Skip to main content

Computational Forensics: An Overview

  • Conference paper
Computational Forensics (IWCF 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5158))

Included in the following conference series:

  • 1364 Accesses

Abstract

Cognitive abilities of human expertise modeled using computational methods offer several new possibilities for the forensic sciences. They include three areas: providing tools for use by the forensic examiner, establishing a scientific basis for the expertise, and providing an alternate opinion on a case. This paper gives a brief overview of computational forensics with a focus on those disciplines that involve pattern evidence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. van der Steen, M., Blom, M.: A roadmap for future forensic research. Technical report, Netherlands Forensic Institute (NFI), The Hague, The Netherlands (2007)

    Google Scholar 

  2. Saks, M., Koehler, J.: The coming paradigm shift in forensic identification science. Science 309, 892–895 (2005)

    Article  Google Scholar 

  3. Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann (2003)

    Google Scholar 

  4. Starzecpyzel: United states vs. Starzecpyzel. 880 F. Supp. 1027 (S.D.N.Y) (1995)

    Google Scholar 

  5. Marr, D.: Vision. Freeman, New York (1982)

    Google Scholar 

  6. Foster, K., Huber, P.: Judging Science. MIT Press, Cambridge (1999)

    Google Scholar 

  7. Aitken, C., Taroni, F.: Statistics and the Evaluation of Evidence for Forensic Scientists, 2nd edn. Wiley, Chichester (2005)

    Google Scholar 

  8. Franke, K.: The Influence of Physical and Biomechanical Processes on the Ink Trace - Methodological foundations for the forensic analysis of signatures. PhD thesis, Art. Intell. Institute, Uni. Groningen, The Netherlands (2005)

    Google Scholar 

  9. Srihari, S., Cha, S., Arora, H., Lee, S.: Individuality of handwriting. J. Forensic Sciences 47(4), 1–17 (2002)

    Google Scholar 

  10. Bulacu, M., Schomaker, L.: Text-independent writer identification and verification using textural and allographic features. IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI) 29(4), 701–717 (2007)

    Article  Google Scholar 

  11. Franke, K., Schomaker, L.: Robotic writing trace synthesis and its application in the study of signature line quality. J. Forensic Doc. Examination 16(3) (2004)

    Google Scholar 

  12. Heizmann, M., León, F.: Model-based analysis of striation patterns in forensic science. In: Bramble, S., Carapezza, E., Rudin, L. (eds.) Enabling Technologies for Law Enforcement and Security, Proceedings of SPIE, vol. 4232, pp. 533–544 (2001)

    Google Scholar 

  13. Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  14. Veenman, C., Worring, M.: Forensic intelligence. Informatie, 60–65 (April 2007)

    Google Scholar 

  15. Franke, K., Guyon, I., Schomaker, L., Vuurpijl, L.: WandaML - A markup language for digital document annotation. In: Proc. 9th International Workshop on Frontiers in Handwriting Recognition (IWFHR), Tokyo, Japan (2004)

    Google Scholar 

  16. Schönherr, K.: Konzeption und Prototyp eines Ausgabe- und Reportgenerators für XML-Daten aus dem Handschriftenerkennungssystem WANDA. Master’s thesis, Berlin College of Technology and Business Studies, Berlin, Germany (2004)

    Google Scholar 

  17. Verheij, B.: Virtual Arguments. On the Design of Argument Assistants for Lawyers and Other Arguers. T.M.C. Asser Press, The Hague, The Netherlands (2005)

    Google Scholar 

  18. Su, H.: Shoeprint image retrieval based on local image features. In: Int. Symposium on Information Assurance and Security/ Int. Workshop on Computational Forensics (IWCF), Manchester, UK. IEEE-CS Press, Los Alamitos (2007)

    Google Scholar 

  19. Bache, R., Crestani, F., Canter, D., Youngs, D.: Application of language models to suspect prioritisation and suspect likelihood in serial crimes. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)

    Google Scholar 

  20. Veenman, C.: Statistical disk cluster classification for file carving. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)

    Google Scholar 

  21. Karresand, M.: Completing the picture, fragments and back again (licentiate thesis) (May 2008)

    Google Scholar 

  22. Khanna, N., Mikkilineni, A., Chiu, G., Allebach, J., Delp, E.: Survey of scanner and printer forensics at purdue university. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 22–34. Springer, Heidelberg (2008)

    Google Scholar 

  23. Srihari, S., Srinivasan, H., Fang, G.: Discriminability of the fingerprints of twins. Journal of Forensic Identification 58(1), 109–127 (2008)

    Google Scholar 

  24. Weiand, K., Bouten, J., Veenman, C.: Similarity visualisation for the grouping of forensic speech recordings. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 169–180. Springer, Heidelberg (2008)

    Google Scholar 

  25. Ballerini, L., Cordon, O., Damas, S., Santamaria, J., Aleman, I., Botella, M.: Craniofacial superimposition in forensic identification using genetic algorithms. In: Int. Symposium on Information Assurance and Security/ IWCF. IEEE-CS Press, Los Alamitos (2007)

    Google Scholar 

  26. Ehlert, A., Bartz, D.: 3d processing and visualization of scanned forensic data. In: Srihari, S., Franke, K. (eds.) 2nd International Workshop on Computational Forensics (IWCF). LNCS, p. 70. Springer, Heidelberg (2008)

    Google Scholar 

  27. Hughes, D., Rayson, P., Walkerdine, J., Lee, K., Greenwood, P., Rashid, A., May-Chahal, C., Brennan, M.: Supporting law enforcement in digital communities through natural language analysis. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 122–134. Springer, Heidelberg (2008)

    Google Scholar 

  28. Booker, L.: Finding identity group “fingerprints” in documents. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 113–121. Springer, Heidelberg (2008)

    Google Scholar 

  29. van Beusekom, J., Shafait, F., Breuel, T.: Document signatures using intrinsic features for counterfeit detection. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 47–57. Springer, Heidelberg (2008)

    Google Scholar 

  30. Ramos, D., Gonzalez-Rodriguez, J., Zadora, G., Zieba-Palus, J., Aitken, C.: Information-theoretical comparison of likelihood-ratio methods of forensic evidence evaluation. In: Int. Symposium on Information Assurance and Security/ IWCF, Manchester, UK. IEEE-CS Press, Los Alamitos (2007)

    Google Scholar 

  31. Yanushkevich, S., Boulanov, O., Stoica, A., Shmerko, V.: Support of interviewing techniques in physical access control systems. In: Srihari, S.N., Franke, K. (eds.) IWCF 2008. LNCS, vol. 5158, pp. 147–158. Springer, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sargur N. Srihari Katrin Franke

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Franke, K., Srihari, S.N. (2008). Computational Forensics: An Overview. In: Srihari, S.N., Franke, K. (eds) Computational Forensics. IWCF 2008. Lecture Notes in Computer Science, vol 5158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85303-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85303-9_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85302-2

  • Online ISBN: 978-3-540-85303-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics