Abstract
Digital evidence is an integral part of any trial. Data is critical facts, encrypted information that requires explanation in order to gain meaning and knowledge. The current process of digital forensic research cannot effectively address the various aspects of a complex infrastructure. Therefore, digital forensics requires the optimal processing of a complex infrastructure that differs from the current process and structure. For a long time, digital forensic research has been utilized to discuss these issues. In this research, we offer a forensic investigation hybrid deep learning approach based on integrated multi-model data fusion (HDL-DFI). First, we concentrate on digital evidence collection and management systems, which can be achieved by an integrated data fusion model with the help of an improved brain storm optimization (IBSO) algorithm. Here, we consider several multimedia data’s for evidence purposes, i.e. text, image, speech, physiological signals, and video. Then, we introduce a recurrent multiplicative neuron with a deep neural network (RM-DNN) for data de-duplication in evidence collection, which avoids repeated and redundant data. After that, we design a multistage dynamic neural network (MDNN) for sentimental analysis to decide what type of crime has transpired and classify the action on it. Finally, the accuracy, precision, recall, F1-score, G-mean, and area under the curve of our proposed HDL-DFI model implemented with the standard benchmark database and its fallouts are compared to current state-of-the-art replicas (AUC).
Introduction
Digital forensics, a field that collects, analyses, and secures electronic data, may be used in court as evidence. In many circumstances, digital forensics may and does exist independently. Digital forensics investigations may be used for a variety of purposes [11]. In most criminal and civil courts, evidence is utilized to establish or deny accusations. Murder, theft, and violence against another individual are all considered criminal offences by the government. However, due of contractual differences between businesses, electronic discovery may be required in civil procedures [13, 14]. Encase is a digital data evidence collection system created by the American Guidance Cooperation and utilized by some domestic law enforcement organizations. This application may search the entire disc for a certain phrase and generate a list of the results (counting the file area, swap area, unallocated cluster, relaxed, and so on).
Because the digital data is so big, there is still a lot of hit data to sort through. Encase is unable to perform the following analysis. Data analysis and script programming are both time-consuming tasks that must be completed in order to satisfy the project’s needs. One of the first goals is to look into the income streams for MDMA providers on the crypto market. Before and after arrest, data on MDMA supply channels. The amount of crypto markets and vendor shops that continue to operate after many have been shut down by law enforcement is the third factor to be considered [2]. Because of these realities, unstructured data processing and analysis has to become a key advance in computer forensics. As a consequence, a software program was developed to assist investigators in finding and connecting the dots among the many pieces of evidence they gathered [7]. The “mass case information intelligence analyzing system,” detailed in this article and utilised in the collection of digital evidence, was developed in collaboration with the China Criminal Police College and Dalian University of Technology. One approach to do this is to make it easier to handle and analyse critical unstructured data.
The legitimacy of digital evidence is being called into doubt by more and more courts. Experts in the field must also have substantial technical skills, including knowledge of the procedures and standards often used to present prospective evidence in courts of law, in order for a judge or jury to think that the evidence offered is admissible. Judges should be able to convince forensic specialists that any possible digital evidence collected as part of the inquiry is real, trustworthy, and substantial. The digital forensic investigation technique [3]’s presentation phase is crucial. Investigators should also be conversant with a wide range of circumstances. This also shows that digital forensic investigations may be used in court [4] or other legal proceedings. Jurors will find it simpler to examine digital evidence if consistent digital forensics methodologies [8] are established [9]. Processes and standards are necessary for the advancement of digital forensics because they ensure that technologies are used appropriately and in accordance with digital forensics science. Because it is vital to analyze and comprehend data stored on critical digital devices while conducting DF investigations, BEA is used [13]. New frameworks based on BEA stages and existing DF process models are being developed in this project to provide more accurate information on what is required at each level. The Dubai Police Department analyses cyber stalking and the possession and transmission of indecent images of children based on 35 real-world digital criminal incidents (IIC). Following that, it’s utilized to investigate real-world digital criminal cases, including impersonation and defamation [8]. Scene analysis and physical evidence assessment are two common ways that criminal profiling is employed as an investigative technique. Based on prior offences and the actions of others, it’s simple to make assumptions about a suspected criminal’s personality and qualities [9].
A Major contribution to this proposed work is an enhancement in digital forensic investigation. A hybrid deep learning technique based integrated data fusion model is proposed in a digital forensic investigation (HDL-DFI). The main objective of the proposed HDL-DFI model is listed as follows: To the best of our information, we are the first to address two main issues in digital forensic investigation are optimal evidence collection and evidence protection To study and analyze the need for test datasets in the ground of digital forensics and discuss the details about integrated fusion data’s To propose a hybrid deep learning technique to enhance the process of evidence collection and evidence protection in digital forensic investigation A hybrid deep learning technique is used for sentimental analysis which classify what type of crime has occurred
The remainder of the paper is set up as follows: Section 2 announces current developments in the field of digital forensic investigation models. The issue description and scheme design of the proposed HDL-DFI model are explained in Section 3. Section 4 explains how the suggested HDL-DFI model works in conjunction with the mathematical model. Section 5 discusses the simulation findings and comparison analyses. Finally, Section 6 brings the paper to a close.
Related works
Many studies into digital evidence collecting and digital forensic inquiry have been conducted in recent years. Table 1 summarises and tabulates the literature in several aspects. The XeBag test has been detailed in video surveillance testing by Lim et al. [13]. An investigator may easily gather digital evidence using XeBag, including important court data from a variety of live organizations. XeBag is a certified container format that satisfies the generalization, scale, and integration criteria of a new digital certification container. To increase the spread of XeBag and to exploit their different data sources for forensics. XeBag/WinRAR and XML were employed. The Xbox Pack concept is useful since it can be used with a variety of extractor resources found in various file unit-based testing tools. Because XML still retains active data when extracted from a standard extractor and used as a public reader, a certain amount of security is provided because XeBag is kept independently.
Summary of research gaps
Summary of research gaps
The semantic network developed by Amato et al. [8] is an extensible algorithm that uses word processing methods to communicate concepts about a certain area in a consistent and systematic manner. Computer forensics is used to tackle domain extraction and extraction problems, as well as to increase the relevancy of the resources being assembled. For building linkages between domain organizations, this technique gives advantages, reasoning, and inference. Ryu et al. [9] have proposed a blockchain-based digital trial architecture for IoT contexts. All communication between IoT devices is stored as a company on a blockchain in a particular framework, making the current security network method simpler and more resilient. While retaining decentralized integrity, blockchain technology protects the accuracy and security of the data to be analysed. For data integrity protection, blockchain technology is the safest and most secure solution available. Jung et al. [12] presented an AutoTriage B-CoC model that allows for autonomous dredging collecting and blockchain uploads. Without human interaction, the highest accuracy and completeness of digital evidence may be accomplished. Experiments reveal that by simply inputting two key variables, Case-ID and Evidence-ID, a visual examiner can manage the protection and preservation of digital sources. The precise design of the tasks associated with the four phases, namely testing, documentation, blockchain, and reporting, is also a useful reference for practical use. Nikkel [6] suggested a digital forensics (Fintech) segment that would include financial technology. Fintech fees, financial transactions, and other financial transactions are all familiar to the Digital Transformation Society. Financial technology are used and abused by criminals for underground fraud, robbery, money laundering, and other financial operations. FinTech and digital payment process investigations should be considered technical subsets of digital forensics. Because certain species are tightly protected and others are traded legitimately, Trail [13] recommended taxonomic identification of animal items to assess if a crime has occurred. Hence, the animal items may be subject to customs clearance or other regulations, this identification must frequently be completed swiftly.
Providing trained specialists with digital photographs is a highly efficient technique to get a temporary identification in a timely manner. These picture IDs provide a probable justification for catching a suspect species of animal, which will be then sent to be confirmed and identified in person. Photo labels may also help to speed up lawful commerce by ensuring that animal items do not come from endangered species. The legal resource management software (LEChain) created by Li et al. [14] regulates the whole flow of resources across all court documents and to improves access to evidence during court hearings and jury voting. To safeguard the anonymity of witnesses and to identify them anonymously, they utilize brief and regular signatures. Then, for test access, we utilize a micro access control based on encrypted text policy attribute encryption. A secure voting system that uses the federal blockchain to record resource transactions and safeguard juror confidentiality. Awusondavid et al. [11] used Blockchain distributed ledger technology (DLT) to built and deploy BCFLs, which are transaction records. Smart contracts on the blockchain are used to ensure record integrity and create a transparent network. Check all transaction records and make sure they aren’t tampered with. Compliance with the BCFL and the EU’s Public Data Protection Regulations will be bolstered.
Bhardwaj et al. [10] suggested a crypto-proof security and resource-collection model for detecting malicious software assaults, safeguarding resources, and classifying network traffic data as harmful or malicious. It effectively saves and protects the saved digital materials. Using in-depth learning and machine learning classifiers, the malware software harvests transport information. N-depth training has been proven in several studies to successfully assist in the processing of massive data sets. Hemdan et al. [24] have proposed a cloud forensics investigation model (CFIM) for investigating and investigating cloud crimes in a timely manner. When executing digital forensics on a cloud website using a forensic server, the organization supports the notion of forensics as a service, which provides a number of advantages. This architecture enables you to trace dangerous users in the cloud, repair virtual computers for future usage, and assist and ease the cloud’s digital search process. The core concept is to film a virtual computer that can monitor, detect and record its own actions. Investigators and researchers may use CFIM to get digital resources concerning suspected VMs by downloading journal files and associated information.
Problem statement
Recently, we have proposed a digital proof collective model for digital evidence investigation using integrated data models are text, audio and video [1]. We recommend a live data collection process for the digital resource collection process. Virtual evidence is obtained and reconstructed by researching and processing outdated and unskilled evidence. This method focuses on how a powerful computer and an analyzer may assist in the analysis and exploration of virtual resources. An e-discovery technique is employed to secure and evaluate virtual. For the defence and analysis of virtual evidence, an effective mechanism of disseminating virtual suggestions among the general public and the forensic section must be devised. This communication system defends against assaults by mid-humans. To avoid a successful duplicate of the data collection, divide the number of users who shared the same data by the number of uses. It may or may not be known when numerous users send data. By lowering storage requirements, these solutions enhance computer and data storage. The effectiveness of forensics depends on resource conservation. Security methods nowadays are built on a federal storage system with third parties, which always leads to a slew of issues [1, 24]. Strict security standards are usually required in centralized structures [9]. Intruding into a centralized storage terminal might result in major problems like data loss and corruption. The integrated system, like the present digital forensic system, is readily undermined in terms of openness and trustworthiness. People continue to have doubts about service dependability [6, 10-13]. Furthermore, various plans have different manufacturers and service providers, necessitating the need for a unified digital forensic system.
Evidence data needs to be checked for verification, but creating them is not an easy task. A poorly structured and documented test database undermines any test it uses and undermines the reliability of any test result [1]. In principle, this section should help those who do exactly that, without wasting resources, considering the time, effort, and knowledge required to set up a database. However, there are currently some criteria and best practices for creating databases in digital forensics. The current process of digital research cannot effectively address the various aspects of a complex infrastructure. Therefore, digital forensics and digital forensics [10, 13] require the optimal processing of a complex infrastructure that differs from the current process and structure. Digital forensic research has long been used to discourse on these subjects.
