1998 32nd Annual International Carnahan Conference on Security Technology
| 1998 32nd Annual International Carnahan Conference on Security Technology |
| Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 1998 |
| Descrizione fisica | 1 online resource (250 pages) |
| Disciplina | 363.23028 |
| Soggetto topico |
Electronics in crime prevention
Electronics in criminal investigation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910872617203321 |
| [Place of publication not identified], : I E E E, 1998 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
An Act to Deter and Punish Terrorist Acts in the United States and Around the World, to Enhance Law Enforcement Investigatory Tools, and for Other Purposes
| An Act to Deter and Punish Terrorist Acts in the United States and Around the World, to Enhance Law Enforcement Investigatory Tools, and for Other Purposes |
| Pubbl/distr/stampa | [Washington, D.C.] : , : [U.S. Government Printing Office], , [2001] |
| Descrizione fisica | 1 online resource (131 unnumbered pages) |
| Soggetto topico |
Terrorism - United States - Prevention
Electronic surveillance - United States Electronics in criminal investigation - United States Banking law - United States - Criminal provisions Money laundering investigation - United States Criminal investigation - United States Terrorists - United States War on Terrorism, 2001-2009 Banking law - Criminal provisions Criminal investigation Electronic surveillance Electronics in criminal investigation Money laundering investigation Terrorism - Prevention Terrorists |
| Soggetto genere / forma | Statutes and codes. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910713576903321 |
| [Washington, D.C.] : , : [U.S. Government Printing Office], , [2001] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in digital forensics IV / / edited by Indrajit Ray, Sujeet Shenoi
| Advances in digital forensics IV / / edited by Indrajit Ray, Sujeet Shenoi |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | New York, New York : , : Springer, , [2008] |
| Descrizione fisica | 1 online resource (366 p.) |
| Disciplina | 363.250285 |
| Collana | IFIP international federation for information processing |
| Soggetto topico |
Forensic sciences - Data processing
Digital forensic science Electronics in criminal investigation Electronic discovery (Law) Evidence, Criminal |
| ISBN | 0-387-84927-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Themes and Issues -- When is Digital Evidence Forensically Sound? -- Applying Traditional Forensic Taxonomy to Digital Forensics -- Evidence Recovery -- Recovering Data from Failing Floppy Disks -- Extracting Evidence Using Google Desktop Search -- Evaluation of Registry Data Removal by Shredder Programs -- Evidence Integrity -- Using Boot Control to Preserve the Integrity of Evidence -- Hypothesis-Based Investigation of Digital Timestamps -- Improving Disk Sector Integrity Using K-Dimension Hashing -- Evidence Management -- Class-Aware Similarity Hashing for Data Classification -- Applying Topic Modeling to Forensic Data -- Forensic Techniques -- Forensic Analysis of Volatile Instant Messaging -- Timely Rootkit Detection During Live Response -- Network Forensics -- Identifying and Analyzing Web Server Attacks -- Forensic Web Services -- Detecting Remote Exploits Using Data Mining -- Portable Electronic Device Forensics -- Using Sensor Dirt for Toolmark Analysis of Digital Photographs -- A New Feature-Based Method for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues Pertaining to the Use of Cell Phone Data -- Event Data Recorder Forensics -- Protection and Recovery of Railroad Event Recorder Data -- Automobile Event Data Recorder Forensics -- Novel Investigative Techniques -- Reasoning About Evidence Using Bayesian Networks -- Inferring Sources of Leaks in Document Management Systems -- Image Background Matching for Identifying Suspects -- Forensic Tools -- An Evidence Acquisition Tool for Live Systems -- Time Analysis of Hard Drive Imaging Tools -- Fusion of Steganalysis Systems Using Bayesian Model Averaging -- A Virtual Digital Forensics Laboratory. |
| Altri titoli varianti |
Advances in digital forensics four
Advances in digital forensics 4 |
| Record Nr. | UNINA-9910483473003321 |
| New York, New York : , : Springer, , [2008] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital forensics for handheld devices / / Eamon P. Doherty
| Digital forensics for handheld devices / / Eamon P. Doherty |
| Autore | Doherty Eamon P. |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
| Descrizione fisica | 1 online resource (320 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Electronic evidence
Electronics in criminal investigation Pocket computers Cell phones Digital cameras Forensic sciences |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-429-25254-4
1-4665-7882-3 1-4398-9878-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Cover; Contents; Preface; Disclaimer; Author; Chapter 1 - The Cell Phone; Chapter 2 - Digital Camera Forensics; Chapter 3 - PDAs and Digital Forensics; Chapter 4 - GPS Devices; Chapter 5 - Corporate Investigations on a Netbook; Chapter 6 - Cell Phone Investigations by Police; Chapter 7 - Recovering Existing or Deleted Data from USB Devices; Chapter 8 - Places to Work at Investigating Mobile Devices; Back Cover |
| Record Nr. | UNINA-9910452834303321 |
Doherty Eamon P.
