Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Handbook of Digital Forensics of Multimedia Data and Devices - ISBN 9781118640500

Handbook of Digital Forensics of Multimedia Data and Devices

ISBN 9781118640500

Autor: Anthony T. S. Ho, Shujun Li

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 739,20 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9781118640500

ISBN10:      

1118640500

Autor:      

Anthony T. S. Ho, Shujun Li

Oprawa:      

Hardback

Rok Wydania:      

2015-09-25

Ilość stron:      

698

Wymiary:      

244x170

Tematy:      

TJ

Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever–more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub–topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. 

This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state–of–the–art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others.
Key features:

– Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices
– Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices
– Offers not only explanations of techniques but also real–world and simulated case studies to illustrate how digital and multimedia forensics techniques work
– Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies

List of Contributors

Foreword

Preface

Acknowledgements

PART ONE MULTIMEDIA EVIDENCE HANDLING

1 Digital Forensics Laboratories in Operation: How Are Multimedia

Data and Devices Handled?

1.1 Introduction

1.2 Digital and Electronics Forensic Service, Metropolitan Police

Service, UK

1.2.1 Background: Metropolitan Police Service

1.2.2 Digital and Electronics Forensic Service

1.2.3 AV Lab: Operational and Procedural Aspects

1.2.4 Selected Forensic Techniques Used by AV Lab

1.2.5 Acknowledgements

1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey

Police, UK

1.3.1 Background: Surrey Police

1.3.2 Structure of Surrey Police s Digital Forensics Team and AV

Team

1.3.3 Training and Certification

1.3.4 Standard Procedure

1.3.5 Routine Tasks Involving Multimedia Data and Devices

1.3.6 Submission Formats

1.3.7 Triage

1.3.8 Software and Hardware Tools Used for Handling

Multimedia Data

1.3.9 Cases Involving Encryption and Child Pornography

1.3.10 Cases Involving Source Device Identification

1.3.11 Challenges

1.3.12 Acknowledgements

1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of

China s Ministry of Public Security

1.4.1 Background: Third Research Institute of China s Ministry

of Public Security

1.4.2 Background: Related Legislations and Regulations

1.4.3 Overview of SSDFC

1.4.4 Services Provided

1.4.5 Procedure

1.4.6 Workload and Typical Cases

1.4.7 Software and Hardware Tools Used

1.4.8 Challenges

1.4.9 Acknowledgements

1.5 Discussions

1.6 Summary

1.A Appendix: Questionnaires for Interviewing Surrey Police

and Shanghai Stars Digital Forensic Centre

References

2 Standards and Best Practices in Digital and Multimedia Forensics

2.1 Introduction

2.2 Overview

2.2.1 ISO Standards

2.2.2 Other International/Regional Standards and Guides

2.2.3 US Standards and Best Practice Guides

2.2.4 UK Standards and Best Practice Guides

2.3 Electronic Evidence and Digital Forensics

2.3.1 International Standards

2.3.2 National Standards

2.3.3 Best Practice Guides

2.3.4 US Guides

2.3.5 European Guides

2.4 Multimedia Evidence and Multimedia Forensics

2.4.1 ASTM E2825–12 Standard Guide for Forensic Digital

Image Processing (2012)

2.4.2 US SWGs (Scientific Working Groups)

2.4.3 ENFSI Working Groups

2.4.4 UK Law Enforcement

2.5 Digital Forensics Laboratory Accreditation

2.5.1 International Standards

2.6 General Quality Assurance (Management)

2.6.1 ISO 9001:2008 Quality Management Systems

Requirements

2.6.2 ISO/IEC 27001:2005 Information Security Management

Systems Requirements

2.6.3 ISO/IEC 27002:2013 Code of Practice for Information

Security Controls

2.7 Training, Education and Certification on Digital and Multimedia

Forensics

2.7.1 Standards and Best Practice Guides

2.7.2 Certification, Training and Educational Programs

2.8 Conclusions

References

3 A Machine Learning–Based Approach to Digital Triage

3.1 Introduction

3.1.1 Chapter Outline

3.2 Related Work on Digital Triage

3.2.1 Triage in the Medical Field

3.2.2 Early Digital Triage Models

3.2.3 Machine Learning–Based Digital Triage

3.2.4 Other Multimedia Source Classification Techniques

3.3 A Machine Learning–Based Digital Triage Framework

3.3.1 Machine Learning Terminology

3.3.2 The framework in Detail

3.3.3 Collection Data Extraction

3.3.4 Processing Feature Extraction, Dataset Creation and

Processing Algorithms

3.3.5 Presentation

3.3.6 Model validation

3.4 A Child Pornography Exchange Case Study

3.4.1 Definition of Child Pornography Exchange

3.4.2 Child Pornography Exchange State Vector

3.4.3 Data Corpus

3.4.4 Learning from Available Data

3.4.5 Experiment Setup, Results and Discussion

3.5 Conclusion

3.6 Challenges and Future Directions for the Digital

Forensics Community

References

4 Forensic Authentication of Digital Audio and Video Files

4.1 Introduction

4.2 Examination Requests and Submitted Evidence

4.2.1 Examination Requests

4.2.2 Submitted Evidence

4.2.3 Digital Recording Devices

4.2.4 Digital File Formats

4.3 Laboratory Space

4.4 Laboratory Software and Equipment

4.4.1 High–Speed Computers, Computer Peripherals, Media

Readers/Writers, Hardware/Software Write Blockers,

Professional Headphones, Amplifiers, Cables and

Connectors

4.4.2 Proprietary Audio and Video Playback Software

4.4.3 Digital Data Imaging and Analysis Software

4.4.4 High–Resolution Audio Waveform Analysis Software

4.4.5 FFT Analysers and Software

4.4.6 Spectrographic Analysis Software

4.4.7 Scientific Computing Software

4.4.8 Professional Audio and Non–linear Video Editing

and Playback Software

4.4.9 Media Conversion/Transcoding Software

4.4.10 Professional Image Measurement and Processing Software

4.5 Audio/Video Authentication Examinations

4.5.1 Overview of Examinations

4.5.2 Hashing and Imaging

4.5.3 Playback and Conversion Optimization

4.5.4 Digital Data Analysis

4.5.5 Audio Analyses

4.5.6 Video Analyses

4.6 Preparation of Work Notes and Laboratory Reports

4.7 Expert Testimony

4.8 Case Examples

4.8.1 Case Example Number 1

4.8.2 Case Example Number 2

4.9 Discussion

References

PART TWO DIGITAL EVIDENCE EXTRACTION

5 Photogrammetry in Digital Forensics

5.1 Introduction

5.1.1 Lens Distortion

5.2 Different Methods

5.2.1 Projective Geometry or Orthorectification

5.2.2 Space Resection and Multi–image Photogrammetry

5.2.3 Reverse Projection

5.3 Measurement Uncertainty

5.3.1 Difficulties in Creating Reference Recordings

5.4 Case Studies

5.4.1 Height Measurement

5.4.2 Speed Measurement

5.4.3 Determining the Absolute Position of an Object

5.5 3D Modelling/Scenario Testing

5.6 Summary

References

6 Advanced Multimedia File Carving

6.1 Introduction

6.2 Digtal Data Storage

6.2.1 Storage Devices

6.2.2 Logical Data Organization

