Paper
4 August 2022 Douyin clues forensics analysis using knowledge graph
Ying Yang, Xin Yu, Xinhao Zhang, Yuying Li, Lili Yan, Hui Yang
Author Affiliations +
Proceedings Volume 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022); 123061J (2022) https://doi.org/10.1117/12.2641341
Event: Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 2022, Changchun, China
Abstract
Because of the interaction of Douyin, it has become a new generation of social tools. There is a huge browse every day, which will leave various access data. Internet criminals take advantage of the characteristics of low cost, high fraud rate and strong concealment, and the interests of users are easily violated on social platforms. Therefore, it is of far-reaching significance to protect the interests of users by forensic analysis of social platforms. In this paper, we conduct forensic analysis of Douyin. The effective data displayed by Douyin lack other relevant information, such as various id information, hardware and software information, and dynamic details information. By building a proxy server to obtain the user information data of Douyin, the knowledge map of key data information is drawn, and the extracted information is transformed into the relationship map for visual display, which improves the efficiency of tracking analysis for analysts to fix relevant evidence.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ying Yang, Xin Yu, Xinhao Zhang, Yuying Li, Lili Yan, and Hui Yang "Douyin clues forensics analysis using knowledge graph", Proc. SPIE 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 123061J (4 August 2022); https://doi.org/10.1117/12.2641341
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Forensic science

Video

Computer simulations

Network security

Social networks

Visualization

Data hiding

Back to Top