSMEs, including international market selection and positioning, cross-border marketing strategies, supply chain management, cross-border financial management, and cross-border risk management. Finally, the paper summarizes the importance of effectively implementing these strategies for cross-border MSMEs to seize international market opportunities, reduce operational risks, and enhance competitiveness and profitability.
基金President’s Fund Natural Science Project Plan of Tarim University,“Research on Blockchain-based Electronic Evidence Fixation Method”(Project No.:TDZKSS202439)。
文摘The development of high technology,for public life to provide a justification at the same time,also encouraged the spirit of cybercrime,to become more and more rampant.In network crime,electronic data is usually used as the main evidence to determine the facts of the crime and plays an important role in the smooth trial of the case.But because electronic data on dependent,concealment,easy destructive strong science and technology,the forensics work is now in trouble.The mature use of blockchain technology can avoid existing problems to a certain extent,which is helpful to the smooth progress of electronic forensics.This paper on electronic evidence how to more effectively,combined with research blockchain technology,improve the efficiency of electronic evidence collection work.
文摘As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it may lead to potential social,legal or private consequences.To this end,it is very necessary and also challenging to find effective methods to differentiate between them.In this paper,a novel leading digit law,also called Benford's law,based method to identify computer graphics is proposed.More specifically,statistics of the most significant digits are extracted from image's Discrete Cosine Transform(DCT) coefficients and magnitudes of image's gradient,and then the Support Vector Machine(SVM) based classifiers are built.Results of experiments on the image datasets indicate that the proposed method is comparable to prior works.Besides,it possesses low dimensional features and low computational complexity.
文摘Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.
文摘Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.
文摘Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.
基金Sponsored by the National Natural Science Foundation of China (Grant No.61303199)Natural Science Foundation of Shandong Province (Grant No.ZR2013FQ001 and ZR2011FQ030)+1 种基金Outstanding Research Award Fund for Young Scientists of Shandong Province,China (Grant No.BS2013DX010)Academy of Sciences Youth Fund Project of Shandong Province (Grant No.2013QN007)
文摘The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is not effective in practice. In fact,memory images are usually acquired by using forensics tools instead of using snapshots. Therefore,the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper,we study the problem in a novel viewpoint. Firstly,several definitions about memory acquisition measure error are introduced to describe the trusty. Then,we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision,which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated,that is,it accounts for the whole error from 30% to 50%.
文摘The meteoric rise of cross-border e-commerce has become one of the pillars of our foreign trade, while the lack of quali-fied talents in the industry may restrict its benign development. This paper analyzes the major problems existing in the BusinessEnglish talents cultivation in university, and offers advice for the construction of training modal for Business English talents basedon the cross-border e-commerce.
文摘As an emerging industry in China, cross-border e-commerce has enjoyed the leap-forward development, along with increasingly prominent problems. This paper aims at finding out the problems and related roots that hinder its development, through conducting an analysis on the export development of cross-border e-commerce, in order to look for solutions and countermeasures in favor of its sound development and to promote the liberalization development of foreign trade in China.
文摘As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.Thus,in digital forensics,it is necessary to understand the manipulating history of images.That requires to verify all possible manipulations applied to images.Among all the image editing manipulations,recoloring is widely used to adjust or repaint the colors in images.The color information is an important visual information that image can deliver.Thus,it is necessary to guarantee the correctness of color in digital forensics.On the other hand,many image retouching or editing applications or software are equipped with recoloring function.This enables ordinary people without expertise of image processing to apply recoloring for images.Hence,in order to secure the color information of images,in this paper,a recoloring detection method is proposed.The method is based on convolutional neural network which is quite popular in recent years.Unlike the traditional linear classifier,the proposed method can be employed for binary classification as well as multiple labels classification.The classification performance of different structure for the proposed architecture is also investigated in this paper.
基金The work was supported in part by the Natural Science Foundation of China under Grants(Nos.61772281,61502241,61272421,61232016,61402235 and 61572258)in part by the Natural Science Foundation of Jiangsu Province,China under Grant BK20141006+1 种基金in part by the Natural Science Foundation of the Universities in Jiangsu Province under Grant 14KJB520024the PAPD fund and the CICAEET fund.
文摘In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be processed in a holistic manner in the proposed scheme,which makes full use of the correlation between RGB channels.And due to the use of convolutional neural network,it can effectively avoid the one-sidedness of artificial features.Experimental results have shown the scheme’s improvement over the state-of-the-art scheme on the accuracy of color image median filtering detection.
基金supported by NSFC(No.61702429)Sichuan Science and Technology Program(No.19yyjc1656).
文摘The multi-purpose forensics is an important tool for forge image detection.In this paper,we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typical image manipulations,including spatial low-pass Gaussian blurring,median filtering,re-sampling,and JPEG compression.To eliminate the influences caused by diverse image contents on the effectiveness and robustness of the feature,a residual group which contains several high-pass filtered residuals is introduced.The partial correlation coefficient is exploited from the residual group to purely measure neighborhood correlations in a linear way.Besides that,we also combine autoregressive coefficient and transition probability to form the proposed composite feature which is used to measure how manipulations change the neighborhood relationships in both linear and non-linear way.After a series of dimension reductions,the proposed feature set can accelerate the training and testing for the multi-purpose forensics.The proposed feature set is then fed into a multi-classifier to train a multi-purpose detector.Experimental results show that the proposed detector can identify several typical image manipulations,and is superior to the complicated deep CNN-based methods in terms of detection accuracy and time efficiency for JPEG compressed image with low resolution.
文摘This study examines the factors that affect the performance of foreign acquiring firms in Chinese M&As (mergers and acquisitions) market. Comparing between overseas Sino-Group and Anglo-Group, this study found that familiarity and location were the most important factors influencing performance of M&A transactions in China. It also found that unrelated M&A deals should be merged with familiarity for gaining positive acquisition performance. The total sample used in this study was 3,442 cases from October 1980 to March 2005. Because this period included all deals of M&As after the opening of Chinese market in China. The authors' finding provided a more universal explanation in the cross-border M&As in China.
基金the Science and Technology Project of Global Energy Interconnection Group Co.,Ltd.(No.524500180014).
文摘With the global economy integration and progress in energy transformation,it has become a general trend to surpass national boundaries to achieve wider and optimal energy resource allocations.Consequently,there is a critical n eed to adopt scie ntific approaches in assessi ng cross-border power grid interconnection projects.First,con sidering the promotion of large-scale renewable energy resources and improvements in system adequacy,a comprehensive assessment index system,including costs,socio-economic benefits,environmental benefits,and technical benefits,is established in this study.Second,a synthetic assessment framework is proposed for cross-border power grid interconnection projects based on the index system comprising cost-benefit analysis,with market and network simulations,iterative methods for indicator weight evaluation,and technique for order preferenee by similarity to an ideal solution(TOPSIS)method for the project rankings.Fin ally,by assessi ng and comparing three cross-border projects betwee n Europe and Asia,the proposed index system and assessment framework have been proved to be effective and feasible;the results of this system can thus support investment decision-making related to such projects in the future.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
基金supported by the National Social Science Foundation General Program (12BJY009)the National Natural Science Foundation (71673087)Shanghai Municipal Philosophy and Social Sciences Planning General Program (2018BJB025)
文摘In recent years,while the traditional trade sectors have been shrinking,China’s cross-border e-commerce has undergone rapid development and has become a new driver of its international trade.Based on analysis of the evolution pattern of China’s cross-border e-commerce,this paper uses a revised gravity model to test empirically the driving factors and the resistance factors in the development of the country’s cross-border e-commerce.The results show that the total GDP,per capita disposable income of urban residents,total imports and exports,and the scale of the online shopping market have a positive relationship with cross-border e-commerce transactions,which are conducive to the development of cross-border e-commerce,while logistics costs inhibit the development of cross-border e-commerce.Accordingly,the paper puts forward several policy recommendations.