Forensic Multimedia Retrieval Techniques

[15] M.D. Nandeesh and Dr. M.

*Multimedia Information Retrieval*

No. 3, July 2015, pp. 23-26.

pp. 1-6.

[16] Vani M and Saravanakumar S, "Multi focus and multi modal image fusion using wavelet transform", 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, 2015,

[17] Q. Li, J. Du, F. Song, C. Wang, H. Liu and C. Lu, "Region based multifocus image fusion using the local spatial frequency", 2013 25th Chinese Control and Decision Conference (CCDC), Guiyang, 2013, pp. 3792-3796.

[18] V. Amala Rani, S. Lalithakumari, "A Hybrid Fusion Model for Brain Tumor Images of MRI and CT", Communication and Signal Processing (ICCSP) 2020 International Conference

[19] Lilia Lazli, Mounir Boukadoum, Otmane Ait Mohamed, "A Survey on Computer-Aided Diagnosis of Brain Disorders through MRI Based on Machine Learning and Data Mining Methodologies with an Emphasis on Alzheimer Disease Diagnosis and the Contribution of the Multimodal Fusion", Applied Sciences, vol. 10,

[20] Jiayin Kang, Wu Lu, Wenjuan Zhang, "Fusion of Brain PET and MRI Images Using Tissue-Aware Conditional Generative Adversarial Network With Joint Loss", Access IEEE, vol. 8,

on, pp. 1312-1316, 2020.

pp. 1894, 2020.

pp. 6368-6378, 2020.

**74**

Meenakshi, "Image Fusion Algorithms for medical Images – A comparison, Bonfring", International Journal of Advances in Image Processing, Vol. 5,

**77**

**Chapter 5**

Process

**Abstract**

elaborated.

**1. Introduction**

*Amr Adel and Brian Cusack*

evidence extraction, process framework

The Role of Penetration Testing

in Forensic Multimedia Retrieval

Digital forensic investigators are faced with multimedia retrieval and discovery challenges that require innovation and application of evolving methodologies. This work is made more difficult in critical infra-structure environments where the acquired evidence is in many formats, types and presentations. Penetration testing is one of the techniques used to focus an investigation and to target the potential case information from the vulnerability identification phase, through to the media identification phase. In this chapter a review of these processes is made and a framework example developed to show how the investigator discovers relevant evidence. The problem for the digital investigator is the vast array of media in which evidence is stored or transmitted. Some work is from live retrieval and others static. A framework of methods that is flexible and adaptable to the context of investigation is proposed and the discovery methods for multimedia environments

**Keywords:** penetration testing, digital forensics, critical infrastructures,

Forensic Investigators conduct forensic examinations in order to identify evidence and to prevent future compromises of a system. The increasing volume of digital data to be managed and the diversity of media type is a contemporary challenge. The diversity of devices, operating systems, media and services present obstacles that require solution for efficient and effective professional practice. The variety of data sources, formats and styles poses a multimedia problem that requires working solutions for information access and content documentation. The acquired evidence can include different types of forensic data such as pictures, audios, videos, files, directories, and texts [1]. The systems for extraction are either live and functioning or static and stored. In either situation due processes, methods, standards and guidelines must be complied to achieve a repeatable practice for later auditing. In many instances copies are taken of the various media so analysis proceeds on identical images and not the original media. Investigation processes are segregated into phases to assure the best deployment of specialist skills and the preservation of the evidence [2]. Segregation is usually divided into preparation, acquisition, analysis, and reporting phases and sequenced towards a deliverable
