Crime prevention technologies and applications for advancing criminal investigation

"This book addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Li, Chang-Tsun.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 04387nam a2200565 a 4500
001 19646
003 IGIG
005 20120515141523.0
006 m e d
007 cr bn||||m|||a
008 120508s2012 pau fsb 000 0 eng d
010 # # |z 2012002115 
020 # # |a 9781466617599 (ebook) 
020 # # |z 9781466617582 (hbk.) 
020 # # |z 9781466617605 (print & perpetual access) 
024 7 # |a 10.4018/978-1-4666-1758-2  |2 doi 
035 # # |a (CaBNVSL)gtp00551944 
035 # # |a (OCoLC)807848942 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HV8073  |b .C6924 2012e 
082 0 4 |a 364.4028/4  |2 23 
245 0 0 |a Crime prevention technologies and applications for advancing criminal investigation  |c Chang-Tsun Li, editor.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2012. 
300 # # |a electronic texts (290 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a A DFT-based analysis to discern between camera and scanned images / Roberto Caldelli, Irene Amerini, Francesco Picchioni -- Estimate of PRNU noise based on different noise models for source camera identification / Irene Amerini ... [et al.] -- Source camera identification based on sensor readout noise / H. R. Chennamma, Lalitha Rangarajan -- Image forensics using generalised Benford's Law for improving image authentication detection rates in semi-fragile watermarking / Xi Zhao, Anthony T.S. Ho, Yun Q. Shi -- Blind detection of additive spread-spectrum watermarking in the dual-tree complex wavelet transform domain / Roland Kwitt, Peter Meerwald, Andreas Uhl -- Spatio-temporal just noticeable distortion model guided video watermarking / Yaqing Niu, Sridhar Krishnan, Qin Zhang -- Watermark-only security attack on DM-QIM watermarking: vulnerability to guided key guessing / B. R. Matam, David Lowe -- Cryptopometry as a methodology for investigating encrypted material / Niall McGrath, Pavel Gladyshev, Joe Carthy -- Secure robust hash functions and their applications in non-interactive communications / Qiming Li, Sujoy Roy -- Steganography in Thai text / Natthawut Samphaiboon, Matthew N. Dailey -- Digital image forensics using multi-resolution histograms / Jin Liu ... [et al.] -- Digital image splicing using edges / Jonathan Weir, Raymond Lau, WeiQi Yan -- A biologically inspired smart camera for use in surveillance applications / Kosta Haltis, Matthew J. Sorell, Russell Brinkworth -- Palmprint recognition based on subspace analysis of Gabor filter bank / Moussadek Laadjel ... [et al.] -- Suspect sciences?: evidentiary problems with emerging technologies / Gary Edmond -- Mobile phone forensic analysis / Kevin Curran ... [et al.] -- Grey areas: the legal dimensions of cloud computing / Michael Davis, Alice Sedsman -- A conceptual methodology for dealing with terrorism "narratives" / Gian Piero Zarri. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed May 8, 2012). 
650 # 0 |a Criminal investigation  |x Technological innovations. 
650 # 0 |a Crime prevention  |x Technological innovations. 
650 # 0 |a Law enforcement  |x Technological innovations. 
653 # # |a Surveillance technologies 
653 # # |a Crime scene imaging 
653 # # |a Cryptological techniques 
653 # # |a Data carving and recovery 
653 # # |a Digital document examination 
653 # # |a Digital evidence 
653 # # |a Information warfare 
653 # # |a Small digital device forensics 
653 # # |a Steganography and steganalysis 
653 # # |a Watermarking for digital forensics 
700 1 # |a Li, Chang-Tsun. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2012002115 
776 0 8 |i Print version:  |w (DLC) 2012002115  |z 9781466617582  |z 1466617586 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1758-2  |3 Chapter PDFs via platform: