Conferences related to Forensics

Back to Top

2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)

COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It isone of the major international forums for academia, industry, and government to discussresearch results, advancements and future trends in computer and software technologies andapplications. The technical program includes keynote addresses, research papers, industrialcase studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and anumber of workshops on emerging important topics.

  • 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It isone of the major international forums for academia, industry, and government to discussresearch results, advancements and future trends in computer and software technologies andapplications. The technical program includes keynote addresses, research papers, industrialcase studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and anumber of workshops on emerging important topics.

  • 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is a major international forum for academia, industry, and government to discuss research results and advancements, emerging problems, and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, plenary and specialized panels, fast abstracts, a doctoral symposium, poster sessions, and a number of workshops on emerging and important topics.

  • 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012

    COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics.

  • 2011 IEEE 35th Annual Computer Software and Applications Conference - COMPSAC 2011

    As one of the flagship conferences for the Computer Society, COMPSAC is the unique international conference for hosting computation as a base science, necessarily applied to applications, employing all aspects of the computing discipline. Keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, a doctoral symposium, and workshops on emerging important topics all contribute cohesively to this theme.

  • 2010 IEEE 34th Annual Computer Software and Applications Conference - COMPSAC 2010

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of the art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts.

  • 2009 IEEE 33rd International Computer Software and Applications Conference - COMPSAC 2009

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts. It

  • 2008 IEEE 32nd International Computer Software and Applications Conference COMPSAC 2008

    COMPSAC is a major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. It was first held in Chicago in 1977, and since then it has been one of the major forums for academia, industry, and government to discuss the state of art, new advances, and future trends in software technologies and practices. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions and fast abstracts.

  • 2007 IEEE International Computer Software and Applications Conference COMPSAC 2007

  • 2006 IEEE 30th International Computer Software and Applications Conference COMPSAC 2006

  • 2005 IEEE 29th International Computer Software and Applications Conference COMPSAC 2005


2018 IEEE IAS Electrical Safety Workshop (ESW)

Accelerate application of breakthrough improvements in human factors, technology, and managing systems that reduce risk of electrical injuries Stimulate innovation in overcoming barriers Change and advance the electrical safety culture to enable sustainable improvements in prevention of electrical accidents and injuries


2018 IEEE International Conference on Multimedia and Expo (ICME)

The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities. ICME also features an Exposition of multimedia products and prototypes.


2018 IEEE International Conference on Robotics and Automation (ICRA)

ICRA is the IEEE Robotics and Automation Society's flagship conference and is a premier international forum for robotics researchers to present their work.


More Conferences

Periodicals related to Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


More Periodicals

Most published Xplore authors for Forensics

Back to Top

Xplore Articles related to Forensics

Back to Top

The importance of standardization in biometric data for digital forensics

[{u'author_order': 1, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'full_name': u'Semih Ulupinar'}, {u'author_order': 2, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'full_name': u'Sengul Dogan'}, {u'author_order': 3, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'full_name': u'Erhan Akbal'}, {u'author_order': 4, u'affiliation': u'Department of Digital Forensics Engineering, Technology Faculty, Firat University, Elazig', u'full_name': u'Turker Tuncer'}] 2017 International Conference on Computer Science and Engineering (UBMK), 2017

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...


Live digital forensics in a virtual machine

[{u'author_order': 1, u'affiliation': u'Laboratory of Computer Forensics, Shandong Computer Science Center, Jinan, China', u'full_name': u'Lei Zhang'}, {u'author_order': 2, u'affiliation': u'Qingdao Technological University, China', u'full_name': u'Dong Zhang'}, {u'author_order': 3, u'affiliation': u'Laboratory of Computer Forensics, Shandong Computer Science Center, Jinan, China', u'full_name': u'Lianhai Wang'}] 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Traditional computer forensics is performed towards physical machines, using a set of forensic tools to acquire disk images and memory dumps. But it is much more different to deal with virtual machines. Live forensics is used to acquire volatile data and improve efficiency, but how to perform live forensics on a subject system with virtual machines hosted in? This paper ...


Analysis of mobile phones in digital forensics

[{u'author_order': 1, u'affiliation': u'Department of Digital Forensics Engineering, Firat University, Elazig, Turkey', u'full_name': u'Sengul Dogan'}, {u'author_order': 2, u'affiliation': u'Department of Digital Forensics Engineering, Firat University, Elazig, Turkey', u'full_name': u'Erhan Akbal'}] 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017

Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...


Proactive Digital Forensics: The Ever-Increasing Need for Standardization

[{u'author_order': 1, u'full_name': u'Antonis Mouhtaropoulos'}, {u'author_order': 2, u'full_name': u'Chang-Tsun Li'}, {u'author_order': 3, u'full_name': u'Marthie Grobler'}] 2012 European Intelligence and Security Informatics Conference, 2012

Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization ...


National digital forensics framework for Bangladesh

[{u'author_order': 1, u'affiliation': u'Bangladesh University of Professionals, Bangladesh', u'full_name': u'Mohammad Mahfuzul Haque'}, {u'author_order': 2, u'affiliation': u'Daffodil International University, Bangladesh', u'full_name': u'Syed Akther Hossain'}] 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017

At recent time, cybercrime has increased significantly in the world and also in Bangladesh due to consequence of massive digitalization efforts in every sector. These types of offense require systematic probing in order to be revealed properly at the court of law. This research work proposed a comprehensive digital forensics framework to facilitate forensically ready common standard digital forensics to ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

No eLearning Articles are currently tagged "Forensics"

IEEE-USA E-Books

  • Photogrammetry in Digital Forensics

    In forensics usually close-range photogrammetry is used where two types of photogrammetry can be distinguished: photogrammetry using controlled images and photogrammetry using uncontrolled images. Photogrammetry using two or more controlled photographs is a common technique, and a lot of software is available to perform this. This chapter begins with a discussion on lens distortion. Before photogrammetry is conducted one should have an idea about the imperfections caused by lens distortion to the image. The chapter describes different methods of photogrammetry available for forensic investigations. For photogrammetry in forensic investigations several techniques based on close range photogrammetry are available: projective geometry; space resection and multi-image photogrammetry; and reverse projection. Independent of the method used measurement errors will be made. The chapter ends with a discussion on 3D modelling and scenario testing including case examples.

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.

  • Multimedia Analytics for Image Collection Forensics

    This chapter focuses on techniques suited for forensic analysis of large image collections. In digital forensics an investigator is often tasked to analyze a data source containing large numbers of images and their metadata sometimes reaching into the millions. Apart from the content of the images there is a lot of information present in the metadata. The chapter considers the specifics of datasets and tasks in the forensic field. Two fields underlying multimedia analytics namely multimedia analysis and visual analytics are explained. The principles from those fields provide the basis for describing two-example multimedia analytics systems. The ChronoBrowser is used as a multimedia analytics system developed for forensic analysis. The chapter shows how different visual analytics processes are instantiated within ChronoBrowser. The MediaTable is considered as example of a concept based multimedia analytics system. The chapter presents a scenario to show how multimedia analytics can aid forensic investigators.

  • Digital Forensics Laboratories in Operation

    This chapter looks at the operational side of digital forensics of multimedia data and devices in real-world digital forensics laboratories, especially those run by law enforcement. It provides insights about the operational aspect of digital forensic services and practices on multimedia data and devices. The chapter describes how multimedia data and devices are handled at the Met's Digital and Electronics Forensic Service (DEFS), with a particular focus on the DEFS's Audio-Video Laboratory (AV Lab) which is the main forensic laboratory handling multimedia data and devices. It describes different aspects of digital forensic practices on multimedia data and devices at the Digital Forensics Team of Surrey Police (UK) and at the Shanghai Stars Digital Forensic Center (China), respectively. It then talks about the three digital forensics laboratories, and compares digital forensics practices of the three laboratories to show common features and major differences.

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • Microphone Forensics

    In this chapter, microphone forensic investigations specify selected components of (complex) audio signal composition as the patterns to be detected, identified or verified by forensic methods. Such patterns are primarily the characteristics of the sensor, hence the name microphone forensics, but also include characteristics of the environment or processing operations used to modify the recordings. The chapter provides general guidelines for microphone registration. To demonstrate how a typical microphone forensic analysis can be done using statistical pattern recognition, new practical investigations are performed here. An implementation of the statistical pattern recognition pipeline relying on the established data mining suite Waikato Environment for Knowledge Analysis (WEKA) and the author's own general-purpose audio feature extractor are presented and applied to the four investigation tasks specified. Finally, the chapter summarizes some challenges in microphone forensics identified by the investigations described here as well as general challenges to this field.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.

  • Digital Forensic Science: Issues, Methods, and Challenges

    <p><i>Digital forensic science</i>, or <i>digital forensics</i>, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts.</p><p>Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complexity of IT systems, leading to more complex behavior that needs to be investigated.</p><p>The goal of this book is to provide a systematic <i>technical</i> overview of digital forensic techniques, primarily from the point of view of computer science. This allows us to put the field in the broader perspective of a host of related areas and gain better insight into the computational challenges facing forensics, as well as draw inspiration for addressing them. This is needed as some of the challenges faced by digital forensics, such as cloud computing, require <i>qualitatively</i> different approaches; the sheer volume of data to be examined also requires new means of processing it.</p>

  • Cloud Forensics

    Cloud forensics is a special branch of digital forensics, which is required to establish facts about incidents that are actively or passively related to clouds. However, today's cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forensics tools cannot cope with the dynamic and black-box nature of clouds. This chapter discusses the challenges of cloud forensics, discusses existing techniques to support reliable forensics, and explores the open problems in this area.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"


Jobs related to Forensics

Back to Top