ebook img

Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers PDF

230 Pages·2009·14.03 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 8 EditorialBoard OzgurAkan MiddleEastTechnicalUniversity,Ankara,Turkey PaoloBellavista UniversityofBologna,Italy JiannongCao HongKongPolytechnicUniversity,HongKong FalkoDressler UniversityofErlangen,Germany DomenicoFerrari UniversitàCattolicaPiacenza,Italy MarioGerla UCLA,USA HisashiKobayashi PrincetonUniversity,USA SergioPalazzo UniversityofCatania,Italy SartajSahni UniversityofFlorida,USA Xuemin(Sherman)Shen UniversityofWaterloo,Canada MirceaStan UniversityofVirginia,USA JiaXiaohua CityUniversityofHongKong,HongKong AlbertZomaya UniversityofSydney,Australia GeoffreyCoulson LancasterUniversity,UK Matthew Sorell (Ed.) Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009 Adelaide,Australia, January 19-21, 2009 Revised Selected Papers 1 3 VolumeEditor MatthewSorell SchoolofElectricalandElectronicEngineering TheUniversityofAdelaide,SA5005,Australia E-mail:[email protected] LibraryofCongressControlNumber:Appliedfor CRSubjectClassification(1998):K.5,K.4,I.5,D.4.6,K.6.5 ISSN 1867-8211 ISBN-10 3-642-02311-8SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-02311-8SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2009 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SPIN:12682874 06/3180 543210 Preface The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the con- ference featured a significant number of plenary contributions from recognized na- tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These in- clude the impact of solid-state memory, ultra-portable devices, and distributed storage – also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O’Malley, Queen- sland Police Service, who outlined the paperless case file system now in use in Queen- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect’s home before the suspect! Joseph Razik, represent- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nation- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation. Glenn Dardick put the case for anti-forensics training; Nigel Carson of Ferrier Hodg- son presented the perspective of an experienced commercial investigator, and Anna Davey of Forensic Foundations provided a detailed understanding of the admissibility of digital evidence. That the focus of this year’s conference had shifted to the legal, rather than the deeply technical, perspective was clear, enhanced in no small part by the incorporation of the International Workshop on e-Forensics Law in the program. Hon Jon Mans- field of the Federal Court of Australia presided over the workshop, which featured both plenary and peer-reviewed papers. Joe Cannataci, one of the architects of the Cybercrime Convention, presented his views on the convention and the direction of international law concerning crime and evidence in the digital domain. Gary Edmond raised some critical questions concerning evidence obtained from and through emerg- ing technologies, and Michael Davis and Alice Sedsman raised some legal concerns around cloud computing. Glenn Dardick, presenting his workshop paper out of ses- sion, noted the effect of privacy and privilege on e-Discovery. The workshop aca- demic session featured papers on digital identity, surveillance and data protection in virtual environments, and international legal compliance. The 21 technical papers in this volume were presented in six technical sessions, in- cluding one poster session, covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance. VI Preface The Brian Playford Memorial Award for Best Paper was presented to Irene Amerini and co-authors for her paper, “Distinguishing Between Camera and Scanned Images by Means of Frequency Analyis,” after consultation with the Technical Pro- gram Committee Chair, Chang-Tsun Li, and members of the conference Steering Committee. Brian was one of the quiet behind-the-scenes organizers of the conference in 2008 and 2009 who was killed under tragic circumstances while on holiday in Oc- tober 2008 in Slovenia. The conference closed with a lively panel discussion, chaired by Andy Jones, address- ing strategic priorities in digital forensics research. From that discussion, it is clear that the increasing sophistication of technologies, and the users of those technologies, is leaving investigators, lawmakers and the legal system scrambling to keep up. Matthew Sorell Organization Steering Committee Chair Imrich Chlamtac (Chair) CREATE-NET, Italy Peter Ramsey University of Adelaide, Australia Jill Slay University of South Australia Richard Leary Forensic Pathways Ltd, UK Gale Spring RMIT University, Australia Conference General Chair Matthew Sorell University of Adelaide, Australia Local Chair Peter Ramsey University of Adelaide, Australia Publicity Chair Gale Spring RMIT University, Australia Conference Coordinator Tibor Kovacs ICST Technical Program Chair Chang-Tsun Li University of Warwick, UK Technical Program Committee Ahmed Bouridane Queen's University Belfast, UK Anthony TS Ho University of Surrey, UK Barry Blundell South Australia Police, Australia Carole Chaski Institute for Linguistic Evidence, USA Che-Yen Wen Central Police University, Taiwan Der-Chyuan Lou National Defense University, Taiwan Francois Cayre GIPSA-Lab / INPG, Domaine Universitaire, France Hae Yong Kim Universidade de Sao Paulo, Brazil Henrik Legind Larsen Aalborg University, Denmark VIII Organization Hongxia Jin IBM Almaden Research Center, USA Huidong Jin Nationa ICT Australia Javier