Shopping Cart | Login | Register | Language: English
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Buy Hardcover + Free E-Access
Qty:
$236.00
List Price: $295.00
You Save: $59.00
20% Online Bookstore Discount*
Free Lifetime E-Access*
I will be using e-access as an:
In Stock. Have the hardcover format as soon as Nov. 28 with express shipping*. Free instant online e-access upon order completion.

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

Release Date: November, 2009. Copyright © 2010. 620 pages.
ISBN13: 9781605668369|ISBN10: 1605668362|EISBN13: 9781605668376|
DOI: 10.4018/978-1-60566-836-9
Cite Book

MLA

Li, Chang-Tsun. "Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions." IGI Global, 2010. 1-620. Web. 25 Nov. 2014. doi:10.4018/978-1-60566-836-9

APA

Li, C. (2010). Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (pp. 1-620). Hershey, PA: IGI Global. doi:10.4018/978-1-60566-836-9

Chicago

Li, Chang-Tsun. "Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions." 1-620 (2010), accessed November 25, 2014. doi:10.4018/978-1-60566-836-9

Export Reference

Mendeley
Favorite
Access on Platform
Browse by Subject
Top

Description

Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation.

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.

Top

Table of Contents and List of Contributors

Search this Book: Reset
Table of Contents
Foreword
Anthony T.S. Ho
Preface
Chang-Tsun Li
Chapter 1
Patrizio Campisi, Emanuele Maiorana, Alessandro Neri
The wide diffusion of biometric based authentication systems, which has been witnessed in the last few years, has raised the need to protect both... Sample PDF
Privacy Enhancing Technologies in Biometrics
$30.00
List Price: $37.50
Chapter 2
Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu
In this chapter, the authors describe the software module developed in the context of a joint research work between the Department of Electrical and... Sample PDF
A Fingerprint Forensic Tool for Criminal Investigations
$30.00
List Price: $37.50
Chapter 3
Tim Rawlinson, Abhir Bhalerao, Li Wang
This chapter focuses on the principles behind methods currently used for face recognition, which have a wide variety of uses from biometrics... Sample PDF
Principles and Methods for Face Recognition and Face Modelling
$30.00
List Price: $37.50
Chapter 4
Pawel T. Puslecki
The aim of this chapter is the overall and comprehensive description of the machine face processing issue and presentation of its usefulness in... Sample PDF
Biometrical Processing of Faces in Security and Forensics
$30.00
List Price: $37.50
Chapter 5
Matthew Sorell
Whether investigating individual photographs or a large repository of images, it is often critical to establish some history of the generation... Sample PDF
Digital Camera Photographic Provenance
$30.00
List Price: $37.50
Chapter 6
Roberto Caldell, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu
Multimedia forensics can be defined as the science that tries, by only analysing a particular digital asset, to give an assessment on such a content... Sample PDF
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication
$30.00
List Price: $37.50
Chapter 7
Stefan Katzenbeisser, Huajian Liu, Martin Steinebach
Multimedia document authentication allows the judging of the authenticity and integrity of digital documents. Today a variety of such tools exist... Sample PDF
Challenges and Solutions in Multimedia Document Authentication
$30.00
List Price: $37.50
Chapter 8
Xi Zhao, Anthony T.S. Ho
With the tremendous growth and use of digital cameras and video devices, the need to verify the collected digital content for law enforcement... Sample PDF
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications
$30.00
List Price: $37.50
Chapter 9
Hong Cai, Sos S. Agaian
DCT and wavelet based techniques have been widely used in image processing, for example, the applications involving JPEG, MPEG and JPEG2000. To... Sample PDF
A Novel Multilevel DCT Based Reversible Data Hiding
$30.00
List Price: $37.50
Chapter 10
Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert
Digital forensics comprises the set of techniques to recover, preserve, and examine digital evidence, and has applications in a number of important... Sample PDF
Massively Threaded Digital Forensics Tools
$30.00
List Price: $37.50
Chapter 11
Lynn M. Batten, Lei Pan
An expert’s integrity is vital for the success of a legal case in a court of law; and witness experts are very likely to be challenged by many... Sample PDF
Testing Digital Forensic Software Tools Used in Expert Testimony
$30.00
List Price: $37.50
Chapter 12
Michael I. Cohen
Network Forensics is a powerful sub-discipline of digital forensics. This chapter examines innovations in forensic network acquisition, and in... Sample PDF
Network Forensics: A Practical Introduction
$30.00
List Price: $37.50
Chapter 13
Bo Zhou, Qi Shi, Madjid Merabti
An Intrusion Detection System (IDS) is a tool used to protect computer resources against malicious activities. Existing IDSs have several weaknesses... Sample PDF
A Novel Intrusion Detection System for Smart Space
$30.00
List Price: $37.50
Chapter 14
Xiaoling Chen, Rohan D.W. Perera, Ziqian (Cecilia) Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi
This chapter provides an overview of techniques and tools to detect deception on the Internet. A classification of state-of-the-art hypothesis... Sample PDF
Deception Detection on the Internet
$30.00
List Price: $37.50
Chapter 15
Ricci S.C. Ieong, Pierre K.Y. Lai, K. P. Chow, Michael Y.K. Kwan, Frank Y.W. Law
The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application... Sample PDF
Forensic Investigation of Peer-to-Peer Networks
$30.00
List Price: $37.50
Chapter 16
Thomas M. Chen
Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be... Sample PDF
Identity Theft through the Web
$30.00
List Price: $37.50
Chapter 17
Antonio Savoldi, Paolo Gubian
This chapter is aimed at introducing SIM and USIM card forensics, which pertains to the Small Scale Digital Device Forensics (SSDDF) (Harril, &... Sample PDF
Embedded Forensics: An Ongoing Research about SIM/USIM Cards
$30.00
List Price: $37.50
Chapter 18
Cosimo Anglano
In the recent past machine and application virtualization technologies have received a great attention from the IT community, and are being... Sample PDF
Forensic Implications of Virtualization Technologies
$30.00
List Price: $37.50
Chapter 19
Gian Piero Zarri
In this paper, we evoke first the ubiquity and the importance of the so-called ‘non-fictional narrative’ information, with a particular emphasis on... Sample PDF
Conceptual Tools for Dealing with ‘Narrative' Terrorism Information
$30.00
List Price: $37.50
Chapter 20
Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos
Nowadays, in a wide variety of situations, source code authorship identification has become an issue of major concern. Such situations include... Sample PDF
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process
$30.00
List Price: $37.50
Chapter 21
Adel Elmaghraby, Deborah Keeling, Michael Losavio
We examine legal issues that must be considered in the use of computational systems in forensic investigations. There is a general framework for the... Sample PDF
Legal Issues for Research and Practice in Computational Forensics
$30.00
List Price: $37.50
Chapter 22
Christopher A. Canning, Baoying Wang
This chapter reviews regulations and laws that are currently affecting information assurance and security policy in both the public and private... Sample PDF
Trends in Information Security Regulation
$30.00
List Price: $37.50
Top

