Forensics in Telecommunications, Information and Multimedia -  Matthew Sorell

Forensics in Telecommunications, Information and Multimedia (eBook)

Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers
eBook Download: PDF
2009 | 1. Auflage
X, 231 Seiten
Springer-Verlag
978-3-642-02312-5 (ISBN)
Systemvoraussetzungen
37,40 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance.

Title Page 2
Preface 5
Organization 7
Table of Contents 9
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network 11
Introduction 11
Preparing Input Data for Neural Network 12
Architecture of Neural Network Core 14
Genetic Algorithm Core 15
Mutation 15
Recombination 16
Fitness Evaluation Function 16
Simulation and Computational Results 16
Conclusion 18
References 19
Forensics for Detecting P2P Network Originated MP3 Files on the User Device 20
Introduction 20
Materials and Methods 21
File Indicators 22
Directory Indicators 22
Album Indicators 22
Examinees 22
Metrics for Indicator Characterization 23
Results 24
Discussion 26
References 27
Image Encryption Using Chaotic Signal and Max–Heap Tree 29
Introduction 29
Max-Heap Tree 30
Chaotic Signal 30
The Proposed Method 31
Experimental Result 33
Histogram Analysis 33
Correlation Coefficient Analysis 34
Information Entropy Analysis 35
Key Space Analysis 36
Key Sensitivity Analysis 36
Decoding an Encrypted Image 37
Conclusion 38
References 38
Investigating Encrypted Material 39
Introduction 39
Problem Description 39
Methodology 40
Case Study 43
Conclusion 44
Research Contribution 44
References 45
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source 46
Introduction 46
Existing Wireless Network Scanning Software 47
Legality of Wireless Network Interception 49
Conclusion and Outcomes 50
References 51
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt 52
Introduction 52
Biomedical Image Watermarking 53
Security of Medical Data 53
Providing Security through Watermarking 54
Watermarking Requirements for Biomedical Image Authentication 54
Discrete Pascal Transform 55
Proposed Method 57
Description of the Method 57
Algorithm 57
Experimental Results 59
Conclusion and Future Works 61
References 62
Robust Correctness Testing for Digital Forensic Tools 64
Introduction 64
Our Approach 65
Reducing the Impact of Errors 66
Determining the Number of Tests to Run 67
Our Adaptive Procedure 68
Correctness Testing of Data Carving Tools 69
Conclusions and Future Work 73
References 73
Surveillance Applications of Biologically-Inspired Smart Cameras 75
Introduction 75
Biologically-Inspired Vision Model 76
Spatial and Temporal Image Processing 76
Photoreceptor Model 78
Implementation 80
High Dynamic Range Camera 81
General Purpose Graphics Processing Unit 81
Processing Bottlenecks 82
Applications and Performance Evaluation 82
Object and Detail Recognition 82
Motion Detection 84
Future Work and Conclusions 85
References 85
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems 87
Introduction 87
What Is Forensic Computing in a Control System Context? 88
SCADA and Control Systems 89
Evidence from SCADA and Control Systems 90
Forensic Challenges 90
Conclusion 91
References 91
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence 93
Introduction 93
State of the Art in Digital Investigations 95
FIA for Composing Digital Evidence 97
Evidence Storage and Access Layer 97
Representation and Interpretation Layer 98
Meta-information Layer 98
Evidence Composition and Visualization Layer 99
Case Study – Car Theft Investigation 100
About the Case 101
Extracting the Data 101
Evidence Composition 101
Conclusions and Future Work 102
References 103
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis 105
Introduction 105
Sensor Pattern Noise Characterization 106
The Proposed Methodology 107
Experimental Results 108
Conclusions 110
References 111
Developing Speaker Recognition System: From Prototype to Practical Application 112
Introduction 112
Speaker Recognition 113
Short-Term Spectral Features 113
Long Term Features 114
Speaker Modeling and Matching 115
Voice Activity Detection 116
Methods Implemented and Tested 118
Windows Application: WinSProfiler 118
Symbian Implementation: EpocSProfiler 119
Prototype Solutions for NIST Competition 120
Summary of the Main Results 121
Recognition Results 121
Comparisons with Commercial Products 122
Conclusions 123
References 124
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC 126
Introduction and Background 126
Technical Overview 126
Forensic Considerations and Research Plan 127
Research Design and Scope 127
Image Acquisition 128
Forensic Analysis 128
Conclusion and Future Research 130
References 131
A Provable Security Scheme of ID-Based Threshold Decryption 132
Introduction 132
Model of ID-Based Threshold Decryption Scheme 133
IND-CCA Security 133
Building ID-Based Threshold Decryption Scheme 134
Security Proof of ID-Based Threshold Decryption Scheme without Random Oracles 135
Decisional q BDHI Problem 135
Construct Algorithm S 136
Security Verification 137
Conclusions 139
References 139
Analysis of Sensor Photo Response Non-Uniformity in RAW Images 140
Introduction 140
Background 141
Technique Overview 141
Noise Model 141
Camera Identification 141
Identification After Resampling 142
Extension Using RAW Sensor Data 143
Original Image Format (JPEG) 143
Bayer Matrix and Conversion of Raw Sensor Data 143
Modified Denoising Filter for RAW Images 144
Camera Lenses 145
Overview of Optical Effects 145
Approach 146
Data Sets 146
Results 147
Indoor Controlled Laboratory 147
Outdoors 148
Conclusion 150
References 150
Audit Log for Forensic Photography 152
Introduction 152
The Need for a Digital Negative 153
File Transaction Component 154
Metadata Record and Thumbnail 155
Cryptographic Hash 155
Audit Log System 155
Passive Capture 156
Analysis and Extraction 157
Secure Storage and Secure Retrieval 158
Power 158
Proof-of-Concept Demonstration 159
Equipment 159
Results 159
Future-Proofing and Extensions 161
Conclusions 161
References 162
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking 163
Introduction 163
Proposed Method 164
Segmentation 164
Watermarking 166
Authentication 167
Experiments 168
Conclusions 168
References 169
Cyber Forensics Ontology for Cyber Criminal Investigation 170
Introduction 170
Related Studies 171
Cyber Forensics Ontology for Cyber Criminal Investigation 173
Conclusions 175
References 175
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis 176
Introduction 176
Proposed Decomposed PRNU (DPRNU) 179
Experiments 179
Conclusion 181
References 181
Detection of Block Artifacts for Digital Forensic Analysis 183
Introduction 183
Proposed Method 184
Experiments 186
Conclusions 188
References 188
Vocal Forgery in Forensic Sciences 189
Vocal Forgery and Automatic Speaker Recognition in Forensic Sciences 189
Voice Transformation as Forgery 190
Voice Conversion as Forgery 190
Experiments and Results 192
Identification of Disguised Voices Based on a SVM Classifier 192
Comparison of Voice Conversion Technique as Forgery 193
Conclusion 194
References 194
International Workshop on e-Forensics Law 10
Complying cross Continents: At the Intersection of Litigation Rights and Privacy RightsA 196
Litigation Discovery Rights in the United States 197
Litigation Discovery Rights Outside the United States 198
Litigation Discovery Rights Versus Privacy Rights 199
The Hague Convention 200
Recommendations 202
Conclusions 203
References 204
Digital Identity – The Legal Person? 205
Introduction 205
Registered Digital Identity 208
The Role and Nature of Token Identity 209
Token Identity – The Legal Person? 214
Token Identity Is the Legal Person 216
Conclusion 219
References 220
Surveillance and Datenschutz in Virtual Environments 222
Introduction 222
Surveillance 223
Surveillance by ISPs 223
Surveillance by Administrators 223
Surveillance in Programmable Worlds 224
Surveillance in Gameworlds 225
Datenschutz 226
Origin and Application of Privacy Laws 226
Application to Virtual Environments 227
Conclusion 228
References 229
Author Index 230

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Recht / Steuern EU / Internationales Recht
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Schlagworte authentication • biometrics • Cryptanalysis • cyber forensics • Datenschutz • Digital Evidence • digital forensics • Digital Identity • Encryption • forensic analysis • forensic photography • Forensics • Handwriting Recognition • Identity • image encryption • Medical Imaging • MP3 • P2 • P2P • privacy • security • Watermarking
ISBN-10 3-642-02312-6 / 3642023126
ISBN-13 978-3-642-02312-5 / 9783642023125
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 14,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Kryptographie und Geschichte

von Wolfgang Killmann; Winfried Stephan

eBook Download (2024)
Springer Berlin Heidelberg (Verlag)
39,99