We checked the basic compatibility with recent technologies implemented in existing and still needed a lot of improvement, so by using the proposed HDL-DFI model, we also addressed the current forensic changes, which will be used in current trends based on data collection, data deduplication and the type of crime committed. In this paper, a hybrid deep learning technique based on an integrated fused data model is proposed for digital forensic investigation (HDL-DFI). The main contributions of the proposed HDL-DFI model are given as follows: First, we concentrate on digital evidence collection and management systems which can be achieved by an integrated data fusion model with the help of improved brain storm optimization (IBSO) algorithm. IBSO is a bio-inspired algorithm [32] which provides an optimal solution for multi-objective problems. Here; we consider several multimedia data’s for evidence purposes, i.e. text, image, speech, physiological signals, and video [32]. Then, we introduce a recurrent multiplicative neuron with a deep neural network (RM-DNN) for data de-duplication in evidence collection. The main objective of RM-DNN based de-duplication is to avoid repeated and redundant data’s. After that, we designed a novel multistage dynamic neural network (MDNN) for sentimental analysis that can be used to determine what type of criminality has happened and classify the action on it. Finally, the simulation results of our proposed HDL-DFI model are compared to the current state-of-the-art models in terms of accuracy, recall, precision, f-measure, detection rate, and false alarm rate using the standard benchmark database.
System design of proposed HDL-DFI model
This section illustrates how the HDL-DFI model functions. While data and semantics are essential challenges in structured and unstructured data, big data analysis plays a vital part in digital evidence gathering and management systems. Big data that has been acquired digitally has been converted into a number of different technologies. We used the multi-model data fusion throughout the data management phase to lessen the complexity of the data dimensionality issue. The forensic section may carefully monitor and take fast action if the complainant produces substantial criminal evidence. For multi-model data fusion, we used improved brain storm optimization (IBSO) technique. After that, we used the RM-DNN approach to calculate repeated data in the data de-duplication phase. Multiple people may exchange digital resources concerning criminal activity, such as audio, video, and text chats. Finally, the emotive analysis is performed on the multi-model digital evidence to categorize the criminal acts. The suggested HDL-DFI model’s system architecture is shown in Fig. 1.

System design of proposed HDL-DFI model.
THE HDL-DFI framework, which I proposed in my research and which consists of three stages, is discussed in this section. Digital forensic research cannot address complicated infrastructure adequately. It is difficult to preserve digital evidence, such as gathering data and minimizing duplication, and reporting evidence to the court. Digital forensics has long been used to examine these challenges. We offer a forensic hybrid deep learning approach based on multi-model data fusion (HDL-DFI).
First, we focus on digital evidence collection and management systems using an integrated data fusion model and an improved IBSO algorithm. Prior to moving on to the IBSO algorithm, the focus of this study was on gathering and managing digital evidence. The bio-inspired algorithm IBSO gives an optimal solution for multi-objective problems. Evidence can be in the form of text, images, sounds, physiological indications, and video.
Then, we use a recurrent multiplicative neuron with a deep neural network (RM-DNN) to get rid of repeated and redundant data.
Finally, we developed a multistage dynamic neural network (MDNN) for sentimental analysis to classify the crime. Preventative measures are grouped into categories according to the nature and severity of the crime. A common benchmark database is used to evaluate HDL-accuracy, DFI’s precision, recall, F-measures, and false alarm rates in comparison to existing models.
Digital evidence collection and management system
The integrated fusion model works as follows: if a user wants to upload virtual proof, it can be used for live data collection and filling by registering seven W’s basic questionnaires about the crime. Multimodal data is any kind of data that includes text, images, speech, video, numbers, graphs, physical signals, time, relationships, and groups.
Using our proposed model, anyone who has seen or heard evidence of a real crime based on a conversation can send it to the cyber forensics department. Once the data can be uploaded through registration to a cloud database using a standard resource connection and the proof can be put into a category based on where it was submitted, the IBSO will be able to solve multi-objective problems in the best way. Here, we look at different kinds of multimedia data, such as text, images, speech, psychological signals, and video that can be used as evidence.
Specifically, for the purpose of multi-modal data fusion, Improved Brain Storm optimization (IBSO) can be utilized to improve digital evidence collection and management systems. The brainstorm principle is inspired by the brain storm optimization (BSO) approach as a widely used tool to enhance creativity in companies that is widely recognized as a way to promote creative thinking. A practical solution instead of a solution reflects the concept of BSO. Follows the rules of group transfer of BSO concepts and uses clustering, modification, and operator work.
In this paper, we extend the BSO behavior as improved BSO called (IBSO) for digital evidence collection and management systems, especially for multi-model data fusion. In IBSO practice, n ideas begin at the approximate solution location and are then assessed based on their workout function. The following M cluster centre points are chosen at random and begin as n thoughts, where M is less than n. IPSO picks one or two clusters of q-One probability throughout the formation procedure. After that, a random notion with the chance of q-two centres was chosen based on the selection of one or two clusters, a cluster centre or q-one-center. The following is an example of a function.
The maximum and current number of iterations are represented by the Rand value, which ranges from 0 to 1, respectively. K is a preset parameter that changes the logging function’s slope. A freshly developed thought is valued, and if the exercise value is higher than the present idea, the old one is replaced. For optimum results, the IBSO algorithm should employ both global and local search location information for solutions identified thus far. Local search solutions enhance information exploitation, while global search information leads to the exploration of areas of trust. In addition, the Multiple Model Differential Assessment (MMDE) Strategy Mutation and Shortcut Plan are successfully integrated into IBSO.
The main reason for integrating a different evolutionary strategy into the IBSO is that it can use the DE based primarily on distance and directional information and should not be biased against pre-defined guidelines. X
i
created a new concept, combining all existing ideas according to Y
j
into two existing random concepts, Yr1 and Yr2
Where, f is the mutation scaling factor that influences the difference between two ideas, and R1 and R2 are chosen at random from the cluster by opposite integers. By shifting competing vectors and enhancing demographic variety, the crossover feature is employed to produce novel solutions. We will enable you to investigate this notion while generating a PSO operator if two of the two clusters are common, based on the probability of the specified concepts (1, p-one) (1, p-2 centers). The value of the difference between the best idea in each cluster and two common concepts in two randomly chosen clusters. Is defined as the operator of two common notions’ distinct development
Where, f is the mutation mounting factor, Gobal Idea is the best idea in all clusters, Yr1 and Yr2 represent the ordinary idea of cluster 1 and cluster 2. To make new solutions, utilize the shortcut function. First, look at the configuration component. It retains approximately 1 for nearly half a generation before becoming 0. This strategy of balancing research and exploitation over search generations may also be used with this method of step size management. It only works at very short intervals, however.
The dynamic mutation function is described as follows
Rand is a random value from 0 to 1. The maximum frequency and current frequency indicate the maximum number of repetitions and the number of current repetitions, respectively. The working function of proposed IBSO algorithm is given in Algorithm 1.
Algorithm 1 Multi-Model fusion using IBSO algorithm
After data fusion, we need to remove unwanted and repeated data’s from the given set. Here, we proposed a recurrent multiplicative neuron with a deep neural network (RM-DNN) technique for the de-duplication process. Digital evidence to protect human rights and prevent crime. The integration of digital evidence protection with the integration of the template model and the general subdivision of digital evidence is concerned, and the collection, analysis, and security model of digital evidence is implemented. The ultimate goal is to store multimedia data in a research model based on effective automated classification and duplication techniques. N should be the number of research samples. First, the RM-DNN input number is calculated, which includes the values q and p. The outcomes of the particular RM-DNN model may then be determined using these values of q and p.
