Digital Forensics and Internet of Things
eBook - ePub

Digital Forensics and Internet of Things

Impact and Challenges

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

About this book

DIGITAL FORENSICS AND INTERNET OF THINGS

It pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.

The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn't live on the device itself, but rather in the provider's cloud platform. If you can get the data off the device, you'll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking.

Digital Forensics and Internet of Things encompasses:

  • State-of-the-art research and standards concerning IoT forensics and traditional digital forensics
  • Compares and contrasts IoT forensic techniques with those of traditional digital forensics standards
  • Identifies the driving factors of the slow maturation of IoT forensic standards and possible solutions
  • Applies recommended standards gathered from IoT forensic literature in hands-on experiments to test their effectiveness across multiple IoT devices
  • Provides educated recommendations on developing and establishing IoT forensic standards, research, and areas that merit further study.

Audience

Researchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology.

Trusted byĀ 375,005 students

Access to over 1.5 million titles for a fair monthly price.

Study more efficiently using our study tools.

Information

Year
2022
Print ISBN
9781119768784
eBook ISBN
9781119769033

1
Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling

Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain*
Electrical and Electronics Engineering Department, UPES, Dehradun, India

Abstract

Security is the most important aspect in any spheres. We have to ensure these technologies evolve along with the advancement of various technology in the field of machine vision and artificial intelligence. The system of facial detection has become a topic of interest. It is widely used for human identification due to its capabilities that give accurate results. It is majorly used for security purposes. This manuscript provides method of face detection and its applications. Using this method, locking system will be designed to ensure safety and security in all types of places. Surveillance systems help in close observation and looking for improper behavior. Then, it performs actions on the data that has been provides to it.
Keywords: Face recognition, python, Raspberry Pi, deep learning, locking system, image processing, eigen faces, fisher faces

1.1 Introduction

Face detection is the method which is pre-owned to identify or verify an individual’s identity using their face. There can also be image, video, audio, or audio-visual element given to the system. Generally, the data is used to access a system or service. This can be performed in two variations depending on its application. First is when the facial recognition system is taking the input (face) for the first time and registering it for analysis. Second is when the user is authenticated prior to being registered. In this, the incoming data is checked from the existing data in the database, and then, access or permission is granted.
The most important aspect of any security system is to properly identify individuals entering or taking an exit through the entrance. There are several systems that use passwords or pins for identification purposes. But these types of systems are not very effective as these pins and passwords can be stolen or copied easily. The best solution to this is using one’s bio-metric trait. These are highly effective and useful. This system is designed for prevention of security threats in exceptionally secure regions with lesser power utilization and more dependable independent security gadget.
In this paper [1], the researcher has explained about the ongoing development in subject of facial acknowledgment, and executing features check along with acknowledgment proficiently at extent shows genuine difficulties at present methodologies. Here, we introduce a framework, called FaceNet, which straightforwardly takes in planning from facial pictures till the minimal Euclidean space which removes straightforwardly relate to the proportion of features likeness. When its area has been created, undertakings, like check with bunching, can handily executed apply quality strategies followed by FaceNet embeddings as peak vectors. In [2], the creators have expressed their technique using a significant convolutional network ready to directly smooth out the genuine introducing, rather than a moderate bottleneck layer as in past significant learning moves close. To get ready, we use triplets of by and large changed organizing/non-planning with face patches made using an original online threesome mining strategy. The benefit of our strategy is much more conspicuous real capability: We achieve top tier face affirmation execution using only 128-bytes per face. On the extensively used Named Countenances in the Wild (LFW) dataset, our structure achieves another record exactness of 99.63%. Our structure cuts the misstep rate conversely with the best dispersed result by 30% on both datasets. We likewise present the idea of consonant embedding, which portray various variants of face embedding (delivered by various organizations) that are viable to one another and consider direct correlation between one another. This paper [3] presents colossal extension face dataset named VGGFace2. The dataset contains 3.31 million pictures of 9,131 subjects, with a typical of 362.6 pictures for each subject. Pictures are downloaded from Google Picture Look and have colossal assortments in present, age, edification, identity, and calling (for instance, performers, contenders, and government authorities). The dataset was accumulated considering three goals: to have both incalculable characters and besides a gigantic number of pictures for each character; to cover a tremendous extent of stance, age, and personality; and to restrict the imprint upheaval. We depict how the dataset was assembled, explicitly the robotized and manual isolating stages to ensure a high accuracy for the photos of each character. To assess face affirmation execution using the new dataset, we train ResNet-50 (with and without Crush and-Excitation blocks) Convolutional Neural Organizations on VGGFace2, on MS-Celeb-1M, and on their affiliation and show that readiness on VGGFace2 prompts further developed affirmation execution over stance and age. Finally, using the models ready on these datasets, we display state of the art execution on all the IARPA Janus face affirmation benchmarks, for instance, IJB-A, IJB-B, and IJB-C, outperforming the previous top tier by an enormous edge. Datasets and models are straightforwardly open [4, 5] Late profound learning-based face detection strategies have accomplished extraordinary execution, yet it actually stays testing to perceive exceptionally low-goal question face like 28 Ɨ 28 pixels when CCTV camera is far from the gotten subject. Such face with especially low objective is completely out of detail information of the face character diverged from normal objective in a presentation and subtle relating faces in that. To this end, we propose a Goal Invariant Model (Edge) for having a tendency to such cross-objective face affirmation issues, with three indisputable interests.
In [6, 7] The ANN requires 960 inputs and 94 neurons to yield layer in order to recognize their countenances. This organization is two-layer log-sigmoid organization. This exchange work is taken on the grounds that its yield range (0 to 1) is ideal for figuring out how to yield Boolean qualities. In [8], face recognition utilizing profound learning strategy is utilized. Profound learning is a piece of the broader gathering of AI strategies dependent on learning information portrayals, instead of work oriented calculations. Training is overseen, semi-coordinated, and solo. Combining profound training, the framework has enhanced every now and then. A few pictures of approving client are utilized as the information base of framework [9]. Face recognition is perhaps the main uses of biometrics-based validation framework over the most recent couple of many years. Face recognition is somewhat recognition task design, where a face is ordered as either known or obscure after contrasting it and the pictures of a realized individual put away in the information base. Face recognition is a test, given the certain fluctuation in data in light of arbitrary variety across various individuals, including methodical varieties from different factors like easing up conditions and posture [10]. PCA, LDA, and Bayesian investigation are the three most agent subspace face recognition draws near. In this paper, we show that they can be bound together under a similar system. We first model face contrast with three...

Table of contents

  1. Cover
  2. Table of Contents
  3. Title Page
  4. Copyright
  5. Preface
  6. 1 Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling
  7. 2 Smart Healthcare Monitoring System: An IoT-Based Approach
  8. 3 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind
  9. 4 Playing With Genes: A Pragmatic Approach in Genetic Engineering
  10. 5 Digital Investigative Model in IoT: Forensic View
  11. 6 Internet of Things Mobility Forensics
  12. 7 A Generic Digital Scientific Examination System for Internet of Things
  13. 8 IoT Sensors: Security in Network Forensics
  14. 9 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime
  15. 10 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations
  16. 11 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody
  17. 12 Cognitive Radio Networks: A Merit for Teleforensics
  18. 13 Fingerprint Image Identification System: An Asset for Security of Bank Lockers
  19. 14 IoT Forensics: Interconnection and Sensing Frameworks
  20. 15 IoT Forensics: A Pernicious Repercussions
  21. About the Editors
  22. Index
  23. End User License Agreement

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Digital Forensics and Internet of Things by Anita Gehlot, Rajesh Singh, Jaskaran Singh, Neeta Raj Sharma, Anita Gehlot,Rajesh Singh,Jaskaran Singh,Neeta Raj Sharma in PDF and/or ePUB format, as well as other popular books in Informatica & Intelligenza artificiale (IA) e semantica. We have over 1.5 million books available in our catalogue for you to explore.