75
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud

, , &

References

  • Akash, G., Chinmay, C., & Bharat, G. (2019). Sensing and monitoring of epileptical seizure under IoT platform. In Smart medical data sensing and IoT systems design in healthcare (pp. 201–223). IGI. https://doi.org/10.4018/978-1-7998-0261-7.ch009
  • Aysha, S., Maryam, S., Abdul, R. J., Chinmay, C., & Muhammad, R. (2021). Suspicious transaction detection in banking cyber–physical systems. Computers & Electrical Engineering, 1–17, 107596. https://doi.org/10.1016/j.compeleceng.2021.107596
  • Carrier, B., & Spafford, E. H. (2004). An event-based digital forensic investigation framework. In Digital Forensic Research Workshop (DFRWS), 11–13.
  • Cohen, F. B. (2012). Digital forensic evidence examination. Fred Cohen & Associates.
  • Denso, A. D. C. (2012). QR code essentials white paper. https://delivr.com/resources/files/1058/DENSO_ADC_QR_Code_White_ Paper.pdf
  • Du, X., Le-Khac, N.-A., & Scanlon, M. (2017). Evaluation of digital forensic process models with respect to digital forensics as a service. In 16th European Conference on Cyber Warfare and Security (ECCWS).
  • Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64–S73. https://doi.org/10.1016/j.diin.2010.05.009
  • Gary, P. (2001). DFRWS technical report: A road map for digital forensic research. In Digital Forensic Research Workshop, Utica, NY, p. 24.
  • Huo, L., Zhu, J., Singh, P. K., & Pavlovich, P. A. (2021). Research on QR image code recognition system based on artificial intelligence algorithm. Journal of Intelligent Systems, 30(1), 855–867. https://doi.org/10.1515/jisys-2020-0143
  • Indian Cybercrime Coordination Centre (I4C) (2023). Cybercrime categories. i4c.mha.gov.in.https://i4c.mha.gov.in/cyber-crime-categories.aspx
  • Parul, G., Mohammad, Z. K., Ravi, K. S., Omar, H. A., Surbhi, B., & Chinmay, C. (2021). Software reliability assessment using hybrid neuro-fuzzy model. Computers, Materials & Continua, 41(3), 891–902. https://doi.org/10.32604/csse.2022.019943
  • Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence, 1(3), 1–12.
  • Umadevi, M. (2021). Recent trends in cyber crime and challenges in preventing cyber crimes. International Journal of Innovative Research in Technology, 8(4), 701–713.
  • Zhang, Y., Li, B., & Sun, Y. (2020). Android encryption database forensic analysis based on static analysis. In 4th International Conference on Computer Science and Application Engineering, Sanya, China. https://doi.org/10.1145/3424978.3425068

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.