Reviews and Testimonials

This handbook is intended for students, researchers, law enforcement personnel, and IT and multimedia practitioners involved in the use, design, and development of digital devices and techniques for forensics and crime prevention. In addition to devices, the book also considers legal issues and information security.

– Sci Tech Book News, BookNews.com

This book embraces a broad range of digital crime and forensics disciplines that use electronic devices and software for crime prevention and investigation, and addresses legal issues and trends in information security regulations.

– Chang-Tsun Li, University of Warwick, UK
Top

Topics Covered

  • Biometrical processing of faces
  • Device identification
  • Digital camera photographic provenance
  • Digital image authentication
  • Face modeling
  • Face recognition
  • Fingerprint forensic tool for criminal investigation
  • Multimedia document authentication
  • Multimedia forensic techniques
  • Technologies in biometrics
Top

Preface

The last two decades have seen the unprecedented development of information and communication technology (ICT), computational hardware and multimedia techniques. These techniques have revolutionized the ways we exchange information and run business. This wave of ICT revolution has undoubtedly brought about enormous opportunities for the world economy and exciting possibilities for every sector of the modern societies. Traders can now operate their e-business without distance constraint. Educators are now equipped with ‘e-tools’ to deliver their knowledge and expertise to the remote corners of the world with internet access. Harnessing these ICT resources, ‘e-governments’ can provide various aspects of ‘e-services’ to the people. Willingly or reluctantly, directly or indirectly, we are all now immersed in some ways in the cyberspace, full of ‘e-opportunities’ and ‘e-possibilities’, and permeated with data and information. However, this type of close and strong interweaving poses concerns and threats either. When exploited with malign intentions, the same tools provide means for doing harms at colossal scale. These concerns create anxiety and uncertainty about the reality of the information and business we deal with. Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. As a result, the last decade has also seen the emergence of the new interdisciplinary field of digital forensics and investigation, which aims at pooling expertise in various areas to combat the abuses of the ICT facilities and computer techniques.

