Advertisement

A Hybrid Approach for Document Analysis in Digital Forensic Domain

  • Flora Amato
  • Giovanni CozzolinoEmail author
  • Marco Giacalone
  • Francesco Moscato
  • Francesco Romeo
  • Fatos Xhafa
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 29)

Abstract

Our daily life is characterized by the continuous interaction with many devices and technologies, which build a digital ecosystem around each person. In this context, if, for example, it is necessary to investigate the commission of a crime, the adoption of digital forensic sciences is of fundamental importance. These disciplines are in fact concerned with gathering any information that may be of some interest to the legal system, in full respect of its nature and without its characteristics being altered in any way; in this way the probative value of the information collected and its admissibility in the trial are guaranteed. The complexity of the scenario in which the forensic operators are to operate derives from the widespread diffusion of devices with a large variety of characteristics and, mostly, from the heterogeneous and unstructured representation of relevant information. In this work we present a semantic approach for textual document analysis to enrich the correlation process of a forensics investigation.

References

  1. 1.
    Amato, F., Cozzolino, G., Mazzeo, A., Mazzocca, N.: Correlation of digital evidences in forensic investigation through semantic technologies. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 668–673. IEEE (2017)Google Scholar
  2. 2.
    Amato, F., Cozzolino, G., Mazzeo, A., Romano, S.: Detecting anomalies in Twitter stream for public security issues. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1–4. IEEE (2016)Google Scholar
  3. 3.
    Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Trans. Data Priv. 8(3), 273–296 (2015)Google Scholar
  4. 4.
    Balzano, W., Murano, A., Vitale, F.: V2V-EN - Vehicle-2-Vehicle elastic network. Procedia Comput. Sci. 98, 497–502 (2016)CrossRefGoogle Scholar
  5. 5.
    Balzano, W., Murano, A., Vitale, F.: Wifact–wireless fingerprinting automated continuous training. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 75–80. IEEE (2016)Google Scholar
  6. 6.
    Balzano, W., Vitale, F.: DiG-Park: a smart parking availability searching method using V2V/V2I and DGP-class problem. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 698–703. IEEE (2017)Google Scholar
  7. 7.
    Caballé, S., Xhafa, F., Barolli, L.: Using mobile devices to support online collaborative learning. Mob. Inf. Syst. 6(1), 27–47 (2010)Google Scholar
  8. 8.
    Cilardo, A.: Exploring the potential of threshold logic for cryptography-related operations. IEEE Trans. Comput. 60(4), 452–462 (2011)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Cilardo, A., Durante, P., Lofiego, C., Mazzeo, A.: Early prediction of hardware complexity in HLL-to-HDL translation. In: 2010 International Conference on Field Programmable Logic and Applications (FPL), pp. 483–488. IEEE (2010)Google Scholar
  10. 10.
    Cozzolino, G.: Using semantic tools to represent data extracted from mobile devices. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), pp. 530–536. IEEE (2018)Google Scholar
  11. 11.
    Di Lorenzo, G., Mazzocca, N., Moscato, F., Vittorini, V.: Towards semantics driven generation of executable web services compositions. J. Softw. 2(5), 1–15 (2007)CrossRefGoogle Scholar
  12. 12.
    Di Martino, B., Moscato, F.: An ontology based methodology for automated algorithms recognition in source code, pp. 1111–1116 (2010)Google Scholar
  13. 13.
    Fusella, E., Cilardo, A.: Minimizing power loss in optical networks-on-chip through application-specific mapping. Microprocess. Microsyst. 43, 4–13 (2016)CrossRefGoogle Scholar
  14. 14.
    Garfinkel, S.L.: Automating disk forensic processing with SleuthKit, XML and Python. In: Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2009, pp. 73–84. IEEE (2009)Google Scholar
  15. 15.
    Horng, S.-J., Rosiyadi, D., Fan, P., Wang, X., Khan, M.K.: An adaptive watermarking scheme for e-government document images. Multimed. Tools Appl. 72(3), 3085–3103 (2014)CrossRefGoogle Scholar
  16. 16.
    Horng, S.-J., Rosiyadi, D., Li, T., Takao, T., Guo, M., Khan, M.K.: A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 24(7), 1099–1105 (2013)CrossRefGoogle Scholar
  17. 17.
    Levine, B.N., Liberatore, M.: DEX: digital evidence provenance supporting reproducibility and comparison. Digit. Investig. 6, S48–S56 (2009)CrossRefGoogle Scholar
  18. 18.
    Moscato, F.: Exploiting model profiles in requirements verification of cloud systems. Int. J. High Perform. Comput. Netw. 8(3), 259–274 (2015)CrossRefGoogle Scholar
  19. 19.
    Schatz, B., Mohay, G.M., Clark, A.: Generalising event forensics across multiple domains. School of Computer Networks Information and Forensics Conference, Edith Cowan University (2004)Google Scholar
  20. 20.
    Schatz, B.L.: Digital evidence: representation and assurance. Ph.D. thesis, Queensland University of Technology (2007)Google Scholar
  21. 21.
    Seo, H., Liu, Z., Choi, J., Kim, H.: Multi-precision squaring for public-key cryptography on embedded microprocessors. In: International Conference on Cryptology in India, pp. 227–243. Springer, Cham (2013)Google Scholar
  22. 22.
    Xhafa, F., Barolli, L.: Semantics, intelligent processing and services for big data. Future Gener. Comput. Syst. 37, 201–202 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Flora Amato
    • 1
  • Giovanni Cozzolino
    • 1
    Email author
  • Marco Giacalone
    • 2
  • Francesco Moscato
    • 3
  • Francesco Romeo
    • 1
  • Fatos Xhafa
    • 4
  1. 1.Università degli Studi di Napoli Federico IINaplesItaly
  2. 2.Vrije Universiteit Brussel (VUB)BrusselsBelgium
  3. 3.Second University of NaplesNaplesItaly
  4. 4.UPC BarcelonaTechBarcelonaSpain

Personalised recommendations