Matlab is a registered trademark of The Mathworks, Inc.


 Advanced Source Code . Com

 
 
HOME SOURCE CODE SOFTWARE INFO SUPPORT CONTACT US
 
Source code for fingerprint recognition, face recognition and much more


Software Info    About us     
Go To Matlab Official Website

.: Click here to download :.

With the rapid development of computer technology, crime involving digital evidence is becoming more commonplace. Digital forensics involves an investigation of digital evidence to enable investigators to determine the truth about what happened. However, to achieve this goal, law enforcement must have tools and technologies that enable them to examine the evidence accurately. Unfortunately, as computer technology has advanced, criminals have found a myriad of ways to avoid law enforcement detection. The forensics community seems to be ill prepared for these anti-forensic techniques. In fact, most of the discussion about these methods is taking place outside the law enforcement community.

A criminal might attempt to hide an image by changing its extension to “.doc” so it appears to be a Microsoft Word document. Some forensics software looks at a file’s contents to determine what information it contains. This allows investigators to detect the type of the contents even if the file extension has been changed. However, the software currently detects images based on hard coded file signatures. The first few bytes of the file are examined to determine what type of information the file contains. This method of detecting file types works well in cases where the file has been otherwise unaltered; but it may fail when the file’s contents do not match the predetermined signatures. The signature-based method of detecting file types leaves the software susceptible to “evidence counterfeiting.” Evidence counterfeiting manipulates existing evidence to hide its purpose or creates new evidence that is deceptive. If a suspect alters any of the first few bytes of a file, the forensics packages are no longer able to detect what type of information is in the file.

We have developed a simple and efficient algorithm for file type identification that combines first order byte frequency analysis and second order statistics of byte distribution.

Index Terms: Matlab, source, code, file type, recognition, identification, extension, forensic.

 

 

 

 

Figure 1. File types



A simple and effective source code for File Type Recognition System.

Release
Date
Major features
1.0

2009.05.14



We recommend to check the secure connection to PayPal, in order to avoid any fraud.
This donation has to be considered an encouragement to improve the code itself.

File Type Recognition System. Click here for your donation. In order to obtain the source code you have to pay a little sum of money: 200 EUROS (less than 280 U.S. Dollars).

Once you have done this, please email us luigi.rosa@tiscali.it
As soon as possible (in a few days) you will receive our new release of File Type Recognition System.

Alternatively, you can bestow using our banking coordinates:
Name :
Luigi Rosa
Address :
Via Pozzo Strada 5 10139 Torino Italy
Bank name:
Poste Italiane
Bank address:
Viale Europa 190 00144 Roma Italy
IBAN (International Bank Account Number) :
IT-50-V-07601-03600-000058177916
BIC (Bank Identifier Code) :
BPPIITRRXXX

The authors have no relationship or partnership with The Mathworks. All the code provided is written in Matlab language (M-files and/or M-functions), with no dll or other protected parts of code (P-files or executables). The code was developed with Matlab 2006a. Matlab is required. The code provided has to be considered "as is" and it is without any kind of warranty. The authors deny any kind of warranty concerning the code as well as any kind of responsibility for problems and damages which may be caused by the use of the code itself including all parts of the source code.

New - AI Trader
 Stock Price Trend Forecasting An emerging trading market is represented by binary options. Binary options are a convenient way of investments as they donít require a trader to forecast actual quotes.
 
New - Speaker Verification System
 Text-Independent Speaker Authentication There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication.
 
New - Java Face Recognition
 Java-based Biometric Authentication System Face recognition is essential in many applications, including mugshot matching, surveillance, access control and personal identification, and forensic and law enforcement applications.
 
New - Software References
 Papers and lectures A list of papers that included Advanced Source Code .Com in the references section. If you have written a paper where our software is cited in the references list please email us and your work will be published at our web site.
 
New - White Papers
 High Capacity Wavelet Watermarking Using CDMA Multilevel Codes This paper proposes a technique based on CDMA and multilevel coding in order to achieve a high capacity watermarking scheme. The bits of watermark are grouped together and for each sequence a different modulation coefficient is used.
 
New - WebCam Face Identification
 Face Recognition Based on Fractional Gaussian Derivatives Local photometric descriptors computed for interest regions have proven to be very successful in applications such as wide baseline matching, object recognition, texture recognition, image retrieval, robot localization, video data mining, building panoramas, and recognition of object categories.
 
New - Speaker Recognition System
 Source code for speaker recognition
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.
 
New - Speech Recognition System
 Source code for isolated words recognition
Speech recognition technology is used more and more for telephone applications like travel booking and information, financial account information, customer service call routing, and directory assistance. Using constrained grammar recognition, such applications can achieve remarkably high accuracy.
 



The MathWorks, Inc. Google NeuralNetworks.It Octave Scilab The R Project for Statistical Computing Python Other available resources English Dictionary Download .Com
 
Software Info    About us