Proactive biometric-enabled forensic imprinting

作者: Abdulrahman Alruban , Nathan Clarke , Fudong Li , Steven Furnell

DOI: 10.1109/CYBERSECPODS.2016.7502342

关键词:

摘要: Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who legitimate access organization's internal systems and databases. Therefore, preventing or responding incidents has a challenging task. Digital forensics grown into de-facto standard examination electronic evidence; however, key barrier is often being able associate an individual stolen data. Stolen credentials Trojan defense are two commonly cited arguments used. This paper proposes model that can more inextricably links use information (e.g. images, documents emails) users them through steganography transparent biometrics. The initial experimental results proposed approach shown it possible correlate individual's biometric feature vector with digital object (images) still successfully recover sample even significant file modification. In addition, reconstruction these unmodified images was by using those generated imprints accuracy 100% some scenarios.

参考文章(25)
Malcolm Harkins, People Are the Perimeter Managing Risk and Information Security. pp. 57- 69 ,(2013) , 10.1007/978-1-4302-5114-9_5
Yuval Elovici, Asaf Shabtai, Lior Rokach, A Survey of Data Leakage Detection and Prevention Solutions ,(2012)
William Hurst, Madjid Merabti, Paul Fergus, None, A survey of critical infrastructure security international conference on critical infrastructure protection. pp. 127- 138 ,(2014) , 10.1007/978-3-662-45355-1_9
Cameron S. D. Brown, Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice International Journal of Cyber Criminology. ,vol. 9, pp. 55- 119 ,(2015) , 10.5281/ZENODO.22387
David E Allen, Robert J Powell, Abhay K Singh, None, A Critique of credit risk models with evidence from mid-cap firms Quantitative Financial Risk Management: Theory and Practice. pp. 296- 311 ,(2015) , 10.1002/9781119080305.CH11
Stephane Roger Daniel Joseph Charbonneau, Edward Joseph Simon, Method and System for Generating Trusted Security Labels for Electronic Documents ,(2010)
Mathias Drehmann, Leonardo Gambacorta, The effects of countercyclical capital buffers on bank lending Applied Economics Letters. ,vol. 19, pp. 603- 608 ,(2012) , 10.1080/13504851.2011.591720
Sreedhar T. Bharath, Tyler Shumway, Forecasting Default with the Merton Distance to Default Model Review of Financial Studies. ,vol. 21, pp. 1339- 1369 ,(2008) , 10.1093/RFS/HHN044
Carly L. Huth, The insider threat and employee privacy: An overview of recent case law Computer Law & Security Review. ,vol. 29, pp. 368- 381 ,(2013) , 10.1016/J.CLSR.2013.05.014