6.2.3 Forensic Data Investigation

6.3 File Carving of Binary Data

6.4 Multimedia Data Structures

6.4.1 Digital Images

6.4.2 Audio Data

6.4.3 Video Data

6.5 File Carving of Multimedia Data

6.5.1 Image File Carving

6.5.2 Audio File Carving

6.5.3 Video File Carving

6.5.4 Special Considerations for Multimedia

6.6 Content Identification

6.6.1 Cryptographic Hashing

6.6.2 Fuzzy Hashing

6.6.3 Perceptual Hashing

6.6.4 Searching and Indexing of Hashes

6.7 File Carving Frameworks

6.7.1 Current Practice and Existing Solutions

6.7.2 Framework Requirements

6.7.3 An Example Framework

6.7.4 Case Study

6.8 Conclusions

References

7 On Forensic Use of Biometrics

7.1 Introduction

7.2 Biometrics Performance Metrics

7.3 Face: The Natural Means for Human Recognition

7.3.1 Forensic Face Recognition

7.3.2 Automatic Face Recognition Techniques

7.3.3 Challenges and Trends of Face Recognition

7.3.4 Summary

7.4 Ears as a Means of Forensic Identification

7.4.1 Earprints in Forensics

7.4.2 From Earprints to Ear Images

7.4.3 Ear Morphology Features

7.4.4 Summary

7.5 Conclusions

References

8 Multimedia Analytics for Image Collection Forensics

8.1 Introduction

8.2 Data and Tasks

8.3 Multimedia Analysis

8.4 Visual Analytics Processes

8.5 ChronoBrowser

8.5.1 Visualizations

8.5.2 Visual Analytics Processes

8.6 MediaTable

8.6.1 Visualizations

8.6.2 Visual Analytics Processes

8.7 An Example Scenario

8.8 Future Outlook

References

PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS

9 Forensic Camera Model Identification

9.1 Introduction

9.2 Forensic Source Identification

9.2.1 Identification Granularity

9.2.2 Intra– and Inter–Class Similarity, Feature Space

Representation

9.2.3 Digital Camera Acquisition Characteristics

9.3 Digital Camera Model Identification

9.4 Benchmarking Camera Model Identification Algorithms

9.4.1 A Dataset Template for Camera Model Identification

Research

9.4.2 The Dresden Image Database

9.4.3 Benchmarking Procedure

9.5 Model–Specific Characteristics of Digital Camera Components

9.5.1 Compression Parameters, Metadata, and File Format

9.5.2 Lens Distortion

9.5.3 CFA and Demosaicing

9.5.4 Camera Response Function

9.5.5 Summary and Limitations

9.6 Black Box Camera Model Identification

9.6.1 General–Purpose Image Descriptors

9.6.2 Dresden Image Database Case Study: Closed–Set Camera

Model Identification

9.6.3 Summary

9.7 Camera Model Identification in Open Sets

9.7.1 Dresden Image Database Case Study: One–Class SVM

9.7.2 Summary and Outlook

9.8 Model–Specific Characteristics in Device–Level Identification

9.9 Open Challenges Towards Practical Applications

References

10 Printer and Scanner Forensics

10.1 Introduction

10.1.1 Comparison with Digital Image Forensics

10.1.2 Document Lifecycle

10.2 Printer Forensics

10.2.1 Working Principles of Laser Printers and Inkjet Printers

10.2.2 Flowchart of Printer Forensics

10.2.3 Laser Printer Forensics

10.2.4 Inkjet Printer Forensics

10.3 Scanner Forensics

10.3.1 Flowchart of Scanner Forensics

10.3.2 Sensor Noise

10.3.3 Dust and Scratches

10.4 Photocopier Identification

10.4.1 Contact Between Printer and photocopier

10.4.2 Character Signature

10.5 Forgery Detection for Printed and Scanned Documents

10.5.1 Flowchart of Forgery Detection

10.5.2 Forgery Detection for Printed Documents

10.5.3 Forgery Detection for Scanned Documents

10.6 Sample Algorithms with Case Studies

10.6.1 Printer Identification

10.6.2 Scanner Identification

10.6.3 Document Forgery Detection

10.7 Open Problems and Challenges

10.8 Conclusions

References

11 Microphone Forensics

11.1 Introduction

11.2 Pattern Recognition for Microphone Forensics

11.2.1 Pattern Recognition and Its Sub–Disciplines

11.2.2 State–of–the–Art in Pattern Recognition–Based

Microphone Forensics

11.3 Guidelines for Microphone Registratio

11.4 Case Studies

11.4.1 Investigation Tasks

11.4.2 Implementation of the Statistical Pattern

Recognition Pipeline

11.4.3 Evaluation Setups

11.4.4 Evaluation Results

11.5 Chapter Summary

References

12 Forensic Identification of Printed Documents

12.1 Introduction

12.1.1 Hardware Considerations

12.1.2 Performance Characterization

12.2 Special Materials

12.3 Substrate Forensics

12.3.1 FiberFingerprint

12.3.2 Laser Speckle

12.3.3 Substrate Scanning

12.3.4 PaperSpeckle

12.3.5 Practical Considerations

12.4 Print Forensics

12.4.1 Authenticating Printed Glyphs

12.4.2 Model Based Authentication

12.4.3 Authenticating Printed Halftones

12.4.4 Authenticating Data–Bearing Halftones

12.5 Real World Example: Currency Protection

12.6 Summary and Ecosystem Considerations

References

PART FOUR MULTIMEDIA CONTENT FORENSICS

13 Digital Image Forensics with Statistical Analysis

13.1 Introduction

13.1.1 Digital Image Forensics

13.1.2 Background

13.2 Detecting Region Duplication

13.2.1 Problem Definition

13.2.2 Related Works

13.2.3 Proposed Method

13.2.4 Performance Analysis

13.3 Exposing Splicing Forgery

13.3.1 Problem Definition

13.3.2 Related Works

13.3.3 Proposed Method

13.3.4 Performance Analysis

13.4 Case Studies

13.4.1 Region Duplication Forgeries

13.4.2 Splicing Forgeries

13.5 Other Applications

13.5.1 Detecting Audio Splicing

13.5.2 Exposing Video Forgery

13.6 Summary

References

14 Camera–Based Image Forgery Detection

14.1 Introduction

14.2 Camera Structure

14.2.1 Optics

14.2.2 Sensors

14.2.3 Image Processing Pipeline

14.3 Camera–Based Forgery Detection Methods

14.3.1 Optics–Based Forgery Detection

14.3.2 Sensors–Based Forgery Detection

14.3.3 Image Processing Pipeline–Based Forgery Detection

14.4 Forgery Detection Based on PFA: A Case Study

14.4.1 Forgery Detection Based on PFA

14.4.2 Algorithm

14.4.3 Test Results

14.4.4 Discussion

14.5 Conclusion

References

15 Image and Video Processing History Recovery

15.1 Introduction

15.2 Coding Artifacts

15.2.1 JPEG Compression

15.2.2 Double JPEG Compression

15.2.3 Video Compression

15.2.4 Video Re–encoding

15.3 Editing Artifacts

15.3.1 Resampling

15.3.2 Image Enhancement

15.4 Estimation of Processing Parameters

15.4.1 Estimation of Coding Parameters

15.4.2 Estimation of Editing Parameters

15.4.3 Artifact Localization

15.5 Case Studies

15.5.1 Localization of Forgeries in JPEG Images

15.5.2 Localization of Forgeries in MPEG–2 Videos

15.6 Conclusions

References

16 Anti–Forensics of Multimedia Data and Countermeasures

16.1 Introduction

16.2 Anti–forensic Approaches Proposed in the Literature

16.2.1 Anti–forensics of Acquisition Fingerprints

16.2.2 Anti–forensic of Compression Fingerprints

16.2.3 Anti–forensic of Editing Fingerprints

16.3 Case Study: JPEG Image Forensics

16.3.1 JPEG Compression and JPEG Compression Footprints

16.3.2 JPEG Compression Anti–forensics

16.3.3 Analysis of Anti–forensic Dithering

16.3.4 Countering JPEG Compression Anti–forensics

16.4 Trade–off between Forensics and Anti–forensics

16.4.1 Performance Analysis of Anti–forensics

16.4.2 Interplay between Forger and Forensic Analyst Using

Game Theory

16.5 Conclusions

References

Index

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy