Handbook of digital forensics of multimedia data and devices:
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Chichester, West Sussex
Wiley
2015
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028647349&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Literaturangaben |
Umfang: | xxv, 670 Seiten Illustrationen, Diagramme |
ISBN: | 9781118640500 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043224551 | ||
003 | DE-604 | ||
005 | 20160503 | ||
007 | t| | ||
008 | 151219s2015 xxua||| |||| 00||| eng d | ||
010 | |a 015011187 | ||
020 | |a 9781118640500 |c hardback |9 978-1-118-64050-0 | ||
035 | |a (OCoLC)929178899 | ||
035 | |a (DE-599)BVBBV043224551 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 |a DE-29T | ||
050 | 0 | |a HV8073 | |
082 | 0 | |a 363.25/62 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Handbook of digital forensics of multimedia data and devices |c edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, Guildford, UK |
264 | 1 | |a Chichester, West Sussex |b Wiley |c 2015 | |
300 | |a xxv, 670 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 4 | |a Criminal investigation |x Technological innovations | |
650 | 4 | |a Electronics in criminal investigation | |
700 | 1 | |a Ho, Anthony T. S. |d 1958- |0 (DE-588)1099331471 |4 edt | |
700 | 1 | |a Li, Shujun |0 (DE-588)1099331838 |4 edt | |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028647349&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028647349 |
Datensatz im Suchindex
_version_ | 1819321680338616320 |
---|---|
adam_text | HANDBOOK OF
DIGITAL FORENSICS
OF MULTIMEDIA DATA
AND DEVICES
Edited by
Anthony T S Ho and Shujun Li
Department of Computing and Surrey Centre for Cyber Security (SCCS)
University of Surrey, Guildford, UK
Wiley
4HEEE
IEEE Press
Contents
List of Contributors xvii
Foreword xix
Preface xxi
Acknowledgements xxvii
PART ONE MULTIMEDIA EVIDENCE HANDLING
1 Digital Forensics Laboratories in Operation: How Are Multimedia
Data and Devices Handled? 3
1 1 Introduction 3
1 2 Digital and Electronics Forensic Service, Metropolitan Police
Service, UK 4
121 Background: Metropolitan Police Service 5
122 Digital and Electronics Forensic Service 5
123 AV Lab: Operational and Procedural Aspects 6
124 Selected Forensic Techniques Used by AV Lab 14
125 Acknowledgements 17
1 3 Digital Forensics Team (Including Affiliated AV Team), Surrey
Police, UK 17
131 Background: Surrey Police 17
132 Structure of Surrey Police s Digital Forensics Team and
AV Team 18
133 Training and Certification 19
Contents vii
134 Standard Procedure 19
135 Routine Tasks Involving Multimedia Data and Devices 20
136 Submission Formats 20
137 Triage 21
138 Software and Hardware Tools Used for Handling
Multimedia Data 21
139 Cases Involving Encryption and Child Pornography 22
1 3 10 Cases Involving Source Device Identification 22
1 3 11 Challenges 22
1 3 12 Acknowledgements 23
1 4 Shanghai Stars Digital Forensic Centre, Third Research Institute of
China’s Ministry of Public Security 23
141 Background: Third Research Institute of China’s Ministry
of Public Security 23
142 Background: Related Legislations and Regulations 24
143 Overview of SSDFC 24
144 Services Provided 25
145 Procedure 25
146 Workload and Typical Cases 26
147 Software and Hardware Tools Used 26
148 Challenges 21
149 Acknowledgements 28
1 5 Discussions 28
1 6 Summary 32
l A Appendix: Questionnaires for Interviewing Surrey Police
and Shanghai Stars Digital Forensic Centre 32
References 34
2 Standards and Best Practices in Digital and Multimedia Forensics 38
2 1 Introduction 38
2 2 Overview 39
221 ISO Standards 42
222 Other Intemational/Regional Standards and Guides 43
223 US Standards and Best Practice Guides 43
224 UK Standards and Best Practice Guides 47
2 3 Electronic Evidence and Digital Forensics 48
231 International Standards 48
232 National Standards 52
233 Best Practice Guides 54
234 US Guides 55
235 European Guides 66
2 4 Multimedia Evidence and Multimedia Forensics 70
viii
Contents
241 ASTM E2825-12 ‘Standard Guide for Forensic Digital
Image Processing ’ (2012) 70
242 US SWGs (Scientific Working Groups) 70
243 ENFSI Working Groups 75
244 UK Law Enforcement 75
2 5 Digital Forensics Laboratory Accreditation 77
251 International Standards 11
2 6 General Quality Assurance (Management) 79
261 ISO 9001:2008 ‘Quality Management Systems -
Requirements ’ 80
262 ISO/IEC 27001:2005 ‘Information Security Management
Systems - Requirements ’ 80
263 ISO/IEC 27002:2013 ‘Code of Practice for Information
Security Controls ’ 80
2 7 Training, Education and Certification on Digital and Multimedia
Forensics 81
271 Standards and Best Practice Guides 81
272 Certification, Training and Educational Programs 84
2 8 Conclusions 84
Acknowledgements 86
References 86
3 A Machine Learning-Based Approach to Digital Triage 94
3 1 Introduction 94
311 Chapter Outline 96
3 2 Related Work on Digital Triage 96
321 Triage in the Medical Field 96
322 Early Digital Triage Models 97
323 Machine Learning-Based Digital Triage 98
324 Other Multimedia Source Classification Techniques 100
33A Machine Learning-Based Digital Triage Framework 100
331 Machine Learning Terminology 101
332 The framework in Detail 102
333 Collection-Data Extraction 103
334 Processing-Feature Extraction, Dataset Creation and
Processing Algorithms 104
335 Presentation 107
336 Model validation 107
34A Child Pornography Exchange Case Study 110
341 Definition of Child Pornography Exchange 110
342 Child Pornography Exchange-State Vector 111
343 Data Corpus 115
Contents
ix
344 Learning from Available Data 116
345 Experiment Setup, Results and Discussion 123
3 5 Conclusion 128
3 6 Challenges and Future Directions for the Digital Forensics Community 128
Acknowledgements 130
References 130
Forensic Authentication of Digital Audio and Video Files 133
4 1 Introduction 133
4 2 Examination Requests and Submitted Evidence 134
421 Examination Requests 134
422 Submitted Evidence 135
423 Digital Recording Devices 136
424 Digital File Formats 137
4 3 Laboratory Space 138
4 4 Laboratory Software and Equipment 138
441 High-Speed Computers, Computer Peripherals, Media Readers/Writers, Hardware/Software Write Blockers, Professional Headphones, Amplifiers, Cables and Connectors 139
442 Proprietary Audio and Video Playback Software 140
443 Digital Data Imaging and Analysis Software 141
444 High-Resolution Audio Waveform Analysis Software 142
445 FFT Analyzers and Software 143
446 Spectrographic Analysis Software 145
447 Scientific Computing Software 146
448 Professional Audio and Non-linear Video Editing and Playback Software 146
449 Media Conversion/Transcoding Software 147
4 4 10 Professional Image Measurement and Processing Software 147
4 5 Audio/Video Authentication Examinations 147
451 Overview of Examinations 147
452 Hashing and Imaging 150
453 Playback and Conversion Optimization 150
454 Digital Data Analysis 152
455 Audio Analyses 156
456 Video Analyses 167
4 6 Preparation of Work Notes and Laboratory Reports 171
4 7 Expert Testimony 172
4 8 Case Examples 173
X
Contents
481 Case Example Number 1 173
482 Case Example Number 2 175
4 9 Discussion 177
References 178
PART TWO DIGITAL EVIDENCE EXTRACTION
5 Photogrammetry in Digital Forensics 185
5 1 Introduction 185
511 Lens Distortion 187
5 2 Different Methods 188
521 Projective Geometry or Orthorectification 188
522 Space Resection and Multi-image Photogrammetry 191
523 Reverse Projection 192
5 3 Measurement Uncertainty 194
531 Difficulties in Creating Reference Recordings 195
5 4 Case Studies 195
541 Height Measurement 196
542 Speed Measurement 202
543 Determining the Absolute Position of an Object 208
5 5 3D Modelling/Scenario Testing 212
5 6 Summary 217
References 217
6 Advanced Multimedia File Carving 219
6 1 Introduction 219
6 2 Digtal Data Storage 220
621 Storage Devices 221
622 Logical Data Organization 223
623 Forensic Data Investigation 225
6 3 File Carving of Binary Data 225
