2 research outputs found

    Investigating Encrypted Material

    No full text

    Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009

    No full text
    Matthew SorrelA novel handwritten letter recognizer using enhanced evolutionary neural network -- Forensics for detecting P2P network originated MP3 files on the user device -- Image encryption using chaotic signal and max-heap tree -- Investigating encrypted material -- Legal and technical implications of collecting wireless data as an evidence source -- Medical image authentication using DPT watermarking : A preliminary attempt -- Robust correctness testing for digital forensic tools -- Surveillance applications of biologically-inspired smart cameras -- The development of a generic framework for the forensic analysis of SCADA and process control systems -- FIA : An open forensic integration architecture for composing digital evidence -- Distinguishing between camera and scanned images by means of frequency analysis -- Developing speaker recognition system : From prototype to practical application -- A preliminary approach to the forensic analysis of an ultraportable ASUS Eee PC -- A provable security scheme of ID-based threshold decryption -- Analysis of sensor photo response non-uniformity in raw images -- Audit log for forensic photography -- Authenticating medical images through repetitive index modulation based watermarking -- Cyber forensics ontology for cyber criminal investigation -- Decomposed photo response non-uniformity for digital forensic analysis -- Detection of block artifacts for digital forensic analysis -- Vocal forgery in forensic sciences -- International workshop on e-Forensics Law: Complying across continents: At the intersection of litigation rights and privacy rights -- Digital identity - the legal person? -- Surveillance and datenschutz in virtual environmentshttp://trove.nla.gov.au/work/3709905
    corecore