Garcia Villalba Complutense University of Madrid, Spain Jianying Zhou Institute of Infocomm Research, Singapore Jordi Forne Technical University of Catalonia, Spain Kostas Anagnostakis Institute for Infocomm Research, Singapore M. L. Dennis Wong Swinburne University of Technology, Malaysia Pavel Gladyshev University College Dublin, Ireland Peter Stephenson Norwich University, USA Philip Turner QinetiQ and Oxford Brookes University, UK Raymond Hsieh California University of Pennsylvania, USA Richard Mislan Purdue University, USA Roberto Caldelli Universita' degli Studi Firenze, Italy Simson Garfingel US Naval Postgraduate School and Harvard University, USA Svein Yngvar Willassen Norwegian University of Science and Technology Weiqi Yan Queen's University Belfast, UK Xingming Sun University of Warwick, Uk Yongjian Hu Korea Advanced Institute of Science and Technology, Korea Zeno Geradts The Netherlands Forensic Institute Indrajit Ray Colorado State University, USA Damien Sauveron Universite de Limoges, France Michael Cohen Australian Federal Police, Australia Jeng-Shyang Pan National Kaohsiung University of Applied Sciences, Taiwan Lam-For Kwok City University of Hong Kong, Hong Kong Jung-Shian Li National Cheng Kung University, Taiwan Mark Pollitt University of Central Florida, USA Geyong Min University of Bradford, UK Theodore Tryfonas University of Glamorgan, UK Helen Trehame University of Surrey, U Andre Aarnes Norwegian University of Science and Technology Jessica Fridrich SUNY Binghampton, USA Workshop Chair Nigel Wilson Bar Chambers, Adelaide, South Australia, and Law School, University of Adelaide Workshop Programme Committee Robert Chalmers Adelaide Research and Innovation Pty Ltd, Australia Jean-Pierre du Plessis Ferrier Hodgson, Australia Table of Contents A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network.................................................. 1 Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, and Saed Faridnia Forensicsfor Detecting P2PNetworkOriginatedMP3Files onthe User Device.......................................................... 10 Heikki Kokkinen and Janne N¨oyra¨nen Image Encryption Using Chaotic Signal and Max–Heap Tree .......... 19 Fariborz Mahmoudi, Rasul Enayatifar, and Mohsen Mirzashaeri Investigating Encrypted Material .................................. 29 Niall McGrath, Pavel Gladyshev, Tahar Kechadi, and Joe Carthy Legal and Technical Implications of Collecting Wireless Data as an Evidence Source ................................................. 36 Benjamin Turnbull, Grant Osborne, and Matthew Simon Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt ............................................. 42 M.L. Dennis Wong, Antionette W.-T. Goh, and Hong Siang Chua Robust Correctness Testing for Digital Forensic Tools ................ 54 Lei Pan and Lynn M. Batten Surveillance Applications of Biologically-InspiredSmart Cameras ...... 65 Kosta Haltis, Lee Andersson, Matthew Sorell, and Russell Brinkworth The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems .............................. 77 Jill Slay and Elena Sitnikova FIA: An Open Forensic Integration Architecture for Composing Digital Evidence........................................................ 83 Sriram Raghavan, Andrew Clark, and George Mohay Distinguishing between Camera and Scanned Images by Means of Frequency Analysis............................................... 95 Roberto Caldelli, Irene Amerini, and Francesco Picchioni X Table of Contents Developing Speaker Recognition System: From Prototype to Practical Application ..................................................... 102 Pasi Fra¨nti, Juhani Saastamoinen, Ismo Ka¨rkka¨inen, Tomi Kinnunen, Ville Hautam¨aki, and Ilja Sidoroff A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC ................................................... 116 Trupti Shiralkar, Michael Lavine, and Benjamin Turnbull A Provable Security Scheme of ID-Based Threshold Decryption........ 122 Wang Xue-Guang and Chai Zhen-Chuan Analysis of Sensor Photo Response Non-Uniformity in RAW Images.... 130 Simon Knight, Simon Moschou, and Matthew Sorell Audit Log for Forensic Photography................................ 142 Timothy Neville and Matthew Sorell Authenticating Medical Images through Repetitive Index Modulation Based Watermarking ............................................. 153 Chang-Tsun Li and Yue Li Cyber Forensics Ontology for Cyber Criminal Investigation............ 160 Heum Park, SunHo Cho, and Hyuk-Chul Kwon Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis ........................................................ 166 Yue Li and Chang-Tsun Li Detection of Block Artifacts for Digital Forensic Analysis ............. 173 Chang-Tsun Li Vocal Forgery in Forensic Sciences ................................. 179 Patrick Perrot, Mathieu Morel, Joseph Razik, and G´erard Chollet International Workshop on e-Forensics Law Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights............................................... 186 Milton H. Luoma and Vicki M. Luoma Digital Identity – The Legal Person? ............................... 195 Clare Sullivan Surveillance and Datenschutz in Virtual Environments................ 212 Sabine Cikic, Fritz Lehmann-Grube, and Jan Sablatnig Author Index.................................................. 221

Description:
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.The focus of this year's conference has shifted to the lega
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.