top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
1998 32nd Annual International Carnahan Conference on Security Technology
1998 32nd Annual International Carnahan Conference on Security Technology
Pubbl/distr/stampa [Place of publication not identified], : I E E E, 1998
Descrizione fisica 1 online resource (250 pages)
Disciplina 363.23028
Soggetto topico Electronics in crime prevention
Electronics in criminal investigation
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910872617203321
[Place of publication not identified], : I E E E, 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
An Act to Deter and Punish Terrorist Acts in the United States and Around the World, to Enhance Law Enforcement Investigatory Tools, and for Other Purposes
An Act to Deter and Punish Terrorist Acts in the United States and Around the World, to Enhance Law Enforcement Investigatory Tools, and for Other Purposes
Pubbl/distr/stampa [Washington, D.C.] : , : [U.S. Government Printing Office], , [2001]
Descrizione fisica 1 online resource (131 unnumbered pages)
Soggetto topico Terrorism - United States - Prevention
Electronic surveillance - United States
Electronics in criminal investigation - United States
Banking law - United States - Criminal provisions
Money laundering investigation - United States
Criminal investigation - United States
Terrorists - United States
War on Terrorism, 2001-2009
Banking law - Criminal provisions
Criminal investigation
Electronic surveillance
Electronics in criminal investigation
Money laundering investigation
Terrorism - Prevention
Terrorists
Soggetto genere / forma Statutes and codes.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910713576903321
[Washington, D.C.] : , : [U.S. Government Printing Office], , [2001]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in digital forensics IV / / edited by Indrajit Ray, Sujeet Shenoi
Advances in digital forensics IV / / edited by Indrajit Ray, Sujeet Shenoi
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (366 p.)
Disciplina 363.250285
Collana IFIP international federation for information processing
Soggetto topico Forensic sciences - Data processing
Digital forensic science
Electronics in criminal investigation
Electronic discovery (Law)
Evidence, Criminal
ISBN 0-387-84927-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Themes and Issues -- When is Digital Evidence Forensically Sound? -- Applying Traditional Forensic Taxonomy to Digital Forensics -- Evidence Recovery -- Recovering Data from Failing Floppy Disks -- Extracting Evidence Using Google Desktop Search -- Evaluation of Registry Data Removal by Shredder Programs -- Evidence Integrity -- Using Boot Control to Preserve the Integrity of Evidence -- Hypothesis-Based Investigation of Digital Timestamps -- Improving Disk Sector Integrity Using K-Dimension Hashing -- Evidence Management -- Class-Aware Similarity Hashing for Data Classification -- Applying Topic Modeling to Forensic Data -- Forensic Techniques -- Forensic Analysis of Volatile Instant Messaging -- Timely Rootkit Detection During Live Response -- Network Forensics -- Identifying and Analyzing Web Server Attacks -- Forensic Web Services -- Detecting Remote Exploits Using Data Mining -- Portable Electronic Device Forensics -- Using Sensor Dirt for Toolmark Analysis of Digital Photographs -- A New Feature-Based Method for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues Pertaining to the Use of Cell Phone Data -- Event Data Recorder Forensics -- Protection and Recovery of Railroad Event Recorder Data -- Automobile Event Data Recorder Forensics -- Novel Investigative Techniques -- Reasoning About Evidence Using Bayesian Networks -- Inferring Sources of Leaks in Document Management Systems -- Image Background Matching for Identifying Suspects -- Forensic Tools -- An Evidence Acquisition Tool for Live Systems -- Time Analysis of Hard Drive Imaging Tools -- Fusion of Steganalysis Systems Using Bayesian Model Averaging -- A Virtual Digital Forensics Laboratory.
Altri titoli varianti Advances in digital forensics four
Advances in digital forensics 4
Record Nr. UNINA-9910483473003321
New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital forensics for handheld devices / / Eamon P. Doherty
Digital forensics for handheld devices / / Eamon P. Doherty
Autore Doherty Eamon P.
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (320 p.)
Disciplina 005.8
Soggetto topico Electronic evidence
Electronics in criminal investigation
Pocket computers
Cell phones
Digital cameras
Forensic sciences
Soggetto genere / forma Electronic books.
