— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
In this contribution, the Bayesian framework for interpretation of evidence when applied to forensic speaker recognition is introduced. Different aspects of the use of voice as ev...
Joaquin Gonzalez-Rodriguez, Andrzej Drygajlo, Dani...