You are previewing New Technologies for Digital Crime and Forensics.
O'Reilly logo
New Technologies for Digital Crime and Forensics

Book Description

Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities. This field is under constant evolution as the nature of digital crime continues to change and new methods for tracking and preventing digital attacks are developed.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
  5. Section 1: Digital Evidence
    1. Chapter 1: Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools1
      1. Abstract
      2. Introduction
      3. Background and Prior Work
      4. AFF and AFFLIB 3
      5. AFFLIB 3 Integrity Features
      6. AFFLIB 3 Encryption Features
      7. Signature and Encryption API
      8. Conclusion
    2. Chapter 2: Voice Over IP
      1. Abstract
      2. INTRODUCTION
      3. FORENSIC COMPUTING ANd VoIP
      4. RESEARCH METHODOLOGY
      5. RESULTS
    3. Chapter 3: Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems
      1. Abstract
      2. Introduction
      3. Related Works
      4. Page File Collection on a Live Windows System
      5. RAM and Page file Dump Analysis
      6. Experimental Results
      7. Conclusion and Future Work
    4. Chapter 4: Evidentiary Implications of Potential Security Weaknesses in Forensic Software
      1. Abstract
      2. Introduction
      3. Conclusion
  6. Section 2: Combating Internet-Based Crime
    1. Chapter 5: Methods to Identify Spammers
      1. Abstract
      2. INTRODUCTION
      3. ORGANISATION OF THIS article
      4. HOW SPAMMERS WORK
      5. IDENTIFICATION OF SPAMMERS
      6. IDENTIFICATION OF ADDRESS TRADERS
      7. CONCLUSION AND FURTHER RESEARCH
    2. Chapter 6: Spam Image Clustering for Identifying Common Sources of Unsolicited Emails
      1. Abstract
      2. Introduction
      3. Foreground Extraction
      4. Foreground Text Layout Analysis
      5. Foreground Picture Illustration Analysis
      6. Background Texture Analysis
      7. Clustering
      8. Experiments
      9. Conclusion
      10. Future Work
    3. Chapter 7: A Model Based Approach to Timestamp Evidence Interpretation
      1. ABSTRACT
      2. INTRODUCTION
      3. 2. ACTIONS AFFECT TIMESTAMPS
      4. 3. TIMESTAMPING ORDERS
      5. 4. POSSIBLE ACTION SEQUENCES
      6. 5. MODELLING A REAL FILE SYSTEM
      7. 6. GRAPH REPRESENTATION OF THE AFFECTS TABLE
      8. 7. TESTING A CLOCK HYPOTHESIS FOR CONSISTENCY
      9. RESULTS
      10. CONCLUDING REMARKS
    4. Chapter 8: Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. THE NEED FOR IN-VEHICLE NETWORK SECURITY AND FORENSICS
      5. BACKGROUND
      6. ATTACKER MODEL AND FORENSIC DESIGN GOALS
      7. REQUIREMENTS FOR A FORENSIC INVESTIGATION OF CYBER ATTACKS
      8. DISCUSSION AND FUTURE WORK
      9. CONCLUSION
    5. Chapter 9: Dealing with Multiple Truths in Online Virtual Worlds
      1. Abstract
      2. Introduction
      3. The Real Value of Virtual Property
      4. The Future of Online Worlds
      5. THE PRICE OF SECURITY
      6. CONCLUSION
    6. Chapter 10: Locally Square Distortion and Batch Steganographic Capacity
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM FORMULATION
      4. BOUNDS ON EMBEDDING EFFICIENCY
      5. ANALYSIS OF THE BATCH STEGANOGRAPHY PROBLEM
      6. ANALYSIS OF THE SEQUENTIAL STEGANOGRAPHY PROBLEM
  7. Section 3: Content Protection through the Use of Extrinsic Data
    1. Chapter 11: Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution
      1. Abstract
      2. INTRODUCTION
      3. TRAITOR TRACING FOR ANONYMOUS ATTACK
      4. KEY/CONTENT ASSIGNMENT
      5. EFFICIENT FORENSIC ANALYSIS ALGORITHM ON ONE LEVEL CODE
      6. EFFICIENT FORENSIC ANALYSIS AFTER REVOCATIONS
      7. EFFICIENT FORENSIC ANALYSIS FOR NESTED CODE
      8. CONCLUSION
    2. Chapter 12: Protection of Digital Mammograms on PACSs Using Data Hiding Techniques
      1. Abstract
      2. Introduction
      3. LITERATURE REVIEW
      4. The Proposed Conceptual Framework
      5. Implementation of the Conceptual Framework for Mammograms
      6. EXPERIMENTAL RESULTS AND DISCUSSIONS
      7. Conclusion
    3. Chapter 13: Reversible and Blind Database Watermarking Using Difference Expansion
      1. ABSTRACT
      2. Introduction
      3. Related Work
      4. Model of Adversary
      5. Proposed Scheme
      6. Experimental Results
      7. Analysis
      8. CONCLUSION
    4. Chapter 14: Medical Images Authentication through Repetitive Index Modulation Based Watermarking
      1. Abstract
      2. Introduction
      3. Proposed Method
      4. Experiments
      5. Conclusion
  8. Section 4: Application of Pattern Recognition and Signal Processing Techniques to Digital Forensics
    1. Chapter 15: Unexpected Artifacts in a Digital Photograph
      1. Abstract
      2. Motivation
      3. Discussion
    2. Chapter 16: Conditions for Effective Detection and Identification of Primary Quantization of Re-Quantized JPEG Images
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATION
      4. JPEG COMPRESSION
      5. DETECTION ALGORITHM
      6. ANALYSIS OF RESULTS
      7. CONCLUSION
    3. Chapter 17: Dynamic Structural Statistical Model Based Online Signature Verification
      1. ABSTRACT
      2. INTRODUCTION
      3. DYNAMIC STRUCTUAL STATISTICAL MODEL
      4. ONLINE SIGNATURE VERIFICAITON BASED ON DSSM
      5. TRAINING OF DSSM UNDER DIFFERENT COVARIANCE ASSUMPTIONS
      6. EXPERIMENTAL RESULTS
      7. COMPARISONS AND CONCLUSION
    4. Chapter 18: Efficient Image Matching using Local Invariant Features for Copy Detection
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. BACKGROUND
      5. PROPOSED MATCHING STRATEGY
      6. EXPERIMENTAL STUDY
      7. PERFORMANCE EVALUATION
      8. COMPLEXITY ANALYSIS
      9. CONCLUSION
    5. Chapter 19: Reliable Motion Detection, Location and Audit in Surveillance Video
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED APPROACH
      4. IMPLEMENTATION
      5. LEGAL CONSIDERATIONS
      6. CONCLUSION
    6. Chapter 20: Cancellable Biometrics for On-line Signature Recognition
      1. Abstract
      2. INTRODUCTION
      3. BIOMETRIC TEMPLATE SECURITY
      4. NON-INVERTIBLE TRANSFORMS FOR ON-LINE SIGNATURE TEMPLATES
      5. PROTECTED ON-LINE SIGNATURE BASED RECOGNITION SYSTEM
      6. EXPERIMENTAL RESULTS
      7. CONCLUSION
  9. Compilation of References
  10. About the Contributors