ISBN 0-429-25254-4
1-4665-7882-3
1-4398-9878-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; Disclaimer; Author; Chapter 1 - The Cell Phone; Chapter 2 - Digital Camera Forensics; Chapter 3 - PDAs and Digital Forensics; Chapter 4 - GPS Devices; Chapter 5 - Corporate Investigations on a Netbook; Chapter 6 - Cell Phone Investigations by Police; Chapter 7 - Recovering Existing or Deleted Data from USB Devices; Chapter 8 - Places to Work at Investigating Mobile Devices; Back Cover
Record Nr. UNINA-9910452834303321
Doherty Eamon P.  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic surveillance of mobile devices : understanding the mobile ecosystem and applicable surveillance law
Electronic surveillance of mobile devices : understanding the mobile ecosystem and applicable surveillance law
Autore Balkovich Edward
Pubbl/distr/stampa RAND Corporation, 2015
Descrizione fisica 1 online resource
Soggetto topico Electronic surveillance - Law and legislation - United States
Mobile communication systems - United States
Electronics in criminal investigation
Law - U.S. - General
Law - U.S
Law, Politics & Government
ISBN 0-8330-9321-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The electronic surveillance challenge -- Our project was designed to meet the needs of key stakeholders -- How MIKE was developed -- How MIKE works -- Assessing the value of MIKE: stakeholder reactions -- Sustaining MIKE -- Appendixes. A. Permissions enabled by the core-apps product. B. Real-time auctions -- References.
Altri titoli varianti Electronic surveillance of mobile devices the mobile ecosystem and the law
Record Nr. UNINA-9910220140703321
Balkovich Edward  
RAND Corporation, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
Autore Hoy Joseph
Pubbl/distr/stampa Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015
Descrizione fisica 1 online resource (401 p.)
Disciplina 363.25/2
Soggetto topico Mobile device forensics
Electronic evidence
Computer networks
Electronics in criminal investigation
ISBN 1-118-92575-0
1-118-92576-9
1-118-92574-2
Classificazione TEC061000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363.
Record Nr. UNINA-9910132309703321
Hoy Joseph  
Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
Autore Hoy Joseph
Pubbl/distr/stampa Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015
Descrizione fisica 1 online resource (401 p.)
Disciplina 363.25/2
Soggetto topico Mobile device forensics
Electronic evidence
Computer networks
Electronics in criminal investigation
ISBN 1-118-92575-0
1-118-92576-9
1-118-92574-2
Classificazione TEC061000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363.
Record Nr. UNINA-9910821405703321
Hoy Joseph  
Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
Autore Ho Anthony T. S. <1958->
Pubbl/distr/stampa Hoboken : , : Wiley, , 2015
Descrizione fisica 1 online resource (701 p.)
Disciplina 363.25/62
Collana Wiley - IEEE
Soggetto topico Criminal investigation - Technological innovations
Electronics in criminal investigation
ISBN 1-118-70579-3
1-118-70577-7
1-118-70578-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- List of Contributors xvii -- Foreword xix -- Preface xxi -- Acknowledgements xxvii -- PART ONE MULTIMEDIA EVIDENCE HANDLING -- 1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? 3 -- 1.1 Introduction 3 -- 1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK 4 -- 1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK 17 -- 1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China's Ministry of Public Security 23 -- 1.5 Discussions 28 -- 1.6 Summary 32 -- 1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre 32 -- References 34 -- 2 Standards and Best Practices in Digital and Multimedia Forensics 38 -- 2.1 Introduction 38 -- 2.2 Overview 39 -- 2.3 Electronic Evidence and Digital Forensics 48 -- 2.4 Multimedia Evidence and Multimedia Forensics 70 -- 2.5 Digital Forensics Laboratory Accreditation 77 -- 2.6 General Quality Assurance (Management) 79 -- 2.7 Training, Education and Certification on Digital and Multimedia Forensics 81 -- 2.8 Conclusions 84 -- Acknowledgements 86 -- References 86 -- 3 A Machine Learning-Based Approach to Digital Triage 94 -- 3.1 Introduction 94 -- 3.2 Related Work on Digital Triage 96 -- 3.3 A Machine Learning-Based Digital Triage Framework 100 -- 3.4 A Child Pornography Exchange Case Study 110 -- 3.5 Conclusion 128 -- 3.6 Challenges and Future Directions for the Digital Forensics Community 128 -- Acknowledgements 130 -- References 130 -- 4 Forensic Authentication of Digital Audio and Video Files 133 -- 4.1 Introduction 133 -- 4.2 Examination Requests and Submitted Evidence 134 -- 4.3 Laboratory Space 138 -- 4.4 Laboratory Software and Equipment 138 -- 4.5 Audio/Video Authentication Examinations 147 -- 4.6 Preparation of Work Notes and Laboratory Reports 171 -- 4.7 Expert Testimony 172 -- 4.8 Case Examples 173 -- 4.9 Discussion 177 -- References 178 -- PART TWO DIGITAL EVIDENCE EXTRACTION.
