Conferences related to Digital Forensics

Back to Top

2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Conference on Multimedia and Expo (ICME)

Multimedia technologies, systems and applications for both research and development of communications, circuits and systems, computer, and signal processing communities.

  • 2019 IEEE International Conference on Multimedia and Expo (ICME)

    speech, audio, image, video, text and new sensor signal processingsignal processing for media integration3D imaging, visualization and animationvirtual reality and augmented realitymulti-modal multimedia computing systems and human-machine interactionmultimedia communications and networkingmedia content analysis and searchmultimedia quality assessmentmultimedia security and content protectionmultimedia applications and servicesmultimedia standards and related issues

  • 2018 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities. ICME also features an Exposition of multimedia products and prototypes.

  • 2017 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to: – Speech, audio, image, video, text and new sensor signal processing – Signal processing for media integration – 3D visualization and animation – 3D imaging and 3DTV – Virtual reality and augmented reality – Multi-modal multimedia computing systems and human-machine interaction – Multimedia communications and networking – Media content analysis – Multimedia quality assessment – Multimedia security and content protection – Multimedia databases and digital libraries – Multimedia applications and services – Multimedia standards and related issues

  • 2016 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to:- Speech, audio, image, video, text and new sensor signal processing- Signal processing for media integration- 3D visualization and animation- 3D imaging and 3DTV- Virtual reality and augmented reality- Multi-modal multimedia computing systems and human-machine interaction- Multimedia communications and networking- Media content analysis- Multimedia quality assessment- Multimedia security and content protection- Multimedia databases and digital libraries- Multimedia applications and services- Multimedia standards and related issues

  • 2015 IEEE International Conference on Multimedia and Expo (ICME)

    With around 1000 submissions and 500 participants each year, the IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2014 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications. In 2014, an Exposition of multimedia products, prototypes and animations will be held in conjunction with the conference.Topics of interest include, but are not limited to:

  • 2013 IEEE International Conference on Multimedia and Expo (ICME)

    To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2008 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2007 IEEE International Conference on Multimedia and Expo (ICME)

  • 2006 IEEE International Conference on Multimedia and Expo (ICME)

  • 2005 IEEE International Conference on Multimedia and Expo (ICME)

  • 2004 IEEE International Conference on Multimedia and Expo (ICME)

  • 2003 IEEE International Conference on Multimedia and Expo (ICME)

  • 2002 IEEE International Conference on Multimedia and Expo (ICME)

  • 2001 IEEE International Conference on Multimedia and Expo (ICME)

  • 2000 IEEE International Conference on Multimedia and Expo (ICME)


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Digital Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Engineering Management Review, IEEE

Reprints articles from other publications of significant interest to members. The papers are aimed at those engaged in managing research, development, or engineering activities. Reprints make it possible for the readers to receive the best of today's literature without having to subscribe to and read other periodicals.


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


More Periodicals

Most published Xplore authors for Digital Forensics

Back to Top

Xplore Articles related to Digital Forensics

Back to Top

The importance of standardization in biometric data for digital forensics

2017 International Conference on Computer Science and Engineering (UBMK), 2017

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person ...


Analysis of mobile phones in digital forensics

2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017

Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether ...


Face to Iris Area Ratio as a feature for children detection in digital forