Cargando…

Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sorell, Matthew (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 8
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network
  • A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network
  • Forensics for Detecting P2P Network Originated MP3 Files on the User Device
  • Image Encryption Using Chaotic Signal and Max-Heap Tree
  • Investigating Encrypted Material
  • Legal and Technical Implications of Collecting Wireless Data as an Evidence Source
  • Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt
  • Robust Correctness Testing for Digital Forensic Tools
  • Surveillance Applications of Biologically-Inspired Smart Cameras
  • The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems
  • FIA: An Open Forensic Integration Architecture for Composing Digital Evidence
  • Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
  • Developing Speaker Recognition System: From Prototype to Practical Application
  • A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC
  • A Provable Security Scheme of ID-Based Threshold Decryption
  • Analysis of Sensor Photo Response Non-Uniformity in RAW Images
  • Audit Log for Forensic Photography
  • Authenticating Medical Images through Repetitive Index Modulation Based Watermarking
  • Cyber Forensics Ontology for Cyber Criminal Investigation
  • Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
  • Detection of Block Artifacts for Digital Forensic Analysis
  • Vocal Forgery in Forensic Sciences
  • International Workshop on e-Forensics Law
  • Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights
  • Digital Identity - The Legal Person?
  • Surveillance and Datenschutz in Virtual Environments.