{"id":"https://openalex.org/W2076379225","doi":"https://doi.org/10.1109/ic3.2013.6612225","title":"Privacy preserving efficient digital forensic investigation framework","display_name":"Privacy preserving efficient digital forensic investigation framework","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2076379225","doi":"https://doi.org/10.1109/ic3.2013.6612225","mag":"2076379225"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101657599","display_name":"Anuradha Gupta","orcid":"https://orcid.org/0000-0003-1054-1188"},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anuradha Gupta","raw_affiliation_strings":["Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India","Computer Science and Engineering, Jaypee Institute of Information Technology,Noida,India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India","institution_ids":["https://openalex.org/I154970844"]},{"raw_affiliation_string":"Computer Science and Engineering, Jaypee Institute of Information Technology,Noida,India","institution_ids":["https://openalex.org/I154970844"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101657599"],"corresponding_institution_ids":["https://openalex.org/I154970844"],"apc_list":null,"apc_paid":null,"fwci":2.4268,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91246395,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"392"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8343489170074463},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7468659281730652},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.730384349822998},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6325863003730774},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48177430033683777},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4678873121738434},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.37001243233680725}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8343489170074463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468659281730652},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.730384349822998},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6325863003730774},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48177430033683777},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4678873121738434},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.37001243233680725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W39046966","https://openalex.org/W1029411536","https://openalex.org/W1647086383","https://openalex.org/W2074951158","https://openalex.org/W2151051227","https://openalex.org/W2153320243","https://openalex.org/W2159280848","https://openalex.org/W2330756720","https://openalex.org/W2544062440","https://openalex.org/W6636782134"],"related_works":["https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4242633011","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W2536999591","https://openalex.org/W4244711387","https://openalex.org/W93745046","https://openalex.org/W4283205458"],"abstract_inverted_index":{"In":[0,83],"today's":[1],"era,":[2],"efficiency":[3,18,98],"of":[4,19,30,34,38,66,68,111,138,172],"digital":[5,14,31,78,104,119,139],"forensic":[6,15,105],"investigation":[7,20,79,106,120,140,149],"process":[8,80,121],"is":[9,115],"the":[10,23,84,95,100,112,118,125,134,144,162,170],"biggest":[11],"challenge":[12],"for":[13,175],"community.":[16],"The":[17,108,155],"depends":[21],"on":[22,169],"other":[24],"various":[25],"factors":[26],"like":[27],"storage":[28,43],"capacity":[29],"media,":[32],"proficiency":[33],"investigator":[35],"and":[36,58,99,123,136,165],"type":[37],"investigating":[39,49],"case.":[40],"Moreover,":[41],"these":[42],"devices":[44],"do":[45],"not":[46],"store":[47],"only":[48],"case":[50],"related":[51],"data":[52],"but":[53],"also":[54,166],"stores":[55],"accused":[56],"personal":[57],"professional":[59],"information":[60],"which":[61],"can":[62],"lead":[63],"a":[64],"breach":[65],"privacy":[67,101],"accused.":[69],"Very":[70],"little":[71],"attention":[72],"has":[73],"been":[74],"given":[75],"to":[76,116,160],"make":[77,117],"fully":[81],"automated.":[82],"Privacy":[85],"Preserving":[86],"Efficient":[87],"Digital":[88],"Forensic":[89],"Investigation":[90],"(PPEDFI)":[91],"framework,":[92],"we":[93,146],"bridge":[94],"gap":[96],"between":[97],"issue":[102],"in":[103,128],"process.":[107,141],"main":[109],"contribution":[110],"PPEDFI":[113],"framework":[114,157],"automated":[122],"shorten":[124],"turnaround":[126],"time":[127,137],"evidence":[129,163],"extraction":[130],"process,":[131],"thus":[132],"saving":[133],"cost":[135],"To":[142],"evaluate":[143],"system,":[145],"conducted":[147],"an":[148],"study":[150],"namely:":[151],"Digitized":[152],"Document":[153],"Fraud.":[154],"proposed":[156],"was":[158],"able":[159],"extract":[161],"files":[164],"rank":[167],"them":[168],"basis":[171],"their":[173],"relevancy":[174],"being":[176],"evidence.":[177]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
