You are previewing Crime Prevention Technologies and Applications for Advancing Criminal Investigation.
O'Reilly logo
Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Book Description

The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. International Advisory Board
    2. Associate Editors
    3. International Editorial Review Board
  5. Preface
  6. Section 1: Multimedia Forensics Based on Intrinsic Data
    1. Chapter 1: A DFT-Based Analysis to Discern Between Camera and Scanned Images
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. SENSOR PATTERN NOISE CHARACTERIZATION
      4. 3. THE PROPOSED METHODOLOGY
      5. 4. ANALYSIS OF THRESHOLDS THROUGH ROC CURVES
      6. 5. EXPERIMENTAL RESULTS
      7. 6. CONCLUSION
    2. Chapter 2: Estimate of PRNU Noise Based on Different Noise Models for Source Camera Identification
      1. ABSTRACT
      2. INTRODUCTION
      3. DE-NOISING FILTERS
      4. DIGITAL CAMERA SENSOR OUTPUT MODEL
      5. EXPERIMENTAL RESULTS
      6. CONCLUSION
    3. Chapter 3: Source Camera Identification Based on Sensor Readout Noise
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RELATED WORK
      4. 3. SIGNAL PROCESSING IN DIGITAL CAMERAS
      5. 4. ORIGIN OF READOUT NOISE
      6. 5. PROPOSED APPROACH
      7. 6. EXPERIMENTAL SETUP
      8. 7. DISCUSSION AND FUTURE WORK
      9. 8. CONCLUSION
  7. Section 2: Multimedia Security Based on Extrinsic Data
    1. Chapter 4: Image Forensics Using Generalised Benford’s Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. THRESHOLD IN SEMI-FRAGILE WATERMARKING
      4. BENFORD’S LAW FOR SEMI-FRAGILE WATERMARKING
      5. THE IMPROVED AUTHENTICATION METHOD
      6. EXPERIMENTAL RESULTS
      7. SUMMARY
    2. Chapter 5: Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain
      1. ABSTRACT
      2. INTRODUCTION
      3. 2. DT-CWT SUBBAND STATISTICS
      4. 3. COMPLEX WAVELET TRANSFORM WATERMARKING
      5. 4. BLIND DT-CWT WATERMARK DETECTION
      6. 5. EXPERIMENTAL RESULTS
      7. 6. CONCLUSION
    3. Chapter 6: Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. 2 COMBINED SPATIO-TEMPORAL JND MODEL
      4. 3 THE SPATIO-TEMPORAL JND MODEL GUIDED WATERMARKING SCHEME
      5. 5 CONCLUSION
    4. Chapter 7: Watermark-Only Security Attack on DM-QIM Watermarking
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. KEY SECURITY CLASSES
      4. 3. THE ATTACKER’S CHALLENGE
      5. 4. GUIDED KEY GUESSING
      6. 5. RESULTS
      7. 6. CONCLUSION
  8. Section 3: Applications of Cryptography in Digital Forensics
    1. Chapter 8: Cryptopometry as a Methodology for Investigating Encrypted Material
      1. ABSTRACT
      2. INTRODUCTION
      3. 1 RESEARCH CONTRIBUTION
      4. 2 PROBLEM DESCRIPTION
      5. 3 DERIVATION OF CRYPTOPOMETRY
      6. 4 CASE STUDY
      7. 5 EVALUATION: USING RECEIVER OPERATING CHARACTERISTIC (ROC) ANALYSIS
      8. 6 PROBABILITY OF CORRECTLY IDENTIFYING THE ORIGINAL PLAINTEXT FILE
      9. 7 CONCLUSION
      10. 8 FUTURE WORK
      11. 9 APPENDIX: JAVA CODE SNIPPETS
    2. Chapter 9: Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
      1. ABSTRACT
      2. RELATED WORK
      3. DEFINITIONS AND NOTATIONS
      4. IMPOSSIBILITY OF INFORMATION-THEORETIC FORGERY RESISTANCE
      5. A SUFFICIENT CONDITION FOR COLLISION RESISTANCE
      6. A ROBUST HASH SCHEME
      7. SECURITY ANALYSIS
      8. CONCLUSION
    3. Chapter 10: Steganography in Thai Text
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: THAI ORTHOGRAPHY
      4. METHOD
      5. THE STEGOSYSTEM
      6. RESULTS
      7. DISCUSSION
  9. Section 4: Applications of Pattern Recognition and Signal Processing Techniques to Digital Forensics
    1. Chapter 11: Digital Image Forensics Using Multi-Resolution Histograms
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCTION TO DIGITAL IMAGE FORENSICS
      4. INTRODUCTION TO MULTI-RESOLUTION HISTOGRAM
      5. METHOD
      6. EXTRACTION OF MULTI-RESOLUTION HISTOGRAMS
      7. CLONE DETECTION
      8. SPLICING DETECTION
      9. EXPERIMENTATION AND RESULTS
      10. DISCUSSION
    2. Chapter 12: Digital Image Splicing Using Edges
      1. ABSTRACT
      2. INTRODUCTION
      3. 2 RELATED WORK
      4. 3 CONTRIBUTIONS
      5. 4 RESULTS
      6. 5 COMPLEXITY ANALYSIS
      7. 6 CONCLUSION
    3. Chapter 13: A Biologically Inspired Smart Camera for Use in Surveillance Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. SPATIAL AND TEMPORAL IMAGE PROCESSING
      4. BIO-INSPIRED IMAGE PROCESSING
      5. IMPLEMENTATION
      6. CONCLUSION AND FUTURE WORK
    4. Chapter 14: Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank
      1. ABSTRACT
      2. INTRODUCTION
      3. 2 REGION OF INTEREST EXTRACTION
      4. 4 FISHER LINEAR DISCRIMINANT ANALYSIS
      5. 5 PROPOSED SYSTEM
      6. 6 EXPERIMENTAL RESULTS
      7. 7 CONCLUSION
  10. Section 5: Digital Evidence
    1. Chapter 15: Suspect Sciences?
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE AUSTRALIAN ADMISSIBILITY FRAMEWORK
      4. 3. THE ADMISSIBILITY OF IDENTIFICATION EVIDENCE DERIVED FROM IMAGES AND SOUNDS
      5. 4. EVIDENTIARY AND PROCEDURAL PROBLEMS
      6. 5. INTERNATIONAL TRENDS (IN NORTH AMERICA, AT LEAST)
      7. 6. “RELIABILITY” IN AUSTRALIAN EVIDENCE JURISPRUDENCE?
      8. 7. CONCLUSION: DEMONSTRABLE RELIABILITY AND RESTRAINT
    2. Chapter 16: Mobile Phone Forensic Analysis
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. FORENSIC GUIDELINES
      4. 3. SUBSCRIBER IDENTITY MODULE ANALYSIS
      5. 4. MOBILE FORENSIC TOOLS
      6. 5. CONCLUSION
    3. Chapter 17: Grey Areas
      1. ABSTRACT
      2. INTRODUCTION
      3. THE GROWING CLOUD
      4. PAYMENT MODELS
      5. ‘FREE’ CLOUD SERVICES
      6. ACCESS TO DATA
      7. CENTRALISED SERVICE
      8. PRIVACY ISSUES
      9. SECURITY
      10. TERMS OF USE: SOME CAUSE FOR CONCERN
      11. INTELLECTUAL PROPERTY
      12. JURISDICTION FOR DISPUTES
      13. CONCLUSION
    4. Chapter 18: A Conceptual Methodology for Dealing with Terrorism “Narratives”
      1. ABSTRACT
      2. INTRODUCTION
      3. ONTOLOGIES AND NKRL
      4. INFERENCE PROCEDURES
      5. RECENT DEVELOPMENTS
      6. CONCLUSION
  11. Compilation of References
  12. About the Contributors