Details

Handbook of Digital Forensics of Multimedia Data and Devices


Handbook of Digital Forensics of Multimedia Data and Devices


IEEE Press 1. Aufl.

von: Anthony T. S. Ho, Shujun Li

158,38 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 20.05.2016
ISBN/EAN: 9781118757079
Sprache: englisch
Anzahl Seiten: 704

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras.</p> <p>This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others.<br /><br /><b>Key features:</b></p> <ul> <li>Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices</li> <li>Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices</li> <li>Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work</li> <li>Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies</li> </ul>
<p>List of Contributors xvii</p> <p>Foreword xix</p> <p>Preface xxi</p> <p>Acknowledgements xxvii</p> <p><b>PART ONE MULTIMEDIA EVIDENCE HANDLING</b></p> <p><b>1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? 3</b></p> <p>1.1 Introduction 3</p> <p>1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK 4</p> <p>1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK 17</p> <p>1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China&rsquo;s Ministry of Public Security 23</p> <p>1.5 Discussions 28</p> <p>1.6 Summary 32</p> <p>1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre 32</p> <p>References 34</p> <p><b>2 Standards and Best Practices in Digital and Multimedia Forensics 38</b></p> <p>2.1 Introduction 38</p> <p>2.2 Overview 39</p> <p>2.3 Electronic Evidence and Digital Forensics 48</p> <p>2.4 Multimedia Evidence and Multimedia Forensics 70</p> <p>2.5 Digital Forensics Laboratory Accreditation 77</p> <p>2.6 General Quality Assurance (Management) 79</p> <p>2.7 Training, Education and Certification on Digital and Multimedia Forensics 81</p> <p>2.8 Conclusions 84</p> <p>Acknowledgements 86</p> <p>References 86</p> <p><b>3 A Machine Learning-Based Approach to Digital Triage 94</b></p> <p>3.1 Introduction 94</p> <p>3.2 Related Work on Digital Triage 96</p> <p>3.3 A Machine Learning-Based Digital Triage Framework 100</p> <p>3.4 A Child Pornography Exchange Case Study 110</p> <p>3.5 Conclusion 128</p> <p>3.6 Challenges and Future Directions for the Digital Forensics Community 128</p> <p>Acknowledgements 130</p> <p>References 130</p> <p><b>4 Forensic Authentication of Digital Audio and Video Files 133</b></p> <p>4.1 Introduction 133</p> <p>4.2 Examination Requests and Submitted Evidence 134</p> <p>4.3 Laboratory Space 138</p> <p>4.4 Laboratory Software and Equipment 138</p> <p>4.5 Audio/Video Authentication Examinations 147</p> <p>4.6 Preparation of Work Notes and Laboratory Reports 171</p> <p>4.7 Expert Testimony 172</p> <p>4.8 Case Examples 173</p> <p>4.9 Discussion 177</p> <p>References 178</p> <p><b>PART TWO DIGITAL EVIDENCE EXTRACTION</b></p> <p><b>5 Photogrammetry in Digital Forensics 185</b></p> <p>5.1 Introduction 185</p> <p>5.2 Different Methods 188</p> <p>5.3 Measurement Uncertainty 194</p> <p>5.4 Case Studies 195</p> <p>5.5 3D Modelling/Scenario Testing 212</p> <p>5.6 Summary 217</p> <p>References 217</p> <p><b>6 Advanced Multimedia File Carving 219</b></p> <p>6.1 Introduction 219</p> <p>6.2 Digtal Data Storage 220</p> <p>6.3 File Carving of Binary Data 225</p> <p>6.4 Multimedia Data Structures 226</p> <p>6.5 File Carving of Multimedia Data 232</p> <p>6.6 Content Identification 241</p> <p>6.7 File Carving Frameworks 253</p> <p>6.8 Conclusions 264</p> <p>Acknowledgements 265</p> <p>References 265</p> <p><b>7 On Forensic Use of Biometrics 270</b></p> <p>7.1 Introduction 270</p> <p>7.2 Biometrics Performance Metrics 273</p> <p>7.3 Face: The Natural Means for Human Recognition 274</p> <p>7.4 Ears as a Means of Forensic Identification 283</p> <p>7.5 Conclusions 299</p> <p>References 299</p> <p><b>8 Multimedia Analytics for Image Collection Forensics 305</b></p> <p>8.1 Introduction 305</p> <p>8.2 Data and Tasks 308</p> <p>8.3 Multimedia Analysis 309</p> <p>8.4 Visual Analytics Processes 312</p> <p>8.5 ChronoBrowser 313</p> <p>8.6 MediaTable 320</p> <p>8.7 An Example Scenario 323</p> <p>8.8 Future Outlook 325</p> <p>References 326</p> <p><b>PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS</b></p> <p><b>9 Forensic Camera Model Identification 331</b></p> <p>9.1 Introduction 331</p> <p>9.2 Forensic Source Identification 333</p> <p>9.3 Digital Camera Model Identification 337</p> <p>9.4 Benchmarking Camera Model Identification Algorithms 339</p> <p>9.5 Model-Specific Characteristics of Digital Camera Components 341</p> <p>9.6 Black Box Camera Model Identification 351</p> <p>9.7 Camera Model Identification in Open Sets 364</p> <p>9.8 Model-Specific Characteristics in Device-Level Identification 366</p> <p>9.9 Open Challenges Towards Practical Applications 368</p> <p>References 370</p> <p><b>10 Printer and Scanner Forensics 