5 Photogrammetry in Digital Forensics 185 -- 5.1 Introduction 185 -- 5.2 Different Methods 188 -- 5.3 Measurement Uncertainty 194 -- 5.4 Case Studies 195 -- 5.5 3D Modelling/Scenario Testing 212 -- 5.6 Summary 217 -- References 217 -- 6 Advanced Multimedia File Carving 219 -- 6.1 Introduction 219 -- 6.2 Digtal Data Storage 220 -- 6.3 File Carving of Binary Data 225 -- 6.4 Multimedia Data Structures 226 -- 6.5 File Carving of Multimedia Data 232 -- 6.6 Content Identification 241 -- 6.7 File Carving Frameworks 253 -- 6.8 Conclusions 264 -- Acknowledgements 265 -- References 265 -- 7 On Forensic Use of Biometrics 270 -- 7.1 Introduction 270 -- 7.2 Biometrics Performance Metrics 273 -- 7.3 Face: The Natural Means for Human Recognition 274 -- 7.4 Ears as a Means of Forensic Identification 283 -- 7.5 Conclusions 299 -- References 299 -- 8 Multimedia Analytics for Image Collection Forensics 305 -- 8.1 Introduction 305 -- 8.2 Data and Tasks 308 -- 8.3 Multimedia Analysis 309 -- 8.4 Visual Analytics Processes 312 -- 8.5 ChronoBrowser 313 -- 8.6 MediaTable 320 -- 8.7 An Example Scenario 323 -- 8.8 Future Outlook 325 -- References 326 -- PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS -- 9 Forensic Camera Model Identification 331 -- 9.1 Introduction 331 -- 9.2 Forensic Source Identification 333 -- 9.3 Digital Camera Model Identification 337 -- 9.4 Benchmarking Camera Model Identification Algorithms 339 -- 9.5 Model-Specific Characteristics of Digital Camera Components 341 -- 9.6 Black Box Camera Model Identification 351 -- 9.7 Camera Model Identification in Open Sets 364 -- 9.8 Model-Specific Characteristics in Device-Level Identification 366 -- 9.9 Open Challenges Towards Practical Applications 368 -- References 370 -- 10 Printer and Scanner Forensics 375 -- 10.1 Introduction 375 -- 10.2 Printer Forensics 379 -- 10.3 Scanner Forensics 386 -- 10.4 Photocopier Identification 389 -- 10.5 Forgery Detection for Printed and Scanned Documents 391 -- 10.6 Sample Algorithms with Case Studies 396.
10.7 Open Problems and Challenges 406 -- 10.8 Conclusions 408 -- Acknowledgements 408 -- References 408 -- 11 Microphone Forensics 411 -- 11.1 Introduction 411 -- 11.2 Pattern Recognition for Microphone Forensics 414 -- 11.3 Guidelines for Microphone Registration 421 -- 11.4 Case Studies 423 -- 11.5 Chapter Summary 435 -- Acknowledgements 436 -- References 437 -- 12 Forensic Identification of Printed Documents 442 -- 12.1 Introduction 442 -- 12.2 Special Materials 449 -- 12.3 Substrate Forensics 450 -- 12.4 Print Forensics 455 -- 12.5 Real World Example: Currency Protection 473 -- 12.6 Summary and Ecosystem Considerations 475 -- References 478 -- PART FOUR MULTIMEDIA CONTENT FORENSICS -- 13 Digital Image Forensics with Statistical Analysis 483 -- 13.1 Introduction 483 -- 13.2 Detecting Region Duplication 488 -- 13.3 Exposing Splicing Forgery 500 -- 13.4 Case Studies 508 -- 13.5 Other Applications 512 -- 13.6 Summary 515 -- References 517 -- 14 Camera-Based Image Forgery Detection 522 -- 14.1 Introduction 522 -- 14.2 Camera Structure 524 -- 14.3 Camera-Based Forgery Detection Methods 535 -- 14.4 Forgery Detection Based on PFA: A Case Study 548 -- 14.5 Conclusion 564 -- References 565 -- 15 Image and Video Processing History Recovery 572 -- 15.1 Introduction 572 -- 15.2 Coding Artefacts 573 -- 15.3 Editing Artefacts 586 -- 15.4 Estimation of Processing Parameters 590 -- 15.5 Case Studies 601 -- 15.6 Conclusions 605 -- References 607 -- 16 Anti-Forensics of Multimedia Data and Countermeasures 612 -- 16.1 Introduction 612 -- 16.2 Anti-forensic Approaches Proposed in the Literature 613 -- 16.3 Case Study: JPEG Image Forensics 623 -- 16.4 Trade-off between Forensics and Anti-forensics 644 -- 16.5 Conclusions 647 -- References 647 -- Index 653.
