Abstract
We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
West Midland Toxicology Laboratory: Chain of Custody (June 21, 2003), http://www.toxlab.co.uk/coc.htm (accessed, March 2008)
National Geographic: History of Photography, http://photography.nationalgeographic.com/photography/photographers/photography-timeline.html (accessed, September 2008)
Pelly, M., Norrie, J.: Speedcam slip puts $100m fines in doubt. Sydney Morning Herald (March 26, 2006), http://www.smh.com.au/news/national/speedcam-slip-may-cost-100m/2006/03/23/1142703456320.html (accessed, March 2008)
Bergstein, B.: Digital Photos Pose Issues in Court. CRN -Channel Web (February 8, 2004), http://www.crn.com/digital-home/18831429 (accessed, March 2008)
Foray Technology: Foray Technology - Clients (2008), http://www.foray.com/company/clients.php (accessed, September 2008)
Blythe, P., Fridrich, J.: Secure Digital Camera. Digital Forensic Research Workshop (2004)
ITU: CCITT T.81 information technology – Digital compression and coding of continuous-tone still images – Requirements and guidelines. International Telecommunications Union (1993)
JEITA: JEITA CP-3451 Exchangeable image file format for digital still cameras: Exif Version 2.2. Japan Electronics and Information Technology Industries Association (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Neville, T., Sorell, M. (2009). Audit Log for Forensic Photography. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)