Skip to main content

Audit Log for Forensic Photography

  • Conference paper
Forensics in Telecommunications, Information and Multimedia (e-Forensics 2009)

Abstract

We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. West Midland Toxicology Laboratory: Chain of Custody (June 21, 2003), http://www.toxlab.co.uk/coc.htm (accessed, March 2008)

  2. National Geographic: History of Photography, http://photography.nationalgeographic.com/photography/photographers/photography-timeline.html (accessed, September 2008)

  3. Pelly, M., Norrie, J.: Speedcam slip puts $100m fines in doubt. Sydney Morning Herald (March 26, 2006), http://www.smh.com.au/news/national/speedcam-slip-may-cost-100m/2006/03/23/1142703456320.html (accessed, March 2008)

  4. Bergstein, B.: Digital Photos Pose Issues in Court. CRN -Channel Web (February 8, 2004), http://www.crn.com/digital-home/18831429 (accessed, March 2008)

  5. Foray Technology: Foray Technology - Clients (2008), http://www.foray.com/company/clients.php (accessed, September 2008)

  6. Blythe, P., Fridrich, J.: Secure Digital Camera. Digital Forensic Research Workshop (2004)

    Google Scholar 

  7. ITU: CCITT T.81 information technology – Digital compression and coding of continuous-tone still images – Requirements and guidelines. International Telecommunications Union (1993)

    Google Scholar 

  8. JEITA: JEITA CP-3451 Exchangeable image file format for digital still cameras: Exif Version 2.2. Japan Electronics and Information Technology Industries Association (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Neville, T., Sorell, M. (2009). Audit Log for Forensic Photography. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02312-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02311-8

  • Online ISBN: 978-3-642-02312-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics