New technologies for digital crime and forensics devices, applications, and software

"This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities" - Provided by publisher

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Li, Chang-Tsun (HerausgeberIn), Ho, Anthony T. S. 1958- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey PA Information Science Reference [2011]
Schriftenreihe:Premier reference source
Schlagworte:
Online-Zugang:DE-706
DE-1049
DE-898
DE-573
DE-1050
DE-83
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Inhaltsangabe:
  • Digital evidence
  • Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools / Simson Garfinkel
  • Voice over IP : privacy and forensic implications / Jill Slay, Matthew Simon
  • Volatile memory collection and analysis for windows mission-critical computer systems / Antonio Savoldi, Paolo Gubian
  • Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder
  • Combating internet-based crime
  • Methods to identify spammers / Tobias Eggendorfer
  • Spam image clustering for identifying common sources of unsolicited emails / Chengcui Zhang, Xin Chen, Wei-Bang Chen, Lin Yang, Gary Warner
  • A model based approach to timestamp evidence interpretation / Svein Willassen
  • Conducting forensic investigations of cyber attacks on automobile in-vehicle networks / Dennis Nilsson, Ulf Larson
  • Dealing with multiple truths in online virtual worlds / Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke, Sabine Cikic
  • Content protection through the use of extrinsic data
  • Locally square distortion and batch steganographic capacity / Andrew Ker
  • Efficient forensic analysis for anonymous attack in secure content distribution / Hongxia Jin
  • Protection of digital mammograms on pacss using data hiding techniques / Chang-Tsun Li, Yue Li, Chia-Hung Wei
  • Reversible and blind database watermarking using difference expansion / Gaurav Gupta, Josef Pieprzyk
  • Medical images authentication through repetitive index modulation based watermarking / Chang-Tsun Li, Yue Li
  • Application of pattern recognition and signal processing techniques to digital forecsics
  • Unexpected artifacts in a digital photograph / Matthew Sorell
  • Conditions for effective detection and identification of primary quantization of re-quantized jpeg images / Matthew Sorell
  • Dynamic structural statistical model based online signature verification / Yan Chen, Xiaoqing Ding, Patrick Wang
  • Efficient image matching using local invariant features for copy detection / H.R. Chennamma, Lalitha Rangarajan, M.S. Rao
  • Reliable motion detection, location and audit in surveillance video / Amirsaman Poursoltanmohammadi, Matthew Sorell
  • Cancellable biometrics for on-line signature recognition / Emanuele Maiorana, Patrizio Campisi, Alessandro Neri