Skip to content
2000
Volume 2, Issue 1
  • ISSN: 2666-4844
  • E-ISSN: 2666-4852

Abstract

Forensic science in India has evolved over 100 years, with the first official laboratory being the Calcutta Forensic Science Laboratory in Kolkata founded in 1952. Modernization has led to the establishment of numerous central, state, and regional forensic laboratories and advancements in technology such as DNA profiling, pathology, forensic toxicology, and forensic anthropology. As the need for forensic education in India increases, educational institutions and universities have started offering forensic science as a subject. India has collaborated with international forensic organizations to stay updated on global developments. Contemporary studies in forensic sciences are crucial for adapting to technological advancements, addressing emerging crimes, improving DNA analysis, promoting interdisciplinary approaches, and maintaining quality assurance and standards. Forensic science plays a significant role in the humanitarian efforts, including the identification of missing people and victims of mass disasters. Advanced imaging techniques are crucial in forensic investigations. Indian forensic science education is divided into undergraduate and postgraduate programs, offering bachelor's degrees and specialized courses in areas like forensic toxicology, DNA analysis, and digital forensics.

Loading

Article metrics loading...

/content/journals/cfs/10.2174/0126664844310900240520073926
2024-06-06
2025-09-13
Loading full text...

Full text loading...

References

  1. TanwarG.S. PooniaA.S. Live forensics analysis: Violations of business security policyInternational Conference on Contemporary Computing and Informatics (IC3I)27-29 NovemberMysore, India201497197610.1109/IC3I.2014.7019695
    [Google Scholar]
  2. BoatengY.E.O. Cyber-security challenges with smes in developing economies: Issues of confidentiality, integrity & availability (CIA).Institut for Elektroniske Systemer, Aalborg Universitet2013
    [Google Scholar]
  3. JayasinghB.B. PatraM.R. MaheshD.B. Security issues and challenges of big data analytics and visualization2nd International Conference on Contemporary Computing and Informatics (IC3I)14-17 DecemberGreater Noida, India201620420810.1109/IC3I.2016.7917961
    [Google Scholar]
  4. RaghavanS. RaghavanS.V. A study of forensic & analysis tools8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)21-22 NovemberHong Kong, China20131510.1109/SADFE.2013.6911540
    [Google Scholar]
  5. GuptaA. Privacy preserving efficient digital forensic investigation frameworkSixth International Conference on Contemporary Computing (IC3)08-10 AugustNoida, India201338739210.1109/IC3.2013.6612225
    [Google Scholar]
  6. ChaitraB. ReddyP.V.B. A Study on Digital Image Forgery Techniques and its DetectionInternational Conference on contemporary Computing and Informatics (IC3I)12-14 DecemberSingapore201912713010.1109/IC3I46837.2019.9055573
    [Google Scholar]
  7. DarganS. KumarM. Writer Identification System Based on Offline Handwritten Text in Gurumukhi ScriptSixth International Conference on Parallel, Distributed and Grid Computing (PDGC)06-08 NovemberWaknaghat, India202054454910.1109/PDGC50313.2020.9315842
    [Google Scholar]
  8. RamadhaniE. HariyadiD. NastitiF.E. A Bibliometrics Analysis of Digital Forensics Research in Indonesia Based on Scopus Index: 2012-2021IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA)04-05 NovemberYogyakarta, Indonesia20221610.1109/ICITDA55840.2022.9971449
    [Google Scholar]
  9. VaughnR. DampierD. Digital Forensics--State of the Science and Foundational Research Activity40th Annual Hawaii International Conference on System Sciences (HICSS'07)03-06 JanuaryWaikoloa, HI, USA200726326310.1109/HICSS.2007.174
    [Google Scholar]
  10. ŽagarM. DelijaD. SirovatkaG. Setting up digital forensics laboratory: Experience of Zagreb University of Applied Sciences41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)21-25 MayOpatija, Croatia20180530053310.23919/MIPRO.2018.8400101
    [Google Scholar]
  11. KumarA. ChauhanM. JainA.K. JohriP. Analysis on Digital Forensics Challenges and Anti-forensics Techniques in Cloud Computing11th International Conference on System Modeling & Advancement in Research Trends (SMART)16-17 DecemberMoradabad, India202269970210.1109/SMART55829.2022.10047629
    [Google Scholar]
  12. WangC. ZhaoY. DongJ. Research on Electronic Data Forensics Based on RAM2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)06-08 AugustNanjing, China202114114410.1109/ISCEIC53685.2021.00036
    [Google Scholar]
  13. AlshammariH. ElleithyK. Deep Fake and Digital ForensicsIEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)New York, NY, USA20230283028810.1109/UEMCON59035.2023.10315974
    [Google Scholar]
  14. AsasfehA. DmourA.N.A. HamadiA.H. MansoorW. GhazalT.M. Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital ForensicsIEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)Abu Dhabi, United Arab Emirates2023848810.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449
    [Google Scholar]
  15. NanceK. HayB. BishopM. Digital Forensics: Defining a Research Agenda42nd Hawaii International Conference on System Sciences05-08 JanuaryWaikoloa, HI, USA20091610.1109/HICSS.2009.160
    [Google Scholar]
  16. BeckerE. GuptaM. AwayshehF.M. Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics EnhancementsIEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)14-17 NovemberAbu Dhabi, United Arab Emirates202399199810.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361416
    [Google Scholar]
  17. BhandariS. JusasV. The Phases Based Approach for Regeneration of Timeline in Digital ForensicsInternational Conference on INnovations in Intelligent SysTems and Applications (INISTA)24-26 AugustNovi Sad, Serbia20201610.1109/INISTA49547.2020.9194649
    [Google Scholar]
  18. LiuX. Visualizing the Knowledge Domain of Intelligent Justice Research Between 2000 and 2019: A Bibliometric Analysis4th Annual International Conference on Data Science and Business Analytics (ICDSBA)05-06 SeptemberChangsha, China202011111410.1109/ICDSBA51020.2020.00036
    [Google Scholar]
  19. CookM. MarneridesA. JohnsonC. PezarosD. A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future DirectionsIEEE Communications Surveys & Tutorials20232531705174710.1109/COMST.2023.3264680
    [Google Scholar]
  20. CaseyE. PetersonK. PfeifD. SodenC. Motivating STEM+C Learning with Social Impact of Cybersecurity and Digital ForensicsResearch on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)10-11 MarchPortland, OR, USA20201210.1109/RESPECT49803.2020.9272465
    [Google Scholar]
  21. LinC. ZhitangL. CuixiaG. Automated Analysis of Multi-Source Logs for Network ForensicsFirst International Workshop on Education Technology and Computer Science07-08 MarchWuhan, China200966066410.1109/ETCS.2009.153
    [Google Scholar]
  22. DuJ. GongS. Research on the clients of network forensics3rd International Conference on Computer Research and Development11-13 MarchShanghai, China201146646810.1109/ICCRD.2011.5764059
    [Google Scholar]
  23. AmatoG. Face Verification and Recognition for Digital Forensics and Information Security7th International Symposium on Digital Forensics and Security (ISDFS)10-12 JuneBarcelos, Portugal20191610.1109/ISDFS.2019.8757511
    [Google Scholar]
  24. CasinoF. DasaklisT.K. SpathoulasG.P. AnagnostopoulosM. GhosalA. BoroczI. SolanasA. ContiM. PatsakisC. Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.IEEE Access202210254642549310.1109/ACCESS.2022.3154059
    [Google Scholar]
  25. BhavsarK. PatelA. ParikhS. Approaches to Digital Forensics in the Age of Big Data9th International Conference on Computing for Sustainable Global Development (INDIACom)23-25 MarchNew Delhi, India202244945310.23919/INDIACom54597.2022.9763231
    [Google Scholar]
  26. ShayauY.H. AsmawiA. RumS.N.M. AriffinN.A.M. Digital Forensics Investigation Reduction Model (DIFReM) Framework for Windows 10 OSIEEE 9th International Conference on System Engineering and Technology (ICSET)07-07 OctoberShah Alam, Malaysia201945946410.1109/ICSEngT.2019.8906387
    [Google Scholar]
  27. MahendraN.F. KhairunnisaR. Digital Forensic Analysis of Online Dating Applications on Android Using the Digital Forensic Research Workshop 2001 Investigation ModelIEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs)22-24 AugustBogor, Indonesia202321822310.1109/ICoCICs58778.2023.10276752
    [Google Scholar]
  28. PatelY. RughaniP.H. DesaiD. Network Forensic Investigation of Collaborative Robots: A Case Study7th International Conference on Mechanical Engineering and Robotics Research (ICMERR)09-11 DecemberKrakow, Poland2022515410.1109/ICMERR56497.2022.10097787
    [Google Scholar]
  29. DingF. ShenZ. ZhuG. KwongS. ZhouY. LyuS. ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN.IEEE Trans. Cybern.202353117162717310.1109/TCYB.2022.321029436264736
    [Google Scholar]
  30. JianguoJ. JiumingC. QianY. KunyingL. ChaoL. Research and design of similar file forensics system based on fuzzy hashElectronic and Automation Control Conference20-22 MayChongqing, China201634234610.1109/ITNEC.2016.7560378
    [Google Scholar]
  31. SabirE. NandiS. AbdAlmageedW. NatarajanP. BioFors: A Large Biomedical Image Forensics DatasetIEEE/CVF International Conference on Computer Vision (ICCV)10-17 OctoberMontreal, QC, Canada2021109431095310.1109/ICCV48922.2021.01078
    [Google Scholar]
  32. ZhengJ. TanY-A. ZhangX. LiangC. ZhangC. ZhengJ. An Anti-Forensics Method against Memory Acquiring for Android DevicesIEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)21-24 JulyGuangzhou, China201721421810.1109/CSE‑EUC.2017.45
    [Google Scholar]
  33. StrandbergK. NowdehiN. OlovssonT. A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection.IEEE Trans. Intell. Veh.2023821350136710.1109/TIV.2022.3188340
    [Google Scholar]
  34. YeJ. A fuzzy decision tree reasoning method for network forensics analysisWorld Automation Congress (WAC)11-15 OctoberSan Antonio, TX, USA2022414510.23919/WAC55640.2022.9934389
    [Google Scholar]
  35. NaingS.K. OoS.T. OoH.W.Y. LinP.Y. NweK.M. ThwinM.M.S. IoT Network Forensics based on Transport LayerIEEE Conference on Computer Applications (ICCA)27-28 FebruaryYangon, Myanmar202331231710.1109/ICCA51723.2023.10182142
    [Google Scholar]
  36. MgembeP.I. MsongaleliL.D. ChaundharyN.K. Progressive Standard Operating Procedures for Darkweb Forensics Investigation10th International Symposium on Digital Forensics and Security (ISDFS)06-07 JuneIstanbul, Turkey20221310.1109/ISDFS55398.2022.9800830
    [Google Scholar]
  37. VaughnR.B. DampierD.A. The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity40th Annual Hawaii International Conference on System Sciences (HICSS'07)03-06 JanuaryWaikoloa, HI, USA2007265c265c10.1109/HICSS.2007.523
    [Google Scholar]
  38. NanceK. BishopM. Introduction to Digital Forensics: Education, Research, and Practice MinitrackHawaii International Conference on System Sciences07-10 JanuaryKauai, HI, USA20134879487910.1109/HICSS.2015.665
    [Google Scholar]
  39. MoriokaE. SharbafM.S. Digital forensics research on cloud computing: An investigation of cloud forensics solutionsIEEE Symposium on Technologies for Homeland Security (HST)10-11 MayWaltham, MA, USA20161610.1109/THS.2016.7568909
    [Google Scholar]
  40. ZhangY. LinY. Research on the Key Technology of Secure Computer ForensicsThird International Symposium on Intelligent Information Technology and Security Informatics02-04 AprilJian, China201064965210.1109/IITSI.2010.134
    [Google Scholar]
  41. PengB. WangW. DongJ. TanT. Image Forensics Based on Planar Contact Constraints of 3D Objects.IEEE Trans. Inf. Forensics Security201813237739210.1109/TIFS.2017.2752728
    [Google Scholar]
  42. TannerA. DancerF.C. HallJ. ParkerN. BishopR. McBrideT. The Need for Proactive Digital Forensics in Addressing Critical Infrastructure Cyber AttacksInternational Conference on Computational Science and Computational Intelligence (CSCI)Las Vegas, NV, USA202297698210.1109/CSCI58124.2022.00174
    [Google Scholar]
  43. FernandesR. ColacoR. M. ShettyS. A New Era of Digital Forensics in the form of Cloud Forensics: A ReviewSecond International Conference on Inventive Research in Computing Applications (ICIRCA)15-17 JulyCoimbatore, India202042242710.1109/ICIRCA48905.2020.9182938
    [Google Scholar]
  44. LvX. XiaY. ZhaoJ. QiaoP. ZhuB. Research on Key Technologies of Digital Multimedia Passive Forensics7th International Conference on Systems and Informatics (ICSAI)13-15 NovemberChongqing, China20211510.1109/ICSAI53574.2021.9664045
    [Google Scholar]
  45. BaggiliI. OduroJ. AnthonyK. BreitingerF. McGeeG. Watch What You Wear: Preliminary Forensic Analysis of Smart Watches10th International Conference on Availability, Reliability and Security24-27 AugustToulouse, France201530331110.1109/ARES.2015.39
    [Google Scholar]
  46. ZhangH. ChenB. WangJ. ZhaoG. A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics.IEEE Trans. Circ. Syst. Video Tech.202333266167610.1109/TCSVT.2022.3207310
    [Google Scholar]
  47. MouhtaropoulosA. LiC-T. GroblerM. Proactive Digital Forensics: The Ever-Increasing Need for StandardizationEuropean Intelligence and Security Informatics Conference22-24 AugustOdense, Denmark201228928910.1109/EISIC.2012.66
    [Google Scholar]
  48. StoyanovaM. NikoloudakisY. PanagiotakisS. PallisE. MarkakisE.K. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues In: Communications Surveys TutorialsIEEE20202221191122110.1109/COMST.2019.2962586
    [Google Scholar]
  49. GrisposG. BastolaK. Cyber Autopsies: The Integration of Digital Forensics into Medical ContextsIEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)28-30 JulyRochester, MN, USA202051051310.1109/CBMS49503.2020.00102
    [Google Scholar]
  50. ShehinA.U. SankarD. Adaptive Bilateral Filtering Detection Using Frequency Residuals for Digital Image Forensics29th International Conference on Systems, Signals and Image Processing (IWSSIP)01-03 JuneSofia, Bulgaria20221610.1109/IWSSIP55020.2022.9854436
    [Google Scholar]
  51. MehreenS. AslamB. Windows 8 cloud storage analysis: Dropbox forensics12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)13-17 JanuaryIslamabad, Pakistan201531231710.1109/IBCAST.2015.7058522
    [Google Scholar]
  52. XiongA. HuangY. WuY. ZhangJ. LongL. An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)01-03 AugustNew York, NY, USA20181660166310.1109/TrustCom/BigDataSE.2018.00246
    [Google Scholar]
  53. GoyalR. Blockchain Technology in Forensic Science. A Bibliometric Review3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)17-18 DecemberGreater Noida, India20211570157310.1109/ICAC3N53548.2021.9725660
    [Google Scholar]
  54. LiuZ. ZhuN. WangK. Recaptured Image Forensics Based on Generalized Central Difference Convolution NetworkIEEE 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI)10-12 JuneXiamen, China2022596310.1109/SEAI55746.2022.9832331
    [Google Scholar]
  55. GopanG. SubramanianA. The Intercorrelation between Zero trust, Dark web, and its Implications in the field of Digital ForensicsInternational Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)27-28 JanuaryBengaluru, India202319720310.1109/IITCEE57236.2023.10091054
    [Google Scholar]
  56. QawasmehE. Al-SalehM.I. On Producing Events Timeline for Memory Forensics: An Experimental StudySeventh International Conference on Information Technology Trends (ITT)25-26 NovemberAbu Dhabi, United Arab Emirates20201510.1109/ITT51279.2020.9396748
    [Google Scholar]
/content/journals/cfs/10.2174/0126664844310900240520073926
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test