6 4 Multimedia Data Structures 226
641 Digital Images 227
642 Audio Data 229
643 Video Data 231
6 5 File Carving of Multimedia Data 232
651 Image File Carving 232
652 Audio File Carving 233
653 Video File Carving 235
654 Special Considerations for Multimedia 238
6 6 Content Identification 241
Contents
xi
661 Cryptographic Hashing 243
662 Fuzzy Hashing 245
663 Perceptual Hashing 246
664 Searching and Indexing of Hashes 251
6 7 File Carving Frameworks 253
671 Current Practice and Existing Solutions 254
672 Framework Requirements 254
673 An Example Framework 255
674 Case Study 262
6 8 Conclusions 264
Acknowledgements 265
References 265
On Forensic Use of Biometrics 270
7 1 Introduction 270
7 2 Biometrics Performance Metrics 273
7 3 Face: The Natural Means for Human Recognition 274
731 Forensic Face Recognition 275
732 Automatic Face Recognition Techniques 278
733 Challenges and Trends of Face Recognition 279
734 Summary 282
7 4 Ears as a Means of Forensic Identification 283
741 Earprints in Forensics 285
742 From Earprints to Ear Images 290
743 Ear Morphology Features 294
744 Summary 298
7 5 Conclusions 299
References 299
Multimedia Analytics for Image Collection Forensics 305
8 1 Introduction 305
8 2 Data and Tasks 308
8 3 Multimedia Analysis 309
8 4 Visual Analytics Processes 312
8 5 ChronoBrowser 313
851 Visualizations 313
852 Visual Analytics Processes 319
8 6 MediaTable 320
861 Visualizations 320
862 Visual Analytics Processes 321
8 7 An Example Scenario 323
8 8 Future Outlook 325
References 326
xii
Contents
PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS
9 Forensic Camera Model Identification 331
9 1 Introduction 331
9 2 Forensic Source Identification 333
921 Identification Granularity 333
922 Intra- and Inter-Class Similarity, Feature Space
Representation 334
923 Digital Camera Acquisition Characteristics 335
9 3 Digital Camera Model Identification 337
9 4 Benchmarking Camera Model Identification Algorithms 339
941A Dataset Template for Camera Model Identification
Research 339
942 The Dresden Image Database 340
943 Benchmarking Procedure 341
9 5 Model-Specific Characteristics of Digital Camera Components 341
951 Compression Parameters, Metadata and File Format 341
952 Lens Distortion 342
953 CFA and Demosaicing 346
954 Camera Response Function 349
955 Summary and Limitations 350
9 6 Black Box Camera Model Identification 351
961 General-Purpose Image Descriptors 352
962 Dresden Image Database Case Study: Closed-Set Camera
Model Identification 355
963 Summary 362
9 7 Camera Model Identification in Open Sets 364
971 Dresden Image Database Case Study: One-Class SVM 364
972 Summary and Outlook 365
9 8 Model-Specific Characteristics in Device-Level Identification 366
9 9 Open Challenges Towards Practical Applications 368
References 370
10 Printer and Scanner Forensics 375
10 1 Introduction 375
10 1 1 Comparison with Digital Image Forensics 377
10 1 2 Document Lifecycle 378
10 2 Printer Forensics 379
10 2 1 Working Principles of Laser Printers and Inkjet Printers 379
10 2 2 Flowchart of Printer Forensics 380
10 2 3 Laser Printer Forensics 381
10 2 4 Inkjet Printer Forensics 385
Contents
xiii
10 3 Scanner Forensics 386
10 3 1 Flowchart of Scanner Forensics 3 87
10 3 2 Sensor Noise 387
10 3 3 Dust and Scratches 388
10 4 Photocopier Identification 389
10 4 1 Contact between Printer and photocopier 389
10 4 2 Character Signature 390
10 5 Forgery Detection for Printed and Scanned Documents 391
10 5 1 Flowchart of Forgery Detection 392
10 5 2 Forgery Detection for Printed Documents 393
10 5 3 Forgery Detection for Scanned Documents 395
10 6 Sample Algorithms with Case Studies 396
10 6 1 Printer Identification 396
10 6 2 Scanner Identification 400
10 6 3 Document Forgery Detection 403
10 7 Open Problems and Challenges 406
10 8 Conclusions 408
Acknowledgements 408
References 408
11 Microphone Forensics 411
11 1 Introduction 411
11 2 Pattern Recognition for Microphone Forensics 414
11 2 1 Pattern Recognition and Its Sub-Disciplines 414
