Breakthroughs in Digital Biometrics and Forensics

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

​This book focuses on a wide range of breakthroughs related to digital biometrics and forensics.  The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their biometrics and forensics knowledge. Furthermore, the book provides a glimpse of future directions where biometrics and forensics techniques, policies, applications, and theories are headed. Topics include multimodal biometrics, soft biometrics, mobile biometrics, vehicle biometrics, vehicle forensics, integrity verification of digital content, people identification, biometric-based cybercrime investigation, among others. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse digital biometrics and forensics experts in the listed fields and edited by prominent biometrics and forensics researchers and specialists.

Author(s): Kevin Daimi, Guillermo Francia III, Luis Hernández Encinas
Publisher: Springer
Year: 2022

Language: English
Pages: 418
City: Cham

Preface
Acknowledgments
Contents
About the Editors
Part I Multimodal Biometrics
Biometric Cryptography
1 Introduction
2 Iris Biometrics
2.1 Biometric Authentication
2.2 Iris Acquisition
2.3 Iris Pre-processing
2.4 Iris Feature Extraction
2.5 Error-Correcting Codes
3 Biometric Cryptography
3.1 Biometric Key Binding
3.1.1 Fuzzy Commitment
3.1.2 Fuzzy Vault
3.2 Biometric Key Generation
3.2.1 Secure Sketch and Fuzzy Extractor
3.2.2 Private Template Scheme
3.2.3 Quantization Scheme
3.3 Performance Evaluation
4 Experimental Results
4.1 Experimental System
4.2 Pre-processing and Feature Extraction
4.3 Public and Private Key Generation
4.3.1 Method 1: Quantization Scheme
4.3.2 Method 2: Fuzzy Extractors
4.3.3 Method 3: Private Scheme template
4.4 Dataset
4.5 Test Functions
4.5.1 Test 1: Quantization Scheme
4.5.2 Test 2: Fuzzy Extractor
4.5.3 Test 3: Private Template Scheme
4.6 Results
5 Conclusion
References
Multimodal Biometrics: For Authorisation and Authentication
1 Introduction
2 Shortcomings of Unimodal Biometrics
3 Biometric Solutions for Multimodal Security Solutions
4 Fingerprint Sensing
4.1 Fingerprint Sensors Technologies (How They Work)
4.2 How It Works
4.3 How Does Facial Recognition Work?
5 Performance of Biometrics
6 Multimodal Biometric Systems
7 Multimodal Biometric Systems Integration Scenarios
8 Multiple Classifier Systems (mcs) Pattern Recognition
9 Classification Fusion in Multimodal Biometric Systems
10 Multimodal Biometrics Fusion Levels
10.1 Pre-classification
10.2 Post-classification
11 Multimodal Biometrics: A Secure Process
11.1 The Case of a Multimodal Abis (Automated Biometric Identification System)
11.2 Use Case: How Multimodal Biometrics Aids in Digital Identity and Security (the Lebanese Passport)
References
Data Fusion in Multimodal Biometry
1 Introduction
2 Data Fusion in Multimodal Biometric Systems Design
2.1 Multimodal Biometric Systems: Design Issues
2.1.1 Types of Multimodal Biometric Systems: Architectures and Data Fusion Scenarios
2.1.2 Operation Modes for Multimodal Biometric Systems
2.2 Typical Methods for Data Fusion in Multimodal Systems Design
2.2.1 Pre-Classification (Pre-Mapping) Biometric Data Fusion
2.2.2 Middle-Mapping Biometric Data Fusion
2.2.3 Post-Classification (Post-Mapping) Biometric Data Fusion
2.2.4 Hybrid Biometric Data Fusion Methods. Case Studies for the Feature-Level Fusion
3 Conclusions
References
A Glass Case of Emotion: Identity, Motion Sensors, and Your Smartphone
1 Introduction
2 Identification and Authentication
2.1 User Identification
2.2 Authentication
2.3 Continuous Authentication
3 Behavioural Biometrics
4 Keystroke Dynamics
5 Identification Ethics
6 Accelerometers and Gyroscopes
6.1 Accelerometers
6.2 Gyroscopes
6.3 Combining Accelerometers and Gyroscopes
7 Identification and Authentication Utilising Keystroke Dynamic Inference
8 Summary
References
Part II Forensics Analysis and Cybercrime Investigation
Digital Forensics Analysis in NVMe SSDs inside USB EnclosureAdapters
1 Introduction
2 Terminology
3 Related Work
4 Experimental Study
4.1 Experimental Setup
4.2 Specifics of SSDs
4.3 Methodology
4.3.1 Experiment Initiation
4.3.2 Case Scenario: TRIM ON from Windows 10 Operating System with the USB WriteBlocker
4.3.3 Case Scenario: TRIM OFF from Windows 10 Operating System with the USB WriteBlocker
5 Experimental Results Analysis
5.1 Samsung and Seagate TRIM ON Analysis
5.2 Samsung and Seagate TRIM OFF Analysis
5.3 Hash Value Analysis
6 Conclusion and Future Work
References
The Digital Forensic Approach to eDiscovery
1 Introduction
2 Importance of eDiscovery
3 eDiscovery and Digital Forensic
4 eDiscovery Versus Digital Forensics
5 Application of eDiscovery
5.1 Application of eDiscovery in the Healthcare Sector
5.2 Application of eDiscovery in a Corporation
5.3 Application of eDiscovery in Financial Services
5.4 Application of eDiscovery in Educational Institution
5.5 Artificial Intelligence (AI) and eDiscovery
5.6 How Has eDiscovery Helped in Digital Forensic Crime Investigation?
5.7 eDiscovery Tools for Digital Forensic
5.7.1 Logikcull: eDiscovery Tool
6 Conclusion
References
Handwriting Analysis: Applications in Person Identificationand Forensic
1 Introduction
2 Overview of a General Person Identification Framework
3 Related Works
3.1 Offline Methods
3.1.1 Traditional Methods
3.1.2 Deep Learning Methods
3.2 Online Methods
3.2.1 Traditional Methods
3.2.2 Deep Learning Methods
4 Metrics and Datasets
5 Discussions and Remarks
6 Conclusion
References
Developing a Scalpel and Foremost Graphical User Interface
1 Introduction
1.1 Motivation for Research
1.2 Research Objectives
2 Background
2.1 Why Use Linux for Computer Forensics
2.2 What Is Kali Linux
3 Related Work
4 Research Methodology
4.1 Design Strategy
4.2 Proof of Concept
4.3 Proof of Performance
5 Discussion and Analysis
5.1 Development and Design
5.1.1 Development Tools and Environment
5.1.2 Conceptual Test
5.1.3 GUI Design and Development
5.2 Data Recovery Results
5.2.1 File System Analysis
5.2.2 Clone Tool Analysis
5.2.3 CLI Analysis
5.3 Design Results
5.3.1 Usability and Functionality
5.3.2 Graphical Interface Versus Command Line
6 Conclusions
7 Limitations and Future Work
References
Windows Prefetch Forensics
1 Introduction
2 Related Work
3 Experimental Study and Analysis
3.1 Types of Prefetching
3.2 Prefetch Storage Location
3.3 Prefetch Naming Scheme
3.4 Prefetch Hash Algorithm Generation Steps
3.5 Configuration
3.6 Forensics Importance of Prefetch Files
3.7 Contents of Prefetch Files
3.8 Signature of Prefetch Files
3.9 Prefetch File Header
3.10 Operating System Version Based on Prefetch Files
3.11 File Information Details from Prefetch File
3.12 Forensics Information in Sections C, D, and F of Prefetch Files
3.12.1 Section C
3.12.2 Section D and Section F
3.13 Tools for Comparative Forensics Prefetch Analysis
4 Conclusion and Future Work
References
Part III Biometrics and Artificial Intelligence
Biometrics and Artificial Intelligence: Attacks and Challenges
1 Introduction
2 Artificial Intelligence
2.1 Machine and Deep Learning
2.2 AI Models
2.3 Explainable Artificial Intelligence
2.4 Applications
3 Biometrics
4 AI and Biometrics
4.1 Model Configuration
4.2 Protocol Description
5 Attacks
5.1 Artificial Intelligence Attacks
5.2 Generative Adversarial Networks
5.3 Biometric Attacks
5.4 Protocol Attacks
6 Challenges
7 Conclusions
References
Effectiveness of Periocular Biometric Recognition Under Face Mask Restrictions
1 Introduction
2 Concepts
3 Related Work
4 Approach and Design
5 Implementation
6 Results
7 Conclusion
References
Ontology-Driven Artificial Intelligence in IoT Forensics
1 Introduction
2 The Emerging Domain of IoT Forensics
2.1 Current IoT Landscape
2.2 Challenges Specific to IoT Forensics
3 The Need for AI and Semantics in IoT Forensics
3.1 Machine Learning-Based Forensic Approaches
3.2 Semantics-Based Forensic Approaches
4 Conclusion
References
Deep Learning for Palmprint Detection and Alignment on Biometric Systems
1 Introduction
2 Proposed Approach
2.1 Object Detection
2.2 Image Alignment
2.3 Data Labelling
2.4 Model Training
3 Evaluation
3.1 Datasets
3.2 Criteria
3.3 Results
4 Conclusions
References
A Multifaceted Role of Biometrics in Online Security, Privacy, and Trustworthy Decision Making
1 Introduction
2 Literature Review on Biometric Security and Privacy
2.1 Unimodal and Multimodal Biometric Systems
2.2 Biometrics and Cybersecurity
2.3 Biometrics and Privacy
3 Deep Learning in Biometrics, Cybersecurity, and Privacy
3.1 Deep Learning Methods Overview
3.2 General Architecture of Biometrics System Based on Deep Learning
3.3 Deep Learning in Biometric De-identification and Privacy
4 Biometric Online Security and Cybersecurity
4.1 Role of Handwritten Authorship Recognition in Biometric Online Security
4.2 Role of Psychological and Emotional Characteristics in Biometric Online Security
4.3 Role of Human Aesthetics in Biometric Online Security
4.4 Role of Remote Authentication in Biometric Security
4.5 Role of Trustworthiness of Decision Making in Biometric Online Security
5 Applications and Open Problems
5.1 User Authentication and Access Control
5.2 Robotics
5.3 Medicine and Mental Health
5.4 Games and Virtual Worlds
5.5 Open Problems and Future Research
6 Conclusion
References
Part IV Ethical, Societal and Educational Implications of Biometrics and Forensics
An Escape Game to Find the Owner of a Latent Fingerprint While Learning Biometry
1 Introduction
2 Background
3 Related Work
4 Cryptographic Contents to Play the Game
4.1 Introduction to Cryptography
4.2 Fingerprint Identification
5 Game Design for a Biometry Session
6 The Use of Other Biometric and Forensic Challenges
7 Experimental Results
8 Conclusions and Future Work
References
Flawed Biometric Rollouts in Emerging Economies: Evidence from Jamaica, Afghanistan, and Kenya
1 Introduction
2 Technodeterminism, Technocolonialism, and Biometrics
3 Case Studies of Biometric Contestation: Jamaica, Afghanistan, and Kenya
3.1 Jamaica and NIDS
3.2 Afghanistan and e-Tazkera
3.3 Kenya and Huduma Namba
4 Conclusion: Lean Governance and the Rise of Statizens
References
Reinforcing the Importance of Host Forensics for Customer Environments Hosted Using Amazon Web Services and Azure Public Cloud Platforms
1 Introduction
1.1 Security Monitoring
1.2 AWS Security Monitoring
1.3 Azure Security Monitoring
1.4 Third-Party Option
2 Academic Review
3 Capital One Case Study
3.1 Analysis
4 Back to the Fundamentals
4.1 Key Considerations
4.2 Live Forensics
4.3 Dead Forensics
4.3.1 Approach for AWS
4.3.2 Approach for Azure
5 Conclusion
References
Impact of Media Forensics and Deepfake in Society
1 Introduction
2 Creation of Fake Content
3 Model-Based Detection Techniques
3.1 A Sensor-Based and Model-Based Approach for a Single Class
3.2 Blind Techniques
3.3 Customized Features Using Supervised Methods
4 Approaches Based on Deep Learning
4.1 Training on One Class
4.2 Supervised CNNs Looking for Particular Clues
4.3 General Supervised CNNs
4.4 Discussion
5 Detection of Deepfakes
5.1 Face Modification on Video
5.2 GAN-Generated Images
6 Datasets
6.1 Printed and Scanned Dataset
6.2 Videos
6.3 Original Content
6.4 Video Conferencing
7 Counter-Forensics
7.1 Model for Counter-Forensics
8 Fusion
9 Conclusion
10 Open Issues
References
Index