Conferences related to Forensics

Back to Top

2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)

    The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. PST-2012 will be a valuable place for IEEE members to present papers and meet with one another to discuss their work.

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Forensics

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.




Xplore Articles related to Forensics

Back to Top

Blank page

IEEE Transactions on Information Forensics and Security, 2017

This page was intentionally left blank.


Forensic analysis of three social media apps in windows 10

Asma Majeed; Haleemah Zia; Rabeea Imran; Shahzad Saleem 2015 12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET), 2015

Social media facilitates communication and provides easy way of reaching out to people. However, it also poses a risk of disclosure of personal details which, if exploited, can lead to privacy issues and also crimes such as blackmailing, identity theft etc. In this regard, it is essential to study social media from a forensics point of view. In this paper ...


Blank page

IEEE Transactions on Information Forensics and Security, 2017

This page was intentionally left blank.


Offline Signature Verification Based on Bag-of-VisualWords Model Using KAZE Features and Weighting Schemes

Manabu Okawa 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2016

The familiar use of handwritten signatures in various applications (e.g., credit card authentication) increases the need for automated verification methods. However, there is still room for improvement in the performance of automated systems under various writing conditions compared to human beings, especially forensic document examiners (FDEs). Furthermore, even with modern techniques, obtaining as much information as possible from the limited ...


Digital Forensic Investigations (DFI) using Internet of Things (IoT)

Kritika Dhar; Yogesh Pingle 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

Digital Forensic Investigations is explained as are sponse to an event that has already occurred in relation to information which is highly classified or is of prime importance to a criminal incident. The case is considered when the suspect's electronic gadgets are seized. The related investigation proceeds to search for the traces in the image of the actual evidence. The ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

Blank page

IEEE Transactions on Information Forensics and Security, 2017

This page was intentionally left blank.


Forensic analysis of three social media apps in windows 10

Asma Majeed; Haleemah Zia; Rabeea Imran; Shahzad Saleem 2015 12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET), 2015

Social media facilitates communication and provides easy way of reaching out to people. However, it also poses a risk of disclosure of personal details which, if exploited, can lead to privacy issues and also crimes such as blackmailing, identity theft etc. In this regard, it is essential to study social media from a forensics point of view. In this paper ...


Blank page

IEEE Transactions on Information Forensics and Security, 2017

This page was intentionally left blank.


Offline Signature Verification Based on Bag-of-VisualWords Model Using KAZE Features and Weighting Schemes

Manabu Okawa 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2016

The familiar use of handwritten signatures in various applications (e.g., credit card authentication) increases the need for automated verification methods. However, there is still room for improvement in the performance of automated systems under various writing conditions compared to human beings, especially forensic document examiners (FDEs). Furthermore, even with modern techniques, obtaining as much information as possible from the limited ...


Digital Forensic Investigations (DFI) using Internet of Things (IoT)

Kritika Dhar; Yogesh Pingle 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

Digital Forensic Investigations is explained as are sponse to an event that has already occurred in relation to information which is highly classified or is of prime importance to a criminal incident. The case is considered when the suspect's electronic gadgets are seized. The related investigation proceeds to search for the traces in the image of the actual evidence. The ...


More eLearning Resources

IEEE-USA E-Books

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.

  • Cloud Forensics

    Cloud forensics is a special branch of digital forensics, which is required to establish facts about incidents that are actively or passively related to clouds. However, today's cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forensics tools cannot cope with the dynamic and black-box nature of clouds. This chapter discusses the challenges of cloud forensics, discusses existing techniques to support reliable forensics, and explores the open problems in this area.

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

    Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly large impact on containerization and DevOps, the impact on information assurance (IA) has been incremental. This chapter surveys approaches to leverage Big Data techniques to enhance IoT provenance, which is itself only one of multiple measures needed to improve information assurance. A number of thus far loosely connected approaches are identified and addressed. Systematic use of concept of complex event processing (CEP) can improve on current information assurance practices, especially if its paradigms and design practices are more widely incorporated into IoT architectures. Big Data is changing the nature of work for Chief Security Officers (CSO), auditors, and forensic investigators.

  • OPERATIONAL MANAGEMENT OF SECURITY

    In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third- party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.

  • Image and Video Processing History Recovery

    This chapter describes the most useful traces used for image and video processing history recovery, and the main forensic techniques that are based on them. The important traces are those relying on specific properties of the encoding process. However, coding artifacts are rarely the only trace of processing. Editing operations, like resizing and colour enhancement, are commonly applied to both images and video. First, the chapter introduces the existing approaches used in the forensic literature to reveal the presence of coding and editing artifacts. Then, it explains how to employ such tools to recover several parameters characterizing the processing history. The chapter presents two case studies, showing possible applications of processing history recovery to tamper detection. It shows how the illustrated forensic techniques can be applied in realistic settings to partly recover the processing history, and how this information can provide useful hints about the authenticity of the analysed media.

  • Multimedia Analytics for Image Collection Forensics

    This chapter focuses on techniques suited for forensic analysis of large image collections. In digital forensics an investigator is often tasked to analyze a data source containing large numbers of images and their metadata sometimes reaching into the millions. Apart from the content of the images there is a lot of information present in the metadata. The chapter considers the specifics of datasets and tasks in the forensic field. Two fields underlying multimedia analytics namely multimedia analysis and visual analytics are explained. The principles from those fields provide the basis for describing two-example multimedia analytics systems. The ChronoBrowser is used as a multimedia analytics system developed for forensic analysis. The chapter shows how different visual analytics processes are instantiated within ChronoBrowser. The MediaTable is considered as example of a concept based multimedia analytics system. The chapter presents a scenario to show how multimedia analytics can aid forensic investigators.

  • Front Matter

    The prelims comprise: Half-Title Page Title Page Copyright Page Dedication Page Table of Contents List of Contributors Foreword Preface Acknowledgements

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"