The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.
Author(s): Chang-Tsun Li
Edition: 1
Year: 2009
Language: English
Pages: 595
Title
......Page 2
Editorial Advisory Board......Page 4
List of Contributors......Page 5
Table of Contents......Page 7
Detailed Table of Contents......Page 11
Foreword......Page 20
Preface......Page 21
Privacy Enhancing Technologies in Biometrics......Page 26
A Fingerprint Forensic Tool for Criminal Investigations......Page 48
Principles and Methods for Face Recognition and Face Modelling......Page 78
Biometrical Processing of Faces in Security and Forensics......Page 104
Digital Camera Photographic Provenance......Page 129
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication......Page 155
Challenges and Solutions in Multimedia Document Authentication......Page 180
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications......Page 201
A Novel Multilevel DCT Based Reversible Data Hiding......Page 229
Massively Threaded Digital Forensics Tools......Page 259
Testing Digital Forensic Software Tools Used in Expert Testimony......Page 282
Network Forensics: A Practical Introduction......Page 304
A Novel Intrusion Detection System for Smart Space......Page 332
Deception Detection on the Internet......Page 359
Forensic Investigation of Peer-to-Peer Networks......Page 380
Identity Theft through the Web......Page 404
Embedded Forensics: An Ongoing Research about SIM/USIM Cards......Page 421
Forensic Implications of Virtualization Technologies......Page 449
Conceptual Tools for Dealing with ‘Narrative’ Terrorism Information......Page 472
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process......Page 495
Legal Issues for Research and Practice in Computational Forensics......Page 521
Trends in Information Security Regulation......Page 541
Compilation of References......Page 554
About the Contributors......Page 593
Index......Page 604