Conferences related to Forensics

Back to Top

2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)

COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It isone of the major international forums for academia, industry, and government to discussresearch results, advancements and future trends in computer and software technologies andapplications. The technical program includes keynote addresses, research papers, industrialcase studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and anumber of workshops on emerging important topics.

  • 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It isone of the major international forums for academia, industry, and government to discussresearch results, advancements and future trends in computer and software technologies andapplications. The technical program includes keynote addresses, research papers, industrialcase studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and anumber of workshops on emerging important topics.

  • 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is a major international forum for academia, industry, and government to discuss research results and advancements, emerging problems, and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, plenary and specialized panels, fast abstracts, a doctoral symposium, poster sessions, and a number of workshops on emerging and important topics.

  • 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2011 IEEE 35th Annual Computer Software and Applications Conference - COMPSAC 2011

    As one of the flagship conferences for the Computer Society, COMPSAC is the unique international conference for hosting computation as a base science, necessarily applied to applications, employing all aspects of the computing discipline. Keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, a doctoral symposium, and workshops on emerging important topics all contribute cohesively to this theme.

  • 2010 IEEE 34th Annual Computer Software and Applications Conference - COMPSAC 2010

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of the art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts.

  • 2009 IEEE 33rd International Computer Software and Applications Conference - COMPSAC 2009

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts. It

  • 2008 IEEE 32nd International Computer Software and Applications Conference COMPSAC 2008

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts.

  • 2007 IEEE International Computer Software and Applications Conference COMPSAC 2007

  • 2006 IEEE 30th International Computer Software and Applications Conference COMPSAC 2006

  • 2005 IEEE 29th International Computer Software and Applications Conference COMPSAC 2005


2018 IEEE IAS Electrical Safety Workshop (ESW)

Accelerate application of breakthrough improvements in human factors, technology, and managing systems that reduce risk of electrical injuries Stimulate innovation in overcoming barriers Change and advance the electrical safety culture to enable sustainable improvements in prevention of electrical accidents and injuries


2018 IEEE International Conference on Multimedia and Expo (ICME)

The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities. ICME also features an Exposition of multimedia products and prototypes.


2018 IEEE International Conference on Robotics and Automation (ICRA)

ICRA is the IEEE Robotics and Automation Society's flagship conference and is a premier international forum for robotics researchers to present their work.


More Conferences

Periodicals related to Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


More Periodicals

Most published Xplore authors for Forensics

Back to Top

Xplore Articles related to Forensics

Back to Top

Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles

[{u'author_order': 1, u'full_name': u'Mumin Cebe'}, {u'author_order': 2, u'full_name': u'Enes Erdin'}, {u'author_order': 3, u'full_name': u'Kemal Akkaya'}, {u'author_order': 4, u'full_name': u'Hidayet Aksu'}, {u'author_order': 5, u'full_name': u'Selcuk Uluagac'}] IEEE Communications Magazine, 2018

Today's vehicles are becoming cyber-physical systems that not only communicate with other vehicles but also gather various information from hundreds of sensors within them. These developments help create smart and connected (e.g., self-driving) vehicles that will introduce significant information to drivers, manufacturers, insurance companies, and maintenance service providers for various applications. One such application that is becoming crucial with the ...


IoT Device Forensics and Data Reduction

[{u'author_order': 1, u'affiliation': u'School of Information Technology & Mathematical Sciences, University of South Australia, Adelaide, SA, Australia', u'full_name': u'Darren Quick'}, {u'author_order': 2, u'affiliation': u'School of Information Technology & Mathematical Sciences, University of South Australia, Adelaide, SA, Australia', u'full_name': u'Kim-Kwang Raymond Choo'}] IEEE Access, 2018

The growth in the prevalence of the plethora of digital devices has resulted in growing volumes of disparate data, with potential relevance to criminal and civil investigations. With the increase in data volume, there is an opportunity to build greater case-related knowledge and discover evidence, with implications at all stages of the digital forensic analysis process. The growth in digital ...


A Rotation-Invariant Convolutional Neural Network for Image Enhancement Forensics

[{u'author_order': 1, u'affiliation': u'School of Data and Computer Science, Sun Yat-sen University, Guangzhou, 510006, China', u'full_name': u'Yifang Chen'}, {u'author_order': 2, u'affiliation': u'School of Data and Computer Science, Sun Yat-sen University, Guangzhou, 510006, China', u'full_name': u'Zi Xian Lyu'}, {u'author_order': 3, u'affiliation': u'School of Data and Computer Science, Sun Yat-sen University, Guangzhou, 510006, China', u'full_name': u'Xiangui Kang'}, {u'author_order': 4, u'affiliation': u'Department of ECE, University of British Colombia, Vancouver, Canada', u'full_name': u'Z. Jane Wang'}] 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), None

Many proposed complex convolutional neural network (CNN) models in image forensics are with a large number of parameters, requiring a huge number of training data and having the risk of being overfitting. Considering the desired rotation invariance in the detection of some specific image manipulations, i.e., image enhancement, we propose employing convolutional filters with an isotropic architecture in the CNN ...


A New Approach in Digital Forensics Investigation Process

[{u'author_order': 1, u'affiliation': u'University of Tehran, Faculty of New Sciences and Technologies, Tehran, Iran', u'full_name': u'Hamid Reza Ahmadi'}, {u'author_order': 2, u'affiliation': u'Lebanese University, Faculty of Science, Beirut, Lebanon', u'full_name': u'Ayman Mourad'}, {u'author_order': 3, u'affiliation': u'Lebanese University, Faculty of Science, Beirut, Lebanon', u'full_name': u'Rami Tawil'}, {u'author_order': 4, u'affiliation': u'Lebanese University, Doctoral School of Science and Technology, Beirut, Lebanon', u'full_name': u'Mohammad Baker Awada'}] 2018 International Conference on Computer and Applications (ICCA), None

Due to the widespread utilization of digital devices, and the availability of high-capacity storage devices, the digital forensics investigation process became more and more time consuming. Moreover, among the different operating systems running on these devices, Windows has the largest market share. For these reasons, this article focuses on reducing the time needed for investigation in digital forensic cases dealing ...


Comprehensive Display of Digital Image Copy-Move Forensics Techniques

[{u'author_order': 1, u'affiliation': u'Department of Computer Science, University of Diyala, Iraq', u'full_name': u'Jumana Waleed'}, {u'author_order': 2, u'affiliation': u'Department of Computer Science, University of Diyala, Iraq', u'full_name': u'Dhahir Abdulhade Abdullah'}, {u'author_order': 3, u'affiliation': u'Department of Computer Science, University of Diyala, Iraq', u'full_name': u'Mokhles Hussein Khudhur'}] 2018 International Conference on Engineering Technology and their Applications (IICETA), None

Digital Images considered as a natural and effective communication media to the human, owing to the swiftly and the easy manner to comprehend their content. After the appearing of the high-quality digital camera, personal computers, and sophisticated photo editing software, the manipulation becomes more common. One of the most popular tools to manipulation is a copy-move forgery (CMF) that precedes ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

No eLearning Articles are currently tagged "Forensics"

IEEE-USA E-Books

  • Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

    Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly large impact on containerization and DevOps, the impact on information assurance (IA) has been incremental. This chapter surveys approaches to leverage Big Data techniques to enhance IoT provenance, which is itself only one of multiple measures needed to improve information assurance. A number of thus far loosely connected approaches are identified and addressed. Systematic use of concept of complex event processing (CEP) can improve on current information assurance practices, especially if its paradigms and design practices are more widely incorporated into IoT architectures. Big Data is changing the nature of work for Chief Security Officers (CSO), auditors, and forensic investigators.

  • Cloud Forensics

    Cloud forensics is a special branch of digital forensics, which is required to establish facts about incidents that are actively or passively related to clouds. However, today's cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forensics tools cannot cope with the dynamic and black-box nature of clouds. This chapter discusses the challenges of cloud forensics, discusses existing techniques to support reliable forensics, and explores the open problems in this area.

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.

  • Digital Forensics Laboratories in Operation

    This chapter looks at the operational side of digital forensics of multimedia data and devices in real-world digital forensics laboratories, especially those run by law enforcement. It provides insights about the operational aspect of digital forensic services and practices on multimedia data and devices. The chapter describes how multimedia data and devices are handled at the Met's Digital and Electronics Forensic Service (DEFS), with a particular focus on the DEFS's Audio-Video Laboratory (AV Lab) which is the main forensic laboratory handling multimedia data and devices. It describes different aspects of digital forensic practices on multimedia data and devices at the Digital Forensics Team of Surrey Police (UK) and at the Shanghai Stars Digital Forensic Center (China), respectively. It then talks about the three digital forensics laboratories, and compares digital forensics practices of the three laboratories to show common features and major differences.

  • Microphone Forensics

    In this chapter, microphone forensic investigations specify selected components of (complex) audio signal composition as the patterns to be detected, identified or verified by forensic methods. Such patterns are primarily the characteristics of the sensor, hence the name microphone forensics, but also include characteristics of the environment or processing operations used to modify the recordings. The chapter provides general guidelines for microphone registration. To demonstrate how a typical microphone forensic analysis can be done using statistical pattern recognition, new practical investigations are performed here. An implementation of the statistical pattern recognition pipeline relying on the established data mining suite Waikato Environment for Knowledge Analysis (WEKA) and the author's own general-purpose audio feature extractor are presented and applied to the four investigation tasks specified. Finally, the chapter summarizes some challenges in microphone forensics identified by the investigations described here as well as general challenges to this field.

  • Multimedia Analytics for Image Collection Forensics

    This chapter focuses on techniques suited for forensic analysis of large image collections. In digital forensics an investigator is often tasked to analyze a data source containing large numbers of images and their metadata sometimes reaching into the millions. Apart from the content of the images there is a lot of information present in the metadata. The chapter considers the specifics of datasets and tasks in the forensic field. Two fields underlying multimedia analytics namely multimedia analysis and visual analytics are explained. The principles from those fields provide the basis for describing two-example multimedia analytics systems. The ChronoBrowser is used as a multimedia analytics system developed for forensic analysis. The chapter shows how different visual analytics processes are instantiated within ChronoBrowser. The MediaTable is considered as example of a concept based multimedia analytics system. The chapter presents a scenario to show how multimedia analytics can aid forensic investigators.

  • Photogrammetry in Digital Forensics

    In forensics usually close-range photogrammetry is used where two types of photogrammetry can be distinguished: photogrammetry using controlled images and photogrammetry using uncontrolled images. Photogrammetry using two or more controlled photographs is a common technique, and a lot of software is available to perform this. This chapter begins with a discussion on lens distortion. Before photogrammetry is conducted one should have an idea about the imperfections caused by lens distortion to the image. The chapter describes different methods of photogrammetry available for forensic investigations. For photogrammetry in forensic investigations several techniques based on close range photogrammetry are available: projective geometry; space resection and multi-image photogrammetry; and reverse projection. Independent of the method used measurement errors will be made. The chapter ends with a discussion on 3D modelling and scenario testing including case examples.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"