Sciweavers

195 search results - page 4 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
TKDE
2010
159views more  TKDE 2010»
14 years 8 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
ICDAR
2009
IEEE
15 years 4 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke
ICMCS
2007
IEEE
100views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 4 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
CSL
2006
Springer
14 years 9 months ago
Robust estimation, interpretation and assessment of likelihood ratios in forensic speaker recognition
In this contribution, the Bayesian framework for interpretation of evidence when applied to forensic speaker recognition is introduced. Different aspects of the use of voice as ev...
Joaquin Gonzalez-Rodriguez, Andrzej Drygajlo, Dani...