Название: Digital Forensics and Internet of Things
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Программы
isbn: 9781119769033
isbn:
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and speciically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. Te advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of proit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-76878-4
Cover image: Pixabay.Com
Cover design by Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines Printed in the USA
10 9 8 7 6 5 4 3 2 1
Preface
This book provides an opportunity to readers in the era of digitalization of forensic science and application of Internet of Things for the provision of technical benefits to the stakeholders. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyse and present any relevant data. Like any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime.
Currently, there exists no defined and accepted standard for IoT forensic investigations. This can be attributed in part to the heterogeneous nature of IoT.
Chapters 1-8 culminates in the amalgamation of Xilix FPGA and Xilix IP cores, VANET and IOT. The application of such tools in the forensic sciences is the gist of the book. However, Chapters 9-15 discuss the core aspects of machine learning in the areas of healthcare, criminal profiling and digital cyber investigation.
Cyber and digital frauds are the hallmark of today’s era. There is an urgent need to produce knowledgeable resources for curbing such crimes; thus, this book will serve as a perfect instance for getting the best source of expertise. Additionally, it serves as a revolutionary merit for identification and apprehension of criminals in a smarter way.
Case studies related to digital and cyber forensics is a key feature of the book. The content of chapters serves as a jewel in the crown for law enforcement agencies, advocates, forensic experts and students. Hence, we hope the book is an asset for readers and users as they become aware of the ubiquitous societal issues of digital and cybercrimes. Finally, we owe a large debt of gratitude to Scrivener Publishing and Wiley and all authors of the book in particular, for their continued support and patience.
Prof. (Dr.) Anita Gehlot
Uttaranchal University, India
Prof. (Dr.) Rajesh Singh
Uttaranchal University, India
Dr. Jaskaran Singh
Sharda University, India
Dr. Neeta Raj Sharma
Lovely Professional University, India
The Editors
February 2022
1
Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling
Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain*
Electrical and Electronics Engineering Department, UPES, Dehradun, India
Abstract
Security is the most important aspect in any spheres. We have to ensure these technologies evolve along with the advancement of various technology in the field of machine vision and artificial intelligence. The system of facial detection has become a topic of interest. It is widely used for human identification due to its capabilities that give accurate results. It is majorly used for security purposes. This manuscript provides method of face detection and its applications. Using this method, locking system will be designed to ensure safety and security in all types of places. Surveillance systems help in close observation and looking for improper behavior. Then, it performs actions on the data that has been provides to it.
Keywords: Face recognition, python, Raspberry Pi, deep learning, locking system, image processing, eigen faces, fisher faces
1.1 Introduction
Face detection is the method which is pre-owned to identify or verify an individual’s identity using their face. There can also be image, video, audio, or audio-visual element given to the system. Generally, the data is used to access a system or service. This can be performed in two variations depending on its application. First is when the facial recognition system is taking the input (face) for the first time and registering it for analysis. Second is when the user is authenticated prior to being registered. In this, the incoming data is checked from the existing data in the database, and then, access or permission is granted.
The most important aspect of any security system is to properly identify individuals entering or taking an exit through the entrance. There are several systems that use passwords or pins for identification purposes. But these types of systems are not very effective as these pins and passwords can be stolen or copied easily. СКАЧАТЬ