|
||
| Boca Raton, Fla. : , : CRC Press, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Electronic surveillance of mobile devices : understanding the mobile ecosystem and applicable surveillance law
| Electronic surveillance of mobile devices : understanding the mobile ecosystem and applicable surveillance law |
| Autore | Balkovich Edward |
| Pubbl/distr/stampa | RAND Corporation, 2015 |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Electronic surveillance - Law and legislation - United States
Mobile communication systems - United States Electronics in criminal investigation Law - U.S. - General Law - U.S Law, Politics & Government |
| ISBN | 0-8330-9321-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The electronic surveillance challenge -- Our project was designed to meet the needs of key stakeholders -- How MIKE was developed -- How MIKE works -- Assessing the value of MIKE: stakeholder reactions -- Sustaining MIKE -- Appendixes. A. Permissions enabled by the core-apps product. B. Real-time auctions -- References. |
| Altri titoli varianti | Electronic surveillance of mobile devices the mobile ecosystem and the law |
| Record Nr. | UNINA-9910220140703321 |
Balkovich Edward
|
||
| RAND Corporation, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
| Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK |
| Autore | Hoy Joseph |
| Pubbl/distr/stampa | Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (401 p.) |
| Disciplina | 363.25/2 |
| Soggetto topico |
Mobile device forensics
Electronic evidence Computer networks Electronics in criminal investigation |
| ISBN |
1-118-92575-0
1-118-92576-9 1-118-92574-2 |
| Classificazione | TEC061000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
-- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363. |
| Record Nr. | UNINA-9910132309703321 |
Hoy Joseph
|
||
| Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK
| Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK |
| Autore | Hoy Joseph |
| Pubbl/distr/stampa | Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (401 p.) |
| Disciplina | 363.25/2 |
| Soggetto topico |
Mobile device forensics
Electronic evidence Computer networks Electronics in criminal investigation |
| ISBN |
1-118-92575-0
1-118-92576-9 1-118-92574-2 |
| Classificazione | TEC061000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
-- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363. |
| Record Nr. | UNINA-9910821405703321 |
Hoy Joseph
|
||
| Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
| Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li |
| Autore | Ho Anthony T. S. <1958-> |
| Pubbl/distr/stampa | Hoboken : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (701 p.) |
| Disciplina | 363.25/62 |
| Collana | Wiley - IEEE |
| Soggetto topico |
Criminal investigation - Technological innovations
Electronics in criminal investigation |
| ISBN |
1-118-70579-3
1-118-70577-7 1-118-70578-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
-- List of Contributors xvii -- Foreword xix -- Preface xxi -- Acknowledgements xxvii -- PART ONE MULTIMEDIA EVIDENCE HANDLING -- 1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? 3 -- 1.1 Introduction 3 -- 1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK 4 -- 1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK 17 -- 1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China's Ministry of Public Security 23 -- 1.5 Discussions 28 -- 1.6 Summary 32 -- 1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre 32 -- References 34 -- 2 Standards and Best Practices in Digital and Multimedia Forensics 38 -- 2.1 Introduction 38 -- 2.2 Overview 39 -- 2.3 Electronic Evidence and Digital Forensics 48 -- 2.4 Multimedia Evidence and Multimedia Forensics 70 -- 2.5 Digital Forensics Laboratory Accreditation 77 -- 2.6 General Quality Assurance (Management) 79 -- 2.7 Training, Education and Certification on Digital and Multimedia Forensics 81 -- 2.8 Conclusions 84 -- Acknowledgements 86 -- References 86 -- 3 A Machine Learning-Based Approach to Digital Triage 94 -- 3.1 Introduction 94 -- 3.2 Related Work on Digital Triage 96 -- 3.3 A Machine Learning-Based Digital Triage Framework 100 -- 3.4 A Child Pornography Exchange Case Study 110 -- 3.5 Conclusion 128 -- 3.6 Challenges and Future Directions for the Digital Forensics Community 128 -- Acknowledgements 130 -- References 130 -- 4 Forensic Authentication of Digital Audio and Video Files 133 -- 4.1 Introduction 133 -- 4.2 Examination Requests and Submitted Evidence 134 -- 4.3 Laboratory Space 138 -- 4.4 Laboratory Software and Equipment 138 -- 4.5 Audio/Video Authentication Examinations 147 -- 4.6 Preparation of Work Notes and Laboratory Reports 171 -- 4.7 Expert Testimony 172 -- 4.8 Case Examples 173 -- 4.9 Discussion 177 -- References 178 -- PART TWO DIGITAL EVIDENCE EXTRACTION.