Fist, we prepare loop counter K (K = 0). Upsurges K by1 (K = K+1). Calculations for Kth learning example are achieved. RM-DNN has only one hidden layer neuron, which we consider. The inputs of RM-DNN are. Ys - 1, Ys - 2, . . . Ys - p, Es - 1, Es - 2, . . . . Es - p. Neuron activation value is expressed as a net and is derived from the development of inputs to the RM-DNN by consistent weights. When K = 1, Es - 1, Es - 2, . . . . Es - pare taken as 0 since the output of RM-DNN has not been considered yet. When K = 2, Es - 1, can be considered. Es - 1, equals to (desired
s
- output
s
) since the output of RM-DNN for the first scholarship sample was found. However, Es - 2, . . . . Es - p, are taken as 0. In a similar way, last p-K terms of Es - 1, Es - 2, . . . . Es - p will be taken as 0 for K ≤ p. if K > p then, each Es - j (j = 1, 2, . . . p) can be calculated. Let ZYj and aYj (j = 1, 2, . . . p) be weights, which connect Ys - 1, Ys - 2, . . . Ys - p, input to the neuron and, the connected bias values, respectively. Let Zej and aej (j = 1, 2, . . . p) be weights which connect Es - 1, Es - 2, . . . . Es - p inputs to the neuron and the connected bias values, correspondingly. Thus, for K-th learning sample, beginning value of the neuron netk can be intended as,
RM-DNN will utilise the value of Es worth as an input for the next training sample. If KN, go back to the previous step. Otherwise, the algorithm should be terminated. To train the suggested RM-DNN model, we use photon swarm optimization (PSO). The PSO approach has produced superior results in many applications than previously established methods, such as the Newton method, which needs gradient design and derivatives. When the derivative is very difficult to compute, PSO may provide excellent results. As a result, in recent years, this optimization strategy has received a lot of attention. PSO is used to train the proposed model since RM-DNN model derivatives are difficult to come by. In the PSO algorithm, positions of a photon are weights of proposed RM-DNN model. Hence, a photon has 2 (q + p) positions. Positions of each Kth (K = 1, 2,.. qN) particles’ positions and velocities are randomly single-minded and kept in vectors YK and UK given as follows:
Algorithm 2 Data de-duplication using RM-DNN technique
The values of the estimation function of each particle are calculated using the average square error (mse) below.
We can get the ultimate optimum solution for our multi-objective issue from this. The ideal heaviness values of the RM-DNN model are filled by the components of Hbest.
The final phase of the proposed work is sentimental analysis, in which the digital evidence proof is classified as four different output classes are critical, error, warning, and information. Here, we illustrate a novel multistage dynamic neural network (MDNN) for crime action classification. A MDNN is a session of synthetic neural networks wherever the connection between nodes creates a map, with or without a temporary array. This permits it to exhibit temporal dynamic behavior. Both types of networks exhibit transient dynamic behavior. The hidden layers and classical neural network layers can retrieve information from a range of sensory data. In addition, the specific approach achieves sensor integration at the data level by combining data from multiple sensors. The MDNN classifier tasks can be handled better than multiple inputs to multiple solutions, but are not compatible with the problem mentioned in this broadsheet. This is input to this circuit is a time sequence, the value of every input has a continuous connection, and the seismic input of the preceding disturbs the seismic reply of the next moment. Also, there is a clear hysteria when accelerating tilt heights and story loss. The structure of MDNN classifier is extended to this function. The main purpose is that the construction of the MDNN classifier permits material to be exchanged each time g
s
,

Structure of our proposed MDNN classifier.
Here,
Algorithm 3 Crime action classification suing MDNN classifier
The planned HDL-DFI model’s efficacy has been tested and assessed using common benchmark datasets. The suggested HDL-DFI model’s results are compared to current logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models in this research. Initially, the intended HDL-DFI model was tested on a Lenovo G500 s with an Intel Core i5 4th generation CPU with 8GB of RAM and a 1TB HDD running on a 64-bit version of Microsoft Windows. The Lenovo Idea-pad IP-320E 64-bit Windows 10 Home Edition operating system has 8 GB RAM, and a 256 GB SSD running i7 6th generation CPU to speed up model training. Anaconda Navigator utilized Python version 3.7 as the major programming language, with spyder and Jupyter as the launch environments.
Dataset description
We gathered data for this project from a number of well-known sources. As a consequence of the emergence of chat software, text communication has grown increasingly prevalent. A lot of evidence was acquired in a criminal case using structured communicative email. Harassment, sexual harassment, and defamation may all be discovered by analyzing the text’s content. Because video streams are often huge, monitoring, analyzing, and extracting significant data requires a variety of approaches. YouTube videos and CCTV camera footage are both good sources of video data. Extracts audio data from numerous features databases (MFD) such as EMODB, IEMOCAP, FAU AIBO, and others. As a source of criminal activity, images are a fast and simple method of communicating information. Instagram photographs, Twitter images, Flickr photos, and other visual data are examples. Each piece of linked data should be carefully analysed, not only to see if there are any frequent or uncommon occurrences, but also to see if there are any interesting events that fit within the system’s stated categories, such as crime’s name and complexity, error warning, and information. Table 2 indicates the number of times each item was used in the measured dataset.
Dataset descriptions
Dataset descriptions
The simulation result of the proposed HDL-DFI model is compared with existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models in terms of accuracy, precision, recall, F1-score, G-mean, and AUC. All these parameters are defined as follows:
As previously mentioned, the HDL-DFI model was designed to improve the presentation of criminal action detection and categorization. The proportionate analysis of planned and current state-of-the-art models is shown in Table 3. The proposed HDL-DFI outperforms the current logistic regression, multi-layer perception, KNN, random forest, Adaboost and deep learning models by 17.036 percent, 8.043 percent, 3.700 percent, 4.159 percent, 19.244 percent and 1.094 percent respectively. The proposed HDL-DFI model outperforms the current logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models by 10.023 percent, 20.242 percent, 11.934 percent, 14.807 percent, 11.366 percent, and 0.827 percent respectively. The recall of proposed HDL-DFI model is 19.415%, 28.679%, 4.637%, 2.375%, 22.503% and 3.801% higher than the existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models respectively.
Dataset descriptions
Dataset descriptions
The F1-score of projected HDL-DFI model is 17.279%, 20.405%, 1.785%, 0.968%, 18.297% and 0.363% higher than the existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models respectively. The G-mean of proposed HDL-DFI model is 3.833%, 4.960%, 11.097%, 6.231%, 1.767% and 3.864% higher than the existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models respectively. The AUC of proposed HDL-DFI model is 4.517%, 6.370%, 9.076%, 3.986%, 2.019% and 0.333% higher than the existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models respectively. Figures 3-8 show the graphical representation of comparative analysis for accuracy, recall, F1-score, precision, G-mean and AUC respectively.

Accuracy comparison of proposed and existing models.

Precision comparison of proposed and existing models.

Recall comparison of proposed and existing models.

F1-score comparison of proposed and existing models.

G-mean comparison of proposed and existing models.

AUC comparison of proposed and existing models.

Total computation time of proposed and existing models.
For the test scenario of the upload process, the computation time of proposed HDL-DFI model with familiar and unfamiliar is 20% and 25% lower than the existing digital proof collective model [1]. For the test scenario of authentication generation, the computation time of the proposed HDL-DFI model with familiar and unfamiliar is 22% and 29% lower than the existing digital proof collective model. For the test scenario of index service, the computation time of the proposed HDL-DFI model with familiar and unfamiliar is 23.78% and 31.26% lower than the existing digital proof collective model. For the test scenario of familiarity checking, the computation time of the proposed HDL-DFI model with familiar and unfamiliar is 24.097% and 32.02% lower than the existing digital proof collective model.
For forensic enquiry, we suggested a hybrid deep learning approach based on integrated multi-model data fusion (HDL-DFI). The following are the primary contributions of the suggested as shadows: A digital evidence collection and management system is achieved through an improved brain storm optimization (IBSO) algorithm. Data de-duplication is done by recurrent multiplicative neurons with a deep neural network (RM-DNN) technique. Finally, a multistage dynamic neural network (MDNN) is used for sentimental analysis to classify the crime action.
Finally, the simulation results of our proposed HDL-DFI model are effective as compared to the existing logistic regression, multi-layer perceptron, KNN, random forest, Adaboost and deep learning models in terms of accuracy, recall, precision, F1-score, G-mean, and AUC. The total computation time of proposed HDL-DFI model is very low compared to existing state-of-art digital proof collective model for different test scenarios such as upload, authentication generation, index service, and familiarity checking.