Record Nr. UNINA-9910131493803321
Ho Anthony T. S. <1958->  
Hoboken : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
Autore Ho Anthony T. S. <1958->
Pubbl/distr/stampa Hoboken : , : Wiley, , 2015
Descrizione fisica 1 online resource (701 p.)
Disciplina 363.25/62
Collana Wiley - IEEE
Soggetto topico Criminal investigation - Technological innovations
Electronics in criminal investigation
ISBN 1-118-70579-3
1-118-70577-7
1-118-70578-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- List of Contributors xvii -- Foreword xix -- Preface xxi -- Acknowledgements xxvii -- PART ONE MULTIMEDIA EVIDENCE HANDLING -- 1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? 3 -- 1.1 Introduction 3 -- 1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK 4 -- 1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK 17 -- 1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China's Ministry of Public Security 23 -- 1.5 Discussions 28 -- 1.6 Summary 32 -- 1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre 32 -- References 34 -- 2 Standards and Best Practices in Digital and Multimedia Forensics 38 -- 2.1 Introduction 38 -- 2.2 Overview 39 -- 2.3 Electronic Evidence and Digital Forensics 48 -- 2.4 Multimedia Evidence and Multimedia Forensics 70 -- 2.5 Digital Forensics Laboratory Accreditation 77 -- 2.6 General Quality Assurance (Management) 79 -- 2.7 Training, Education and Certification on Digital and Multimedia Forensics 81 -- 2.8 Conclusions 84 -- Acknowledgements 86 -- References 86 -- 3 A Machine Learning-Based Approach to Digital Triage 94 -- 3.1 Introduction 94 -- 3.2 Related Work on Digital Triage 96 -- 3.3 A Machine Learning-Based Digital Triage Framework 100 -- 3.4 A Child Pornography Exchange Case Study 110 -- 3.5 Conclusion 128 -- 3.6 Challenges and Future Directions for the Digital Forensics Community 128 -- Acknowledgements 130 -- References 130 -- 4 Forensic Authentication of Digital Audio and Video Files 133 -- 4.1 Introduction 133 -- 4.2 Examination Requests and Submitted Evidence 134 -- 4.3 Laboratory Space 138 -- 4.4 Laboratory Software and Equipment 138 -- 4.5 Audio/Video Authentication Examinations 147 -- 4.6 Preparation of Work Notes and Laboratory Reports 171 -- 4.7 Expert Testimony 172 -- 4.8 Case Examples 173 -- 4.9 Discussion 177 -- References 178 -- PART TWO DIGITAL EVIDENCE EXTRACTION.
