You are previewing Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security.
O'Reilly logo
Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security

Book Description

The revolutionary way in which modern technologies have enabled us to exchange information with ease has created a demand for interdisciplinary research in digital forensics and investigations aiming to combat the abuse of computer technologies. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security presents various digital crime and forensic disciplines that use electronic devices and software for crime prevention and detection. This book provides theoretical and empirical research articles and case studies for a broad range of academic readers as well as professionals, industry consultants, and practitioners involved in the use, design, and development of techniques related to digital forensics and investigation.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. Associate Editors
    3. List of Reviewers
  5. Preface
    1. SECTION 1: MULTIMEDIA FORENSICS AND SECURITY
    2. SECTION 2: DIGITAL EVIDENCE
  6. Section 1: Multimedia Forensics and Security
    1. Chapter 1: Fingerprint Liveness Detection Based on Fake Finger Characteristics
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. FAKE-BASED FEATURES FOR FINGERPRINT LIVENESS DETECTION
      4. 3. LIVE-BASED FEATURES ADOPTED
      5. 4. EXPERIMENTAL RESULTS
      6. CONCLUSION
    2. Chapter 2: Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. FEATURES SELECTION
      5. ALGORITHM DESCRIPTION
      6. EXPERIMENT RESULTS AND DISCUSSION
      7. CONCLUSION
    3. Chapter 3: An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PROPOSED IMAGE REGION DESCRIPTION METHOD BASED ON STEP SECTOR STATISTICS
      4. THE DETECTION ALGORITHM
      5. EXPERIMENTS
      6. CONCLUSION
    4. Chapter 4: Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED AUDIO FINGERPRINTING FRAMEWORK
      4. EXPERIMENTAL RESULTS
      5. CONCLUSION
    5. Chapter 5: An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. THE PROPOSED ALGORITHM
      5. RESULTS AND ANALYSIS
      6. CONCLUSION
    6. Chapter 6: An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients
      1. ABSTRACT
      2. INTRODUCTION
      3. PRELIMINARIES
      4. THE PROPOSED SCHEME
      5. EXPERIMENTAL RESULTS AND ANALYSIS
      6. CONCLUSION
    7. Chapter 7: A Study on Embedding Efficiency of Matrix Encoding
      1. ABSTRACT
      2. INTRODUCTION
      3. PRELIMINARIES
      4. ANALYSIS OF EMBEDDING EFFICIENCY AND EMBEDDING RATE
      5. EMBEDDING EFFICIENCY ASSESSMENT OF MATRIX EMBEDDING WITH DIFFERENT RADIXES
      6. CONCLUSION
    8. Chapter 8: Spam 2.0 State of the Art
      1. ABSTRACT
      2. INTRODUCTION
      3. DETECTION-BASED SPAM 2.0 FILTERING
      4. PREVENTION-BASED SPAM 2.0 FILTERING
      5. EARLY-DETECTION-BASED SPAM 2.0 FILTERING
      6. EVALUATION AND DISCUSSION
      7. CONCLUSION
  7. Section 2: Digital Evidence
    1. Chapter 9: Pypette
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PYPETTE
      5. IMPLEMENTATION
      6. RESULTS
      7. CONCLUSION AND FURTHER WORK
    2. Chapter 10: Probabilistic Evaluation of SMS Messages as Forensic Evidence
      1. ABSTRACT
      2. INTRODUCTION
      3. FORENSIC AUTHORSHIP ANALYSIS
      4. LIKELIHOOD-RATIO APPROACH
      5. TESTING
      6. RESULTS AND DISCUSSIONS
      7. CONCLUSION
    3. Chapter 11: A Model for Hybrid Evidence Investigation
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. A MODEL FOR HYBRID EVIDENCE INVESTIGATION
      5. MODEL ANALYSIS
      6. CASE EXAMPLE: IMPLEMENTING THE PROPOSED MODEL IN A HOUSE INVESTIGATION
      7. CONCLUSION
    4. Chapter 12: A Comprehensive Survey of Event Analytics
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE STATE OF THE ARTS
      4. 3. EXISTING SYSTEMS, ALGORITHMS AND TOOLS
      5. CONCLUSION
    5. Chapter 13: Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. HYPOTHESIS GENERATION AND TESTING
      5. CASE STUDY AND ANALYSIS
      6. SUMMARY
    6. Chapter 14: A Framework for the Forensic Analysis of User Interaction with Social Media
      1. ABSTRACT
      2. INTRODUCTION
      3. SOCIAL NETWORK AND SOCIAL MEDIA ANALYSIS
      4. SOCIAL MEDIA INVESTIGATION FRAMEWORK
      5. CASE STUDY AND RESULTS
      6. CONCLUSION AND FURTHER WORK
    7. Chapter 15: Calm Before the Storm
      1. ABSTRACT
      2. INTRODUCTION
      3. CLOUD COMPUTING
      4. CURRENT DIGITAL FORENSIC PROCESS MODELS
      5. DIGITAL FORENSICS IN CLOUD ENVIRONMENTS
      6. RELATED WORK
      7. FUTURE WORK
      8. CONCLUSION
    8. Chapter 16: The Need for Digital Evidence Standardisation
      1. ABSTRACT
      2. INTRODUCTION
      3. THE SCOPE OF DIGITAL EVIDENCE
      4. INTERNATIONAL INITIATIVES
      5. THE NECESSITY OF INTERNATIONAL STANDARDS
      6. DIGITAL EVIDENCE AS PART OF THE FORENSIC PROCESS
      7. HURDLES TO INTERNATIONAL DIGITAL EVIDENCE STANDARDS
      8. CONCLUSION
  8. Compilation of References
  9. About the Contributors