5 Photogrammetry in Digital Forensics 185 -- 5.1 Introduction 185 -- 5.2 Different Methods 188 -- 5.3 Measurement Uncertainty 194 -- 5.4 Case Studies 195 -- 5.5 3D Modelling/Scenario Testing 212 -- 5.6 Summary 217 -- References 217 -- 6 Advanced Multimedia File Carving 219 -- 6.1 Introduction 219 -- 6.2 Digtal Data Storage 220 -- 6.3 File Carving of Binary Data 225 -- 6.4 Multimedia Data Structures 226 -- 6.5 File Carving of Multimedia Data 232 -- 6.6 Content Identification 241 -- 6.7 File Carving Frameworks 253 -- 6.8 Conclusions 264 -- Acknowledgements 265 -- References 265 -- 7 On Forensic Use of Biometrics 270 -- 7.1 Introduction 270 -- 7.2 Biometrics Performance Metrics 273 -- 7.3 Face: The Natural Means for Human Recognition 274 -- 7.4 Ears as a Means of Forensic Identification 283 -- 7.5 Conclusions 299 -- References 299 -- 8 Multimedia Analytics for Image Collection Forensics 305 -- 8.1 Introduction 305 -- 8.2 Data and Tasks 308 -- 8.3 Multimedia Analysis 309 -- 8.4 Visual Analytics Processes 312 -- 8.5 ChronoBrowser 313 -- 8.6 MediaTable 320 -- 8.7 An Example Scenario 323 -- 8.8 Future Outlook 325 -- References 326 -- PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS -- 9 Forensic Camera Model Identification 331 -- 9.1 Introduction 331 -- 9.2 Forensic Source Identification 333 -- 9.3 Digital Camera Model Identification 337 -- 9.4 Benchmarking Camera Model Identification Algorithms 339 -- 9.5 Model-Specific Characteristics of Digital Camera Components 341 -- 9.6 Black Box Camera Model Identification 351 -- 9.7 Camera Model Identification in Open Sets 364 -- 9.8 Model-Specific Characteristics in Device-Level Identification 366 -- 9.9 Open Challenges Towards Practical Applications 368 -- References 370 -- 10 Printer and Scanner Forensics 375 -- 10.1 Introduction 375 -- 10.2 Printer Forensics 379 -- 10.3 Scanner Forensics 386 -- 10.4 Photocopier Identification 389 -- 10.5 Forgery Detection for Printed and Scanned Documents 391 -- 10.6 Sample Algorithms with Case Studies 396. 10.7 Open Problems and Challenges 406 -- 10.8 Conclusions 408 -- Acknowledgements 408 -- References 408 -- 11 Microphone Forensics 411 -- 11.1 Introduction 411 -- 11.2 Pattern Recognition for Microphone Forensics 414 -- 11.3 Guidelines for Microphone Registration 421 -- 11.4 Case Studies 423 -- 11.5 Chapter Summary 435 -- Acknowledgements 436 -- References 437 -- 12 Forensic Identification of Printed Documents 442 -- 12.1 Introduction 442 -- 12.2 Special Materials 449 -- 12.3 Substrate Forensics 450 -- 12.4 Print Forensics 455 -- 12.5 Real World Example: Currency Protection 473 -- 12.6 Summary and Ecosystem Considerations 475 -- References 478 -- PART FOUR MULTIMEDIA CONTENT FORENSICS -- 13 Digital Image Forensics with Statistical Analysis 483 -- 13.1 Introduction 483 -- 13.2 Detecting Region Duplication 488 -- 13.3 Exposing Splicing Forgery 500 -- 13.4 Case Studies 508 -- 13.5 Other Applications 512 -- 13.6 Summary 515 -- References 517 -- 14 Camera-Based Image Forgery Detection 522 -- 14.1 Introduction 522 -- 14.2 Camera Structure 524 -- 14.3 Camera-Based Forgery Detection Methods 535 -- 14.4 Forgery Detection Based on PFA: A Case Study 548 -- 14.5 Conclusion 564 -- References 565 -- 15 Image and Video Processing History Recovery 572 -- 15.1 Introduction 572 -- 15.2 Coding Artefacts 573 -- 15.3 Editing Artefacts 586 -- 15.4 Estimation of Processing Parameters 590 -- 15.5 Case Studies 601 -- 15.6 Conclusions 605 -- References 607 -- 16 Anti-Forensics of Multimedia Data and Countermeasures 612 -- 16.1 Introduction 612 -- 16.2 Anti-forensic Approaches Proposed in the Literature 613 -- 16.3 Case Study: JPEG Image Forensics 623 -- 16.4 Trade-off between Forensics and Anti-forensics 644 -- 16.5 Conclusions 647 -- References 647 -- Index 653. |
| Record Nr. | UNINA-9910131493803321 |
Ho Anthony T. S. <1958->
|
||
| Hoboken : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li
| Handbook of digital forensics of multimedia data and devices / / Anthony T.S. Ho and Shujun Li |
| Autore | Ho Anthony T. S. <1958-> |
| Pubbl/distr/stampa | Hoboken : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (701 p.) |
| Disciplina | 363.25/62 |
| Collana | Wiley - IEEE |
| Soggetto topico |
Criminal investigation - Technological innovations
Electronics in criminal investigation |
| ISBN |
1-118-70579-3
1-118-70577-7 1-118-70578-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
-- List of Contributors xvii -- Foreword xix -- Preface xxi -- Acknowledgements xxvii -- PART ONE MULTIMEDIA EVIDENCE HANDLING -- 1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? 3 -- 1.1 Introduction 3 -- 1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK 4 -- 1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK 17 -- 1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China's Ministry of Public Security 23 -- 1.5 Discussions 28 -- 1.6 Summary 32 -- 1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre 32 -- References 34 -- 2 Standards and Best Practices in Digital and Multimedia Forensics 38 -- 2.1 Introduction 38 -- 2.2 Overview 39 -- 2.3 Electronic Evidence and Digital Forensics 48 -- 2.4 Multimedia Evidence and Multimedia Forensics 70 -- 2.5 Digital Forensics Laboratory Accreditation 77 -- 2.6 General Quality Assurance (Management) 79 -- 2.7 Training, Education and Certification on Digital and Multimedia Forensics 81 -- 2.8 Conclusions 84 -- Acknowledgements 86 -- References 86 -- 3 A Machine Learning-Based Approach to Digital Triage 94 -- 3.1 Introduction 94 -- 3.2 Related Work on Digital Triage 96 -- 3.3 A Machine Learning-Based Digital Triage Framework 100 -- 3.4 A Child Pornography Exchange Case Study 110 -- 3.5 Conclusion 128 -- 3.6 Challenges and Future Directions for the Digital Forensics Community 128 -- Acknowledgements 130 -- References 130 -- 4 Forensic Authentication of Digital Audio and Video Files 133 -- 4.1 Introduction 133 -- 4.2 Examination Requests and Submitted Evidence 134 -- 4.3 Laboratory Space 138 -- 4.4 Laboratory Software and Equipment 138 -- 4.5 Audio/Video Authentication Examinations 147 -- 4.6 Preparation of Work Notes and Laboratory Reports 171 -- 4.7 Expert Testimony 172 -- 4.8 Case Examples 173 -- 4.9 Discussion 177 -- References 178 -- PART TWO DIGITAL EVIDENCE EXTRACTION.
5 Photogrammetry in Digital Forensics 185 -- 5.1 Introduction 185 -- 5.2 Different Methods 188 -- 5.3 Measurement Uncertainty 194 -- 5.4 Case Studies 195 -- 5.5 3D Modelling/Scenario Testing 212 -- 5.6 Summary 217 -- References 217 -- 6 Advanced Multimedia File Carving 219 -- 6.1 Introduction 219 -- 6.2 Digtal Data Storage 220 -- 6.3 File Carving of Binary Data 225 -- 6.4 Multimedia Data Structures 226 -- 6.5 File Carving of Multimedia Data 232 -- 6.6 Content Identification 241 -- 6.7 File Carving Frameworks 253 -- 6.8 Conclusions 264 -- Acknowledgements 265 -- References 265 -- 7 On Forensic Use of Biometrics 270 -- 7.1 Introduction 270 -- 7.2 Biometrics Performance Metrics 273 -- 7.3 Face: The Natural Means for Human Recognition 274 -- 7.4 Ears as a Means of Forensic Identification 283 -- 7.5 Conclusions 299 -- References 299 -- 8 Multimedia Analytics for Image Collection Forensics 305 -- 8.1 Introduction 305 -- 8.2 Data and Tasks 308 -- 8.3 Multimedia Analysis 309 -- 8.4 Visual Analytics Processes 312 -- 8.5 ChronoBrowser 313 -- 8.6 MediaTable 320 -- 8.7 An Example Scenario 323 -- 8.8 Future Outlook 325 -- References 326 -- PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS -- 9 Forensic Camera Model Identification 331 -- 9.1 Introduction 331 -- 9.2 Forensic Source Identification 333 -- 9.3 Digital Camera Model Identification 337 -- 9.4 Benchmarking Camera Model Identification Algorithms 339 -- 9.5 Model-Specific Characteristics of Digital Camera Components 341 -- 9.6 Black Box Camera Model Identification 351 -- 9.7 Camera Model Identification in Open Sets 364 -- 9.8 Model-Specific Characteristics in Device-Level Identification 366 -- 9.9 Open Challenges Towards Practical Applications 368 -- References 370 -- 10 Printer and Scanner Forensics 375 -- 10.1 Introduction 375 -- 10.2 Printer Forensics 379 -- 10.3 Scanner Forensics 386 -- 10.4 Photocopier Identification 389 -- 10.5 Forgery Detection for Printed and Scanned Documents 391 -- 10.6 Sample Algorithms with Case Studies 396. 10.7 Open Problems and Challenges 406 -- 10.8 Conclusions 408 -- Acknowledgements 408 -- References 408 -- 11 Microphone Forensics 411 -- 11.1 Introduction 411 -- 11.2 Pattern Recognition for Microphone Forensics 414 -- 11.3 Guidelines for Microphone Registration 421 -- 11.4 Case Studies 423 -- 11.5 Chapter Summary 435 -- Acknowledgements 436 -- References 437 -- 12 Forensic Identification of Printed Documents 442 -- 12.1 Introduction 442 -- 12.2 Special Materials 449 -- 12.3 Substrate Forensics 450 -- 12.4 Print Forensics 455 -- 12.5 Real World Example: Currency Protection 473 -- 12.6 Summary and Ecosystem Considerations 475 -- References 478 -- PART FOUR MULTIMEDIA CONTENT FORENSICS -- 13 Digital Image Forensics with Statistical Analysis 483 -- 13.1 Introduction 483 -- 13.2 Detecting Region Duplication 488 -- 13.3 Exposing Splicing Forgery 500 -- 13.4 Case Studies 508 -- 13.5 Other Applications 512 -- 13.6 Summary 515 -- References 517 -- 14 Camera-Based Image Forgery Detection 522 -- 14.1 Introduction 522 -- 14.2 Camera Structure 524 -- 14.3 Camera-Based Forgery Detection Methods 535 -- 14.4 Forgery Detection Based on PFA: A Case Study 548 -- 14.5 Conclusion 564 -- References 565 -- 15 Image and Video Processing History Recovery 572 -- 15.1 Introduction 572 -- 15.2 Coding Artefacts 573 -- 15.3 Editing Artefacts 586 -- 15.4 Estimation of Processing Parameters 590 -- 15.5 Case Studies 601 -- 15.6 Conclusions 605 -- References 607 -- 16 Anti-Forensics of Multimedia Data and Countermeasures 612 -- 16.1 Introduction 612 -- 16.2 Anti-forensic Approaches Proposed in the Literature 613 -- 16.3 Case Study: JPEG Image Forensics 623 -- 16.4 Trade-off between Forensics and Anti-forensics 644 -- 16.5 Conclusions 647 -- References 647 -- Index 653. |
| Record Nr. | UNINA-9910818703403321 |
Ho Anthony T. S. <1958->
|
||
| Hoboken : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
IEEE International Carnahan Conference on Security Technology, 1992
| IEEE International Carnahan Conference on Security Technology, 1992 |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 1992 |
| Descrizione fisica | 1 online resource (x, 251 pages) : illustrations |
| Disciplina | 621.3892802856 |
| Soggetto topico |
Electronics in criminal investigation
Security systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996211929003316 |
| [Place of publication not identified], : IEEE, 1992 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||