Conferences related to Forensics

Back to Top

2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)

    The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. PST-2012 will be a valuable place for IEEE members to present papers and meet with one another to discuss their work.

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Forensics

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.




Xplore Articles related to Forensics

Back to Top

List of Reviewers

IEEE Transactions on Information Forensics and Security, 2007

Lists the reviewers who contributed to IEEE Transactions on Information Forensics and Security in 2007.


Correction to "A framework for robust watermarking of H.264 encoded video with controllable detection performance"

Maneli Noorkami; Russell M. Mersereau IEEE Transactions on Information Forensics and Security, 2007

In the March 2007 paper named above (pp. 14-23), the authors found the following error. The optimality of the detector is only valid for c = 2, which is a Gaussian distribution. The performance and results of the detector when c ≠ 2 as presented in the paper are still valid. However, in this case the detector is suboptimal. Equations ...


Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking

Wei Liu; Lina Dong; Wenjun Zeng IEEE Transactions on Information Forensics and Security, 2007

Digital watermarking is an efficient and promising approach to protect intellectual property rights of digital media. Spread spectrum (SS) is one of the most widely used image watermarking schemes because of its robustness against attacks and its support for the exploitation of the properties of the human visual system (HVS). To maximize the watermark strength without introducing visual artifacts, in ...


Semantic based DNS forensics

Samuel Marchai; Jérôme François; Radu State; Thomas Engel 2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012

In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain ...


A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles

Xuefeng Liang; Arijit Bishnu; Tetsuo Asano IEEE Transactions on Information Forensics and Security, 2007

Fingerprint indexing is a key technique in automatic fingerprint identification systems (AFIS). However, handling fingerprint distortion is still a problem. This paper concentrates on a more accurate fingerprint indexing algorithm that efficiently retrieves the top _N_ possible matching candidates from a huge database. To this end, we design a novel feature based on minutia neighborhood structure (we call this minutia ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

List of Reviewers

IEEE Transactions on Information Forensics and Security, 2007

Lists the reviewers who contributed to IEEE Transactions on Information Forensics and Security in 2007.


Correction to "A framework for robust watermarking of H.264 encoded video with controllable detection performance"

Maneli Noorkami; Russell M. Mersereau IEEE Transactions on Information Forensics and Security, 2007

In the March 2007 paper named above (pp. 14-23), the authors found the following error. The optimality of the detector is only valid for c = 2, which is a Gaussian distribution. The performance and results of the detector when c ≠ 2 as presented in the paper are still valid. However, in this case the detector is suboptimal. Equations ...


Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking

Wei Liu; Lina Dong; Wenjun Zeng IEEE Transactions on Information Forensics and Security, 2007

Digital watermarking is an efficient and promising approach to protect intellectual property rights of digital media. Spread spectrum (SS) is one of the most widely used image watermarking schemes because of its robustness against attacks and its support for the exploitation of the properties of the human visual system (HVS). To maximize the watermark strength without introducing visual artifacts, in ...


Semantic based DNS forensics

Samuel Marchai; Jérôme François; Radu State; Thomas Engel 2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012

In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain ...


A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles

Xuefeng Liang; Arijit Bishnu; Tetsuo Asano IEEE Transactions on Information Forensics and Security, 2007

Fingerprint indexing is a key technique in automatic fingerprint identification systems (AFIS). However, handling fingerprint distortion is still a problem. This paper concentrates on a more accurate fingerprint indexing algorithm that efficiently retrieves the top _N_ possible matching candidates from a huge database. To this end, we design a novel feature based on minutia neighborhood structure (we call this minutia ...


More eLearning Resources

IEEE-USA E-Books

  • Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

    Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly large impact on containerization and DevOps, the impact on information assurance (IA) has been incremental. This chapter surveys approaches to leverage Big Data techniques to enhance IoT provenance, which is itself only one of multiple measures needed to improve information assurance. A number of thus far loosely connected approaches are identified and addressed. Systematic use of concept of complex event processing (CEP) can improve on current information assurance practices, especially if its paradigms and design practices are more widely incorporated into IoT architectures. Big Data is changing the nature of work for Chief Security Officers (CSO), auditors, and forensic investigators.

  • Index

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras.&nbsp_place_holder; This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: - Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices - Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices - Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work - Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies

  • Photogrammetry in Digital Forensics

    In forensics usually close-range photogrammetry is used where two types of photogrammetry can be distinguished: photogrammetry using controlled images and photogrammetry using uncontrolled images. Photogrammetry using two or more controlled photographs is a common technique, and a lot of software is available to perform this. This chapter begins with a discussion on lens distortion. Before photogrammetry is conducted one should have an idea about the imperfections caused by lens distortion to the image. The chapter describes different methods of photogrammetry available for forensic investigations. For photogrammetry in forensic investigations several techniques based on close range photogrammetry are available: projective geometry; space resection and multi-image photogrammetry; and reverse projection. Independent of the method used measurement errors will be made. The chapter ends with a discussion on 3D modelling and scenario testing including case examples.

  • Forensic Camera Model Identification

    This chapter presents an overview of the state of the art of technical means to achieve camera model identification. It starts with an introduction to forensic source identification. The chapter deals with a specific case of digital camera model identification. It comments on suitable image datasets for setting up practical algorithms, the foundations, and focuses on problems that arise in identification scenarios with unknown camera models. The chapter explains the connections between camera model identification and device identification. It talks about the open set camera model identification that poses an inherent challenge to the widely used multi-class support vector machines (SVMs), as they always assign a test sample to one of the trained classes. The role of model-specific characteristics in device-level identification is discussed. As forensic camera model identification finds applications in practical investigations, a more explicit treatment of the different types of artifact interdependencies will gain more relevance.

  • SECURING MANAGEMENT AND MANAGING SECURITY

    This chapter provides an overview of modern network and infrastructure management as a context to the management of deployed security mechanisms. It discusses the need for management to stay involved in security management activities. This is followed by a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. The chapter then examines security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. It also considers the need for compliance relative to security policies that must be adhered to by operations and management personnel. An operational security compliance program exists to ensure that all those business requirements, policy statements, and specific security dictates are being complied with. The chapter concludes with consideration of activities related to security when developing or purchasing functions, subsystems, or complete solutions.

  • Front Matter

    The prelims comprise: Half-Title Page Title Page Copyright Page Dedication Page Table of Contents List of Contributors Foreword Preface Acknowledgements

  • OPERATIONAL MANAGEMENT OF SECURITY

    In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third- party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.

  • Advanced Multimedia File Carving

    This chapter discusses the state of the art in multimedia file carving. Combining common file carving approaches with content identification results in advanced multimedia file carving. In this context, advanced means that the file carving strategy offers more assistance than the sole collection of evidence data. First, the chapter presents a brief introduction of storage technology aspects relevant for file carving, for example storage devices and file systems. File carving is a general method to enable accessing data lost to the file system. The chapter introduces the more general binary data file carving, and explains file carving designed specifically for multimedia. File carving describes the process of extracting file fragments from a byte stream such as a disk or volume image without file system information. This technique is used to recover data from unallocated space on hard disk storage. The chapter explains consequences of multimedia file characteristics for file carving.

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"