Abstract

A Method of Forensic Authentication via File Structure and Media Log Analysis of Digital Images Captured by iPhone

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call