Prix bas
CHF49.10
Impression sur demande - l'exemplaire sera imprimé pour vous.
Pas de droit de retour !
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O'Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect's home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.
Texte du rabat
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.
The focus of this year's conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance.
Contenu
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network.- A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network.- Forensics for Detecting P2P Network Originated MP3 Files on the User Device.- Image Encryption Using Chaotic Signal and MaxHeap Tree.- Investigating Encrypted Material.- Legal and Technical Implications of Collecting Wireless Data as an Evidence Source.- Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt.- Robust Correctness Testing for Digital Forensic Tools.- Surveillance Applications of Biologically-Inspired Smart Cameras.- The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.- FIA: An Open Forensic Integration Architecture for Composing Digital Evidence.- Distinguishing between Camera and Scanned Images by Means of Frequency Analysis.- Developing Speaker Recognition System: From Prototype to Practical Application.- A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC.- A Provable Security Scheme of ID-Based Threshold Decryption.- Analysis of Sensor Photo Response Non-Uniformity in RAW Images.- Audit Log for Forensic Photography.- Authenticating Medical Images through Repetitive Index Modulation Based Watermarking.- Cyber Forensics Ontology for Cyber Criminal Investigation.- Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis.- Detection of Block Artifacts for Digital Forensic Analysis.- Vocal Forgery in Forensic Sciences.- International Workshop on e-Forensics Law.- Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights.- Digital Identity The Legal Person?.- Surveillance and Datenschutz in Virtual Environments.