11 2 2 State-of-the-Art in Pattern Recognition-Based
Microphone Forensics 416
11 3 Guidelines for Microphone Registration 421
11 4 Case Studies 423
11 4 1 Investigation Tasks 423
11 4 2 Implementation of the Statistical Pattern
Recognition Pipeline 425
11 4 3 Evaluation Setups 427
11 4 4 Evaluation Results 429
11 5 Chapter Summary 435
Acknowledgements 436
References 437
12 Forensic Identification of Printed Documents 442
12 1 Introduction 442
12 1 1 Hardware Considerations 444
12 1 2 Performance Characterization 446
12 2 Special Materials 449
xiv
Contents
12 3 Substrate Forensics 450
12 3 1 FiberFingerprint 450
12 3 2 Laser Speckle 451
12 3 3 Substrate Scanning 452
12 3 4 PaperSpeckle 452
12 3 5 Practical Considerations 455
12 4 Print Forensics 455
12 4 1 Authenticating Printed Glyphs 457
12 4 2 Model-Based Authentication 459
12 4 3 Authenticating Printed Halftones 465
12 4 4 Authenticating Data-Bearing Halftones 471
12 5 Real World Example: Currency Protection 473
12 6 Summary and Ecosystem Considerations 475
References 478
PART FOUR MULTIMEDIA CONTENT FORENSICS
Digital Image Forensics with Statistical Analysis 483
13 1 Introduction 483
13 1 1 Digital Image Forensics 483
13 1 2 Background 484
13 2 Detecting Region Duplication 488
13 2 1 Problem Definition 488
13 2 2 Related Works 489
13 2 3 Proposed Method 491
13 2 4 Performance Analysis 495
13 3 Exposing Splicing Forgery 500
13 3 1 Problem Definition 500
13 3 2 Related Works 501
13 3 3 Proposed Method 503
13 3 4 Performance Analysis 506
13 4 Case Studies 508
13 4 1 Region Duplication Forgeries 508
13 4 2 Splicing Forgeries 510
13 5 Other Applications 512
13 5 1 Detecting Audio Splicing 512
13 5 2 Exposing Video Forgery 514
13 6 Summary 515
References 517
Contents
xv
14 Camera-Based Image Forgery Detection 522
14 1 Introduction 522
14 2 Camera Structure 524
14 2 1 Optics 524
14 2 2 Sensors 530
14 2 3 Image Processing Pipeline 533
14 3 Camera-Based Forgery Detection Methods 535
14 3 1 Optics-Based Forgery Detection 536
14 3 2 Sensors-Based Forgery Detection 537
14 3 3 Image Processing Pipeline-Based Forgery Detection 538
14 4 Forgery Detection Based on PFA: A Case Study 548
14 4 1 Forgery Detection Based on PFA 549
14 4 2 Algorithm 551
14 4 3 Test Results 557
14 4 4 Discussion 562
14 5 Conclusion 564
References 565
15 Image and Video Processing History Recovery 572
15 1 Introduction 572
15 2 Coding Artefacts 573
15 2 1 JPEG Compression 574
15 2 2 Double JPEG Compression 577
15 2 3 Video Compression 583
15 2 4 Video Re-encoding 585
15 3 Editing Artefacts 586
15 3 1 Resampling 587
15 3 2 Image Enhancement 589
15 4 Estimation of Processing Parameters 590
15 4 1 Estimation of Coding Parameters 590
15 4 2 Estimation of Editing Parameters 595
15 43A rtefact Localization 598
15 5 Case Studies 601
15 5 1 Localization of Forgeries in JPEG Images 601
15 5 2 Localization of Forgeries in MPEG-2 Videos 603
15 6 Conclusions 605
References 607
16 Anti-Forensics of Multimedia Data and Countermeasures 612
16 1 Introduction 612
16 2 Anti-forensic Approaches Proposed in the Literature 613
16 2 1 Anti-forensics of Acquisition Fingerprints 614
xvi
Contents
16 2 2 Anti-forensic of Compression Fingerprints 617
16 2 3 Anti-forensic of Editing Fingerprints 619
16 3 Case Study: JPEG Image Forensics 623
16 3 1 JPEG Compression and JPEG Compression Footprints 623
16 3 2 JPEG Compression Anti-forensics 625
16 3 3 Analysis of Anti-forensic Dithering 626
16 3 4 Countering JPEG Compression Anti-forensics 633
16 4 Trade-off between Forensics and Anti-forensics 644
16 4 1 Performance Analysis of Anti-forensics 644
16 4 2 Interplay between Forger and Forensic Analyst Using
Game Theory 645
16 5 Conclusions 647
References 647
|
any_adam_object | 1 |
author2 | Ho, Anthony T. S. 1958- Li, Shujun |
author2_role | edt edt |
author2_variant | a t s h ats atsh s l sl |
author_GND | (DE-588)1099331471 (DE-588)1099331838 |
author_facet | Ho, Anthony T. S. 1958- Li, Shujun |
building | Verbundindex |
bvnumber | BV043224551 |
callnumber-first | H - Social Science |
callnumber-label | HV8073 |
callnumber-raw | HV8073 |
callnumber-search | HV8073 |
callnumber-sort | HV 48073 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)929178899 (DE-599)BVBBV043224551 |
dewey-full | 363.25/62 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/62 |
dewey-search | 363.25/62 |
dewey-sort | 3363.25 262 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Informatik Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01526nam a2200373 c 4500</leader><controlfield tag="001">BV043224551</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160503 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">151219s2015 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015011187</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118640500</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-118-64050-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)929178899</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043224551</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8073</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/62</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of digital forensics of multimedia data and devices</subfield><subfield code="c">edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, Guildford, UK</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, West Sussex</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxv, 670 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal investigation</subfield><subfield code="x">Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics in criminal investigation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ho, Anthony T. S.</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)1099331471</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Shujun</subfield><subfield code="0">(DE-588)1099331838</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028647349&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028647349</subfield></datafield></record></collection> |
id | DE-604.BV043224551 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:31:35Z |
institution | BVB |
isbn | 9781118640500 |
language | English |
lccn | 015011187 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028647349 |
oclc_num | 929178899 |
open_access_boolean | |
owner | DE-11 DE-29T |
owner_facet | DE-11 DE-29T |
physical | xxv, 670 Seiten Illustrationen, Diagramme |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spellingShingle | Handbook of digital forensics of multimedia data and devices Criminal investigation Technological innovations Electronics in criminal investigation |
title | Handbook of digital forensics of multimedia data and devices |
title_auth | Handbook of digital forensics of multimedia data and devices |
title_exact_search | Handbook of digital forensics of multimedia data and devices |
title_full | Handbook of digital forensics of multimedia data and devices edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, Guildford, UK |
title_fullStr | Handbook of digital forensics of multimedia data and devices edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, Guildford, UK |
title_full_unstemmed | Handbook of digital forensics of multimedia data and devices edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, Guildford, UK |
title_short | Handbook of digital forensics of multimedia data and devices |
title_sort | handbook of digital forensics of multimedia data and devices |
topic | Criminal investigation Technological innovations Electronics in criminal investigation |
topic_facet | Criminal investigation Technological innovations Electronics in criminal investigation |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028647349&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hoanthonyts handbookofdigitalforensicsofmultimediadataanddevices AT lishujun handbookofdigitalforensicsofmultimediadataanddevices |