The primary objective of this book is to provide a media for advancing research and the development of theory and practice of digital crime prevention and forensics. This book embraces a broad range of digital crime and forensics disciplines that use electronic devices and software for crime prevention and investigation, and addresses legal issues and trends in information security regulations. It encompasses a wide variety of aspects of the related subject areas covered in twenty two chapters and provides a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT/multimedia practitioners, who are interested or involved in the study, research, use, design and development of techniques related to digital forensics and investigation.

The first four chapters aim at dissimilating the idea of biometrics and its applications. In Chapter I the privacy requirements, the major threats to privacy, and the best practices to employ in order to deploy privacy sympathetic systems, are discussed within the biometric framework. Presented in Chapter II is the joint research work between the University of Cagliari and Raggruppamento Carabinieri Investigazioni Scientifiche (Scientific Investigation Office) of the Arma dei Carabinieri, Italy, which studies the state of the art methods and algorithms for automatic analysis of latent fingerprint images and for fake fingerprints identification. Chapter III focuses on the principles behind methods currently used for face recognition, which have a wide variety of uses from biometrics, surveillance and forensics. Chapter IV overviews the methods of face processing, including face detection, face recognition and processing of facial features, and the main strategies as well as the methods applied in the related fields. Conclusions concerning human processing of faces that have been drawn by the psychology researchers and neuroscientists are also described.

Chapter V and VI are concerned with the imaging device identification and content integrity verification. Chapter V considers published research and identifies research gaps which address the general challenges of digital image provenance with an explicit emphasis on evidence related to the camera or other digital source. Chapter VI discuss the idea of using distinctive imprints left on the media during the image acquisition process and any post-processing operations, as a sort of digital fingerprint for identifying imaging devices and authentication.

Chapter VII to IX deal with methods that harness the techniques of data hiding and cryptography for the applications of document forensics. Chapter VII gives an overview of three complementary technologies for judging the authenticity and integrity of digital documents, namely forensic methods, perceptual hashes and digital watermarks. It also surveys the state-of-the-art methods of the three technologies and provides an analysis of their strength and weaknesses. Chapter VIII focuses on image authentication through the exploitation of two novel transforms for semi-fragile watermarking, using the Slant transform (SLT) as a block-based algorithm and the wavelet-based contourlet transform (WBCT) as a non-block based algorithm. Chapter IX discuss a powerful reversible data hiding algorithm in JPEG images based on a new multilevel DCT. This lossless data hiding algorithm features a key-dependent (multilevel structure) coefficient-extension technique and an embedding location selector, and it can achieve high quality reconstructed images with disparate content types.

Chapter X and XI focus on the use of forensic tools. Chapter X argues that digital forensics tools must exhaustively examine and interpret data at a low level, because data of evidentiary value may have been deleted, partially overwritten, obfuscated, or corrupted. This chapter considers recent hardware trends and argue that multicore CPUs and Graphics Processing Units (GPUs) offer one solution to the problem of maximizing available compute resources. Chapter XI proposes an experimental framework that helps digital forensic experts to compare sets of digital forensic tools of similar functionality based on specific outcomes. The results can be used by an expert witness to justify the choice of tools and experimental settings, calculate the testing cost in advance, and be assured of obtaining results of good quality. Two case studies are provided to demonstrate the use of our framework.

Chapter XII to XVI are concerned with network security and forensics. Chapter XII examines innovations in forensic network acquisition, and in particular in attribution of network sources behind network address translated gateways. A novel algorithm for automatically attributing traffic to different sources is presented and then demonstrated. Finally it discusses some innovations in decoding of forensic network captures and illustrates how web mail can be extracted and rendered and in particular give the example of Gmail as a modern AJAX based webmail provider of forensic significance. Chapter XIII proposes a Service-oriented and User-centric Intrusion Detection System (SUIDS) for ubiquitous networks. SUIDS keeps the special requirements of ubiquitous computing in mind throughout its design and implementation. It sets a new direction for future research and development. Chapter XIV provides an overview of techniques and tools to detect deception on the Internet. A classification of state-of-the-art hypothesis testing and data mining based deception detection methods are presented. A psycho-linguistics based statistical model for deception detection is also described in detail. Passive and active methods for detecting deception at the application and network layer are discussed. Analysis of the pros and cons of the existing methods is presented. Finally, the inter-play between psychology, linguistics, statistical modelling, network layer information and Internet forensics is discussed along with open research challenges. Chapter XV reviews the characteristics of current P2P networks. By observing the behaviors of these networks, the authors propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe that their findings provide a foundation for future development in P2P file-sharing networks investigation. Chapter XVI describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the web.

