Academic Journal of

Forensic Sciences

[Abbr: Acd. Jr. AJFSc]
English
2581-4273
2016

Voice Impersonation Examination by Spectrographic Analysis: A Voice Comparative Study

by Ananya Jain, Riya Bansal

The most popular form of communication is audio voice, however occasionally it is employed improperly or illegally. The Forensic Speaker Identification System faces a potential challenge from voice imitation, one of the main disguises that is on the rise. There are numerous ways to conceal a human voice such as Self-disguise, impersonating someone else, or stealing their identity are all examples of this. Here, identifying impersonation using a person's real voice is crucial for establishing ownership. It is crucial to determine whether a voice is being impersonated or belongs to the actual speaker when a person disputes ownership of voice evidence that sounds like them. This research presents a novel two-stage verification approach for the mimicry voice signal. The first stage involves comparing intonation patterns using spectrograms of voice of original artists and their respective mimicry artists, while the second stage is based on differences in fundamental frequencies and pitch. Keywords: Speaker identification, voice disguise, spectrogram, pitch, fundamental frequency.

Microbial Forensics: A New Breakthrough in Forensic Investigations

by Shefali Anand, Dr. Kunal Kishor, Farha Azmeen

Microbial Forensics is a promising branch of Forensic Science that fills the knowledge gaps and empowers the conventional and traditional forensic investigative procedures. Microbial fingerprinting can assist in the field of forensics in the areas like source tracking, geolocation, circumstances of death and trace evidences. The studies performed for the forensic investigations mostly focus on the internal organ samples and the soil samples, whereas the microbiome present in mouth, skin and vaginal samples are routinely collected in the cases like femicide and sexual assault. Microorganisms are ubiquitous in nature and hence, are involved in the natural metabolic activities, and therefore they are considered as physical evidence in the forensic investigations. The microbial species attacks the cadaver after the death of an organism and starts the decomposition of the body. The whole process of decomposition is an amalgamation of microbial and entomological attack which is dependent on various factors like soil, surrounding environment, temperature, humidity etc. The study of the microbial species can be an important aspect of the forensic investigations as it helps in the estimation of Post Mortem Interval (PMI). From the last few years, microbial forensics is gaining limelight as microbes can prove to be better evidence than entomological species for estimating Post Mortem Interval. Keywords: Microbial Forensics, Post Mortem Interval, Microorganisms, Fingerprinting

Spectrographic and Statistical Analysis of Speech Recorded Through Different Recording Devices

by Moulya B P, Geetam Shukla

Speaker Identification is the identification of the speaker speaking the current utterance and Speaker Verification is the verification from the utterance of whether the speaker is who he claims to be. Since people are more likely to deny one’s voice in many situations during ongoing crimes. This technique aids in the resolution of such cases and in the identification of the guilty. This research paper involves recognizing and verifying the speakers based on the intonation pattern of the words they speak. It is a sample-based investigation. Here, ten people's specimens are taken for analysis, with five from northern part of India and five from southern part of India. This report emphasizes the variations in intonation patterns resulting from different recording devices. Audio recording devices include a handset, a recorder, and a laptop. The difference is noted, and the extent to which the differences can be considered is also inspected. Keywords: Speaker Recognition, Intonation Patterns, Intensity, Pitch, Formants, Standard deviation.

Analysis of FTK Imager as a Recovery Tool for Different Storage Devices

by Niranjan Neelkanth Belemane, Ankit Tripathi

The Forensic Toolkit (FTK) Imager is an open-source software program developed by Access Data used to create exact copies, or forensic images, of digital data without altering the original. The image of the original evidence stays consistent, enabling us to copy data at a much faster rate, which can be quickly maintained and can be investigated further. FTK imager not only creates an exact copy or image of the data, but it also recovers erased data from the given exhibit. It is an open-source software application that recovers deleted data. This investigation was carried out by experimenting on certain samples, such as USB devices, Micro SD cards, CD/DVD, and hard disks, to determine whether the erased and destroyed data could be recovered. Keywords: Forensic Toolkit (FTK) Imager, Access Data, Data recovery.

Meta-Analysis of Images Clicked Using different Social Media Cameras

by Oinam Olivia Chanu, Riya Bansal

In the subject of study known as media forensics, many types of media, including audio, video, and digital pictures, are analysed and investigated using scientific methodologies and procedures. Finding evidence that can be utilised in court or other investigations is the main goal of media forensic. Experts in media forensics evaluate media files using a variety of tools and methods, such as data recovery, picture and audio enhancement, and authentication. In this paper we are going to trace the origin and properties of the files uploaded in different social media platforms. This paper situates such as framework and suggests a novel approach to determine whether a picture originates from a social network and, more specifically, to determine which image has been downloaded. The method is predicated on the idea that each social network employs an odd and mostly unknown alteration that yet leaves some recognisable traces on the image, and that these traces may be retrieved to showcase every site. The proposed technique successfully distinguishes distinct social network sources by using trained classifiers. Experimental findings on same image shot from different social media cameras and finding the differences in the pictures under varied operational circumstances attest to the feasibility of such a distinction. Keywords: Enhancement, Authentication, Retrieved, Recognisable, Feasibility.

Cyber-Forensic Processes for Cloud Based Applications

by Shrinjoy Goswami, Ankit Tripathi

The field of digital forensics known as computer forensics deals with crimes performed on networks, computers, and digital storage media from companies like Apple (iCloud), Amazon (Amazon Web Service), Dropbox, Google, etc. It refers to a collection of methodical steps and techniques used to locate, collect, preserve, extract, interpret, document, and present evidence from computing equipment in a way that makes it admissible during a court case or other legal or administrative activity. Cybercrimes are occurring as a result of the increased use of technology in daily life. In the business world, fraud involving cloud computing is on the rise (gaining access to someone's storage systems, stealing log files, data sheets, account theft, data breach, data loss, etc.). When it comes to cloud-based mobile applications, the activities that are conducted are not only kept on the device, but also in a distant cloud. So, using forensically sound methodology is crucial to obtaining all of the evidence from the Cloud and the smart phone. The vast majority of people are unaware of how to protect their digital storage. This paper discusses importance of cloud forensics, collection and examination of the cloud data through UFED Cloud Analyzer. Keywords: Computer forensics, Dropbox, Digital storage media, Cybercrime, Data breach

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking