New technologies for digital crime and forensics : devices, applications, and software /

"This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities"--Provided by publisher.

Bibliographic Details
Other Authors: Li, Chang-Tsun., Ho, Anthony T.S., 1958-
Format: Book
Published: Hershey, PA : Information Science Reference, c2011.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 03614cam a2200301 a 4500
001 25794
003 DLC
005 20110923105735.0
008 110120s2011 paua b 001 0 eng
010 # # |a 2011000066 
020 # # |a 9781609605155 (hardcover) 
020 # # |a 9781609605162 (ebook) 
040 # # |a DLC  |c DLC  |d DLC 
042 # # |a pcc 
050 # # |a HV8073  |b .N468 2011 
245 # # |a New technologies for digital crime and forensics :  |b devices, applications, and software /  |c [edited by] Chang-Tsun Li and Anthony T.S. Ho. 
260 # # |a Hershey, PA :  |b Information Science Reference,  |c c2011. 
300 # # |a xxiv, 347 p. :  |b ill. ;  |c 29 cm. 
500 # # |a "Premier reference source"--Cover. 
504 # # |a Includes bibliographical references and index. 
505 # # |a Digital evidence -- Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools / Simson Garfinkel -- Voice over IP : privacy and forensic implications / Jill Slay, Matthew Simon -- Volatile memory collection and analysis for windows mission-critical computer systems / Antonio Savoldi, Paolo Gubian -- Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder -- Combating internet-based crime -- Methods to identify spammers / Tobias Eggendorfer -- Spam image clustering for identifying common sources of unsolicited emails / Chengcui Zhang, Xin Chen, Wei-Bang Chen, Lin Yang, Gary Warner -- A model based approach to timestamp evidence interpretation / Svein Willassen -- Conducting forensic investigations of cyber attacks on automobile in-vehicle networks / Dennis Nilsson, Ulf Larson -- Dealing with multiple truths in online virtual worlds / Jan Sablatnig, Fritz Lehmann-Grube, Sven Grottke, Sabine Cikic -- Content protection through the use of extrinsic data -- Locally square distortion and batch steganographic capacity / Andrew Ker -- Efficient forensic analysis for anonymous attack in secure content distribution / Hongxia Jin -- Protection of digital mammograms on pacss using data hiding techniques / Chang-Tsun Li, Yue Li, Chia-Hung Wei -- Reversible and blind database watermarking using difference expansion / Gaurav Gupta, Josef Pieprzyk -- Medical images authentication through repetitive index modulation based watermarking / Chang-Tsun Li, Yue Li -- Application of pattern recognition and signal processing techniques to digital forecsics -- Unexpected artifacts in a digital photograph / Matthew Sorell -- Conditions for effective detection and identification of primary quantization of re-quantized jpeg images / Matthew Sorell -- Dynamic structural statistical model based online signature verification / Yan Chen, Xiaoqing Ding, Patrick Wang -- Efficient image 
505 # # |a matching using local invariant features for copy detection / H.R. Chennamma, Lalitha Rangarajan, M.S. Rao -- Reliable motion detection, location and audit in surveillance video / Amirsaman Poursoltanmohammadi, Matthew Sorell -- Cancellable biometrics for on-line signature recognition / Emanuele Maiorana, Patrizio Campisi, Alessandro Neri. 
520 # # |a "This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities"--Provided by publisher. 
650 # # |a Criminal investigation  |x Technological innovations. 
700 # # |a Li, Chang-Tsun. 
700 # # |a Ho, Anthony T.S.,  |d 1958- 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-515-5  |z View fulltext via EzAccess