Chapter XVII is aimed at introducing SIM and USIM card forensics, which pertains to Small Scale Digital Device Forensics (SSDDF) field. The authors give a general overview on the extraction of the standard part of the file system and present an effective methodology to acquire all the observable memory content. They also discuss some potential cases of data hiding at the file system level, presenting at the same time a detailed and useful procedure used by forensics practitioners to deal with such a problem.

In the light of an increasing number of illegal or inappropriate activities carried out by means of virtual machines, or targeting virtual machines, rather than physical ones, Chapter XVIII discusses the implications on the forensic computing field of the issues, challenges, and opportunities presented by virtualization technologies, with a particular emphasis on the possible solutions to the problems arising during the forensic analysis of a virtualized system.

Chapter XIX evokes first the ubiquity and the importance of the so-called ‘non-fictional narrative’ information, with a particular emphasis on the terrorism- and crime-related data, and show that the usual knowledge representation and ‘ontological’ techniques have difficulties in finding complete solutions for representing and using this type of information. The author then supplies some details about NKRL, a representation and inferencing environment especially created for an ‘intelligent’ exploitation of narrative information. This description is integrated with concrete examples to illustrate the use of this conceptual tool in a terrorism context.

Chapter XX is concerned with issues surrounding source code authorship, including authorship disputes, proof of authorship in court, cyber attacks in the form of viruses, trojan horses, logic bombs, fraud, and credit card cloning, and presents a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-grams in order to represent a source code author’s style. A comparison with a previous source code authorship identification study based on more complicated information shows that the SCAP approach is language independent and that n-gram author profiles are better able to capture the idiosyncrasies of the source code authors. It is also demonstrated that the effectiveness of the proposed model is not affected by the absence of comments in the source code, a condition usually met in cyber-crime cases.

Chapter XXI examines legal issues that must be considered in the use of computational systems in forensic investigations. There is a general framework for the use of evidence relating to legal proceedings, including computational forensic (CF) results that all nations employ. But the authors note some differences in procedures in different countries. And given the expert nature of computational systems and forensics using computation, special issues of reliability relating to science-based forensic conclusions must be addressed. The authors examine those generally (applicable to all CF) and as specifically applied to certain CF methods, examining two case studies on the possible use of CF methods in legal forums.

Chapter XXII reviews regulations and laws that are currently affecting information assurance and security policy in both the public and private sectors. Regulations and laws in different areas and at different levels are considered. Important industry sector regulations are also included when they have a significant impact on information security, such as the Health Insurance Portability and Accountability Act (HIPAA). Analysis of these regulations including evaluation of their effectiveness, enforceability, and acceptance is presented. Since the regulations in this field are in a state of continuous fluctuation, this chapter also attempts to make proposals for statutory improvements that would make security policy development more comprehensive and consistent, resulting in more secure systems throughout the world. It is also predicted that there will be a need for international information security regulations given the nature of the worldwide internet and cross-border information systems. Such developments will improve digital crime investigations worldwide.

Top

Author(s)/Editor(s) Biography

Chang-Tsun Li received the B.E. degree in electrical engineering from Chung-Cheng Institute of Technology (CCIT), National Defense University, Taiwan, in 1987, the MSc degree in computer science from U. S. Naval Postgraduate School, USA, in 1992, and the Ph.D. degree in computer science from the University of Warwick, UK, in 1998. He was an associate professor of the Department of Electrical Engineering at CCIT during 1998-2002 and a visiting professor of the Department of Computer Science at U.S. Naval Postgraduate School in the second half of 2001. He is currently Professor of the Department of Computer Science at the University of Warwick, UK, a Fellow of British Computer Society, the Editor-in-Chief of the International Journal of Digital Crime and Forensics, an editor of the International Journal of Imaging (IJI) and an associate editor of the International Journal of Applied Systemic Studies (IJASS) and the International Journal of Computer Sciences and Engineering Systems (IJCSE). He has involved in the organisation of a number of international conferences and workshops and also served as member of the international program committees for several international conferences. He is also the coordinator of the international joint project entitled Digital Image and Video Forensics funded through the Marie Curie Industry-Academia Partnerships and Pathways (IAPP) under the EU’s Seventh Framework Programme from June 2010 to May 2014. His research interests include digital forensics, multimedia security, bioinformatics, computer vision, image processing, pattern recognition, evolutionary computation, machine learning and content-based image retrieval.
Top

Indices