5 Photogrammetry in Digital Forensics 185 -- 5.1 Introduction 185 -- 5.2 Different Methods 188 -- 5.3 Measurement Uncertainty 194 -- 5.4 Case Studies 195 -- 5.5 3D Modelling/Scenario Testing 212 -- 5.6 Summary 217 -- References 217 -- 6 Advanced Multimedia File Carving 219 -- 6.1 Introduction 219 -- 6.2 Digtal Data Storage 220 -- 6.3 File Carving of Binary Data 225 -- 6.4 Multimedia Data Structures 226 -- 6.5 File Carving of Multimedia Data 232 -- 6.6 Content Identification 241 -- 6.7 File Carving Frameworks 253 -- 6.8 Conclusions 264 -- Acknowledgements 265 -- References 265 -- 7 On Forensic Use of Biometrics 270 -- 7.1 Introduction 270 -- 7.2 Biometrics Performance Metrics 273 -- 7.3 Face: The Natural Means for Human Recognition 274 -- 7.4 Ears as a Means of Forensic Identification 283 -- 7.5 Conclusions 299 -- References 299 -- 8 Multimedia Analytics for Image Collection Forensics 305 -- 8.1 Introduction 305 -- 8.2 Data and Tasks 308 -- 8.3 Multimedia Analysis 309 -- 8.4 Visual Analytics Processes 312 -- 8.5 ChronoBrowser 313 -- 8.6 MediaTable 320 -- 8.7 An Example Scenario 323 -- 8.8 Future Outlook 325 -- References 326 -- PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS -- 9 Forensic Camera Model Identification 331 -- 9.1 Introduction 331 -- 9.2 Forensic Source Identification 333 -- 9.3 Digital Camera Model Identification 337 -- 9.4 Benchmarking Camera Model Identification Algorithms 339 -- 9.5 Model-Specific Characteristics of Digital Camera Components 341 -- 9.6 Black Box Camera Model Identification 351 -- 9.7 Camera Model Identification in Open Sets 364 -- 9.8 Model-Specific Characteristics in Device-Level Identification 366 -- 9.9 Open Challenges Towards Practical Applications 368 -- References 370 -- 10 Printer and Scanner Forensics 375 -- 10.1 Introduction 375 -- 10.2 Printer Forensics 379 -- 10.3 Scanner Forensics 386 -- 10.4 Photocopier Identification 389 -- 10.5 Forgery Detection for Printed and Scanned Documents 391 -- 10.6 Sample Algorithms with Case Studies 396.
10.7 Open Problems and Challenges 406 -- 10.8 Conclusions 408 -- Acknowledgements 408 -- References 408 -- 11 Microphone Forensics 411 -- 11.1 Introduction 411 -- 11.2 Pattern Recognition for Microphone Forensics 414 -- 11.3 Guidelines for Microphone Registration 421 -- 11.4 Case Studies 423 -- 11.5 Chapter Summary 435 -- Acknowledgements 436 -- References 437 -- 12 Forensic Identification of Printed Documents 442 -- 12.1 Introduction 442 -- 12.2 Special Materials 449 -- 12.3 Substrate Forensics 450 -- 12.4 Print Forensics 455 -- 12.5 Real World Example: Currency Protection 473 -- 12.6 Summary and Ecosystem Considerations 475 -- References 478 -- PART FOUR MULTIMEDIA CONTENT FORENSICS -- 13 Digital Image Forensics with Statistical Analysis 483 -- 13.1 Introduction 483 -- 13.2 Detecting Region Duplication 488 -- 13.3 Exposing Splicing Forgery 500 -- 13.4 Case Studies 508 -- 13.5 Other Applications 512 -- 13.6 Summary 515 -- References 517 -- 14 Camera-Based Image Forgery Detection 522 -- 14.1 Introduction 522 -- 14.2 Camera Structure 524 -- 14.3 Camera-Based Forgery Detection Methods 535 -- 14.4 Forgery Detection Based on PFA: A Case Study 548 -- 14.5 Conclusion 564 -- References 565 -- 15 Image and Video Processing History Recovery 572 -- 15.1 Introduction 572 -- 15.2 Coding Artefacts 573 -- 15.3 Editing Artefacts 586 -- 15.4 Estimation of Processing Parameters 590 -- 15.5 Case Studies 601 -- 15.6 Conclusions 605 -- References 607 -- 16 Anti-Forensics of Multimedia Data and Countermeasures 612 -- 16.1 Introduction 612 -- 16.2 Anti-forensic Approaches Proposed in the Literature 613 -- 16.3 Case Study: JPEG Image Forensics 623 -- 16.4 Trade-off between Forensics and Anti-forensics 644 -- 16.5 Conclusions 647 -- References 647 -- Index 653.
Record Nr. UNINA-9910818703403321
Ho Anthony T. S. <1958->  
Hoboken : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IEEE International Carnahan Conference on Security Technology, 1992
IEEE International Carnahan Conference on Security Technology, 1992
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 1992
Descrizione fisica 1 online resource (x, 251 pages) : illustrations
Disciplina 621.3892802856
Soggetto topico Electronics in criminal investigation
Security systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996211929003316
[Place of publication not identified], : IEEE, 1992
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui