25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 8.2 shows the improved accuracy of image-only JPEG fragment<br />

recognition with an improved result of 75.5% of this category being correctly<br />

classified. The hybrid approach took the most successful method for each<br />

classification from Chapter 7 and continued to develop the approach into a<br />

single identification method [Chapter 8]. <strong>Final</strong>ly for the reassembly methods,<br />

Section 9.8 shows the results of reassembly with the lowest result for data set<br />

2 for the thumbcache_96 file with 81.26% of available fragments correctly<br />

reassembled; the result was due to the high number of clashes on image-only<br />

fragments. The thumbcache_idx file was reassembled with 100% accuracy.<br />

10.6 Automation<br />

“Automation is defined as a scientific process which has been implemented<br />

to minimise the interaction of an analyst.” [Chapter 4.3.2]<br />

This process has been shown to automate the identification and reassembly of<br />

thumbnail cache file fragments by implementing a selection of methods<br />

documented in Chapters 7, 8, and 9. The extraction of thumbnail cache<br />

artefacts is also automated and documented in Section 9.10. As the previous<br />

section showed both the identification and reassembly stages of this<br />

methodology have failed to maximise the data available [Sections 7.10, 8.7,<br />

and 9.8]; therefore the resulting reassembled files may not be completed and<br />

may require further work by an analyst to identify any missing fragments should<br />

they exist. In the case of a potential clash of fragments for a position in a file<br />

during reassembly an analyst would have to perform further verification by<br />

hand. The extensive log files would assist an analyst by documenting the<br />

reasoning for each potential fragment and providing the original locations of the<br />

fragments; the original locations allow an analyst to place the pieces in context.<br />

Page<br />

274

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!