375</b></p> <p>10.1 Introduction 375</p> <p>10.2 Printer Forensics 379</p> <p>10.3 Scanner Forensics 386</p> <p>10.4 Photocopier Identification 389</p> <p>10.5 Forgery Detection for Printed and Scanned Documents 391</p> <p>10.6 Sample Algorithms with Case Studies 396</p> <p>10.7 Open Problems and Challenges 406</p> <p>10.8 Conclusions 408</p> <p>Acknowledgements 408</p> <p>References 408</p> <p><b>11 Microphone Forensics 411</b></p> <p>11.1 Introduction 411</p> <p>11.2 Pattern Recognition for Microphone Forensics 414</p> <p>11.3 Guidelines for Microphone Registration 421</p> <p>11.4 Case Studies 423</p> <p>11.5 Chapter Summary 435</p> <p>Acknowledgements 436</p> <p>References 437</p> <p><b>12 Forensic Identification of Printed Documents 442</b></p> <p>12.1 Introduction 442</p> <p>12.2 Special Materials 449</p> <p>12.3 Substrate Forensics 450</p> <p>12.4 Print Forensics 455</p> <p>12.5 Real World Example: Currency Protection 473</p> <p>12.6 Summary and Ecosystem Considerations 475</p> <p>References 478</p> <p><b>PART FOUR MULTIMEDIA CONTENT FORENSICS</b></p> <p><b>13 Digital Image Forensics with Statistical Analysis 483</b></p> <p>13.1 Introduction 483</p> <p>13.2 Detecting Region Duplication 488</p> <p>13.3 Exposing Splicing Forgery 500</p> <p>13.4 Case Studies 508</p> <p>13.5 Other Applications 512</p> <p>13.6 Summary 515</p> <p>References 517</p> <p><b>14 Camera-Based Image Forgery Detection 522</b></p> <p>14.1 Introduction 522</p> <p>14.2 Camera Structure 524</p> <p>14.3 Camera-Based Forgery Detection Methods 535</p> <p>14.4 Forgery Detection Based on PFA: A Case Study 548</p> <p>14.5 Conclusion 564</p> <p>References 565</p> <p><b>15 Image and Video Processing History Recovery 572</b></p> <p>15.1 Introduction 572</p> <p>15.2 Coding Artefacts 573</p> <p>15.3 Editing Artefacts 586</p> <p>15.4 Estimation of Processing Parameters 590</p> <p>15.5 Case Studies 601</p> <p>15.6 Conclusions 605</p> <p>References 607</p> <p><b>16 Anti-Forensics of Multimedia Data and Countermeasures 612</b></p> <p>16.1 Introduction 612</p> <p>16.2 Anti-forensic Approaches Proposed in the Literature 613</p> <p>16.3 Case Study: JPEG Image Forensics 623</p> <p>16.4 Trade-off between Forensics and Anti-forensics 644</p> <p>16.5 Conclusions 647</p> <p>References 647</p> <p>Index 653</p>
<b>Anthony T.S. Ho, Department of Computing, University of Surrey, UK</b><br />Prof. Ho holds the Personal Chair in Multimedia Security and is currently the Head of the Department of Computing at the University of Surrey. He is a Fellow of the Institution of Engineering and Technology (FIET), a Chartered Electrical Engineer (CEng), Fellow of British Computer Society (FBCS) and a Senior Member of IEEE. He was the recipient of the IET Innovation in Engineering Award (2006) for his research and commercialisation work on digital watermarking in 2006. Prof. Ho is a member of the IEEE Signal Processing Society Technical Community on Information Forensics and Security. He is the editor-in-chief of the international journal Information Security Technical Reports, which covers digital forensics as one of its key topics. He is also the co-editor-in-chief of International Journal of Digital Crime and Forensics which publishes research papers on both digital and multimedia forensics.<br /><br /><b>Shujun Li, Department of Computing, University of Surrey, UK</b><br />Dr. Li is a Senior Lecturer in the Department of Computing at the University of Surrey. Dr Li received his PhD degree in Information and Communication Engineering in 2003 from Xi&rsquo;an Jiaotong University, China. He has published more than 70 scientific papers at various international journals and conferences. Dr. Li is on the editorial board of Information Security Technical Reports. He is a Senior Member of the IEEE and a Professional Member of the ACM. He is a member of the IEEE Communications Society Technical Committee on Multimedia Communications and of the IEEE Circuits and Systems Society Technical Committee on Nonlinear Circuits &amp; Systems. He is an active contributor to the ISO/IEC RVC standard as a member of the MPEG.
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras.&nbsp; <br /><br />This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializing in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others.<br />Key features: <br /><br />- Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices<br />- Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices<br />- Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work<br />- Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies

Diese Produkte könnten Sie auch interessieren:

Strategies to the Prediction, Mitigation and Management of Product Obsolescence
Strategies to the Prediction, Mitigation and Management of Product Obsolescence
von: Bjoern Bartels, Ulrich Ermel, Peter Sandborn, Michael G. Pecht
PDF ebook
116,99 €