Skip to main content
  • Conference proceedings
  • © 2009

Forensics in Telecommunications, Information and Multimedia

Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

Editors:

Conference proceedings info: e-Forensics 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network

    1. A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network

      • Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia
      Pages 1-9
    2. Forensics for Detecting P2P Network Originated MP3 Files on the User Device

      • Heikki Kokkinen, Janne Nöyränen
      Pages 10-18
    3. Image Encryption Using Chaotic Signal and Max–Heap Tree

      • Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri
      Pages 19-28
    4. Investigating Encrypted Material

      • Niall McGrath, Pavel Gladyshev, Tahar Kechadi, Joe Carthy
      Pages 29-35
    5. Legal and Technical Implications of Collecting Wireless Data as an Evidence Source

      • Benjamin Turnbull, Grant Osborne, Matthew Simon
      Pages 36-41
    6. Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt

      • M. L. Dennis Wong, Antionette W. -T. Goh, Hong Siang Chua
      Pages 42-53
    7. Robust Correctness Testing for Digital Forensic Tools

      • Lei Pan, Lynn M. Batten
      Pages 54-64
    8. Surveillance Applications of Biologically-Inspired Smart Cameras

      • Kosta Haltis, Lee Andersson, Matthew Sorell, Russell Brinkworth
      Pages 65-76
    9. FIA: An Open Forensic Integration Architecture for Composing Digital Evidence

      • Sriram Raghavan, Andrew Clark, George Mohay
      Pages 83-94
    10. Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

      • Roberto Caldelli, Irene Amerini, Francesco Picchioni
      Pages 95-101
    11. Developing Speaker Recognition System: From Prototype to Practical Application

      • Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff
      Pages 102-115
    12. A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC

      • Trupti Shiralkar, Michael Lavine, Benjamin Turnbull
      Pages 116-121
    13. A Provable Security Scheme of ID-Based Threshold Decryption

      • Wang Xue-Guang, Chai Zhen-Chuan
      Pages 122-129
    14. Analysis of Sensor Photo Response Non-Uniformity in RAW Images

      • Simon Knight, Simon Moschou, Matthew Sorell
      Pages 130-141
    15. Audit Log for Forensic Photography

      • Timothy Neville, Matthew Sorell
      Pages 142-152
    16. Cyber Forensics Ontology for Cyber Criminal Investigation

      • Heum Park, SunHo Cho, Hyuk-Chul Kwon
      Pages 160-165

Other Volumes

  1. Forensics in Telecommunications, Information and Multimedia

About this book

The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage – also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O’Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect’s home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.

Editors and Affiliations

  • School of Electrical and Electronic Engineering, University of Adelaide, Australia

    Matthew Sorell

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access