|
|
|
|
LEADER |
04387nam a2200565 a 4500 |
001 |
19646 |
003 |
IGIG |
005 |
20120515141523.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
120508s2012 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2012002115
|
020 |
# |
# |
|a 9781466617599 (ebook)
|
020 |
# |
# |
|z 9781466617582 (hbk.)
|
020 |
# |
# |
|z 9781466617605 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-1758-2
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00551944
|
035 |
# |
# |
|a (OCoLC)807848942
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV8073
|b .C6924 2012e
|
082 |
0 |
4 |
|a 364.4028/4
|2 23
|
245 |
0 |
0 |
|a Crime prevention technologies and applications for advancing criminal investigation
|c Chang-Tsun Li, editor.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2012.
|
300 |
# |
# |
|a electronic texts (290 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a A DFT-based analysis to discern between camera and scanned images / Roberto Caldelli, Irene Amerini, Francesco Picchioni -- Estimate of PRNU noise based on different noise models for source camera identification / Irene Amerini ... [et al.] -- Source camera identification based on sensor readout noise / H. R. Chennamma, Lalitha Rangarajan -- Image forensics using generalised Benford's Law for improving image authentication detection rates in semi-fragile watermarking / Xi Zhao, Anthony T.S. Ho, Yun Q. Shi -- Blind detection of additive spread-spectrum watermarking in the dual-tree complex wavelet transform domain / Roland Kwitt, Peter Meerwald, Andreas Uhl -- Spatio-temporal just noticeable distortion model guided video watermarking / Yaqing Niu, Sridhar Krishnan, Qin Zhang -- Watermark-only security attack on DM-QIM watermarking: vulnerability to guided key guessing / B. R. Matam, David Lowe -- Cryptopometry as a methodology for investigating encrypted material / Niall McGrath, Pavel Gladyshev, Joe Carthy -- Secure robust hash functions and their applications in non-interactive communications / Qiming Li, Sujoy Roy -- Steganography in Thai text / Natthawut Samphaiboon, Matthew N. Dailey -- Digital image forensics using multi-resolution histograms / Jin Liu ... [et al.] -- Digital image splicing using edges / Jonathan Weir, Raymond Lau, WeiQi Yan -- A biologically inspired smart camera for use in surveillance applications / Kosta Haltis, Matthew J. Sorell, Russell Brinkworth -- Palmprint recognition based on subspace analysis of Gabor filter bank / Moussadek Laadjel ... [et al.] -- Suspect sciences?: evidentiary problems with emerging technologies / Gary Edmond -- Mobile phone forensic analysis / Kevin Curran ... [et al.] -- Grey areas: the legal dimensions of cloud computing / Michael Davis, Alice Sedsman -- A conceptual methodology for dealing with terrorism "narratives" / Gian Piero Zarri.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed May 8, 2012).
|
650 |
# |
0 |
|a Criminal investigation
|x Technological innovations.
|
650 |
# |
0 |
|a Crime prevention
|x Technological innovations.
|
650 |
# |
0 |
|a Law enforcement
|x Technological innovations.
|
653 |
# |
# |
|a Surveillance technologies
|
653 |
# |
# |
|a Crime scene imaging
|
653 |
# |
# |
|a Cryptological techniques
|
653 |
# |
# |
|a Data carving and recovery
|
653 |
# |
# |
|a Digital document examination
|
653 |
# |
# |
|a Digital evidence
|
653 |
# |
# |
|a Information warfare
|
653 |
# |
# |
|a Small digital device forensics
|
653 |
# |
# |
|a Steganography and steganalysis
|
653 |
# |
# |
|a Watermarking for digital forensics
|
700 |
1 |
# |
|a Li, Chang-Tsun.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2012002115
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2012002115
|z 9781466617582
|z 1466617586
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1758-2
|3 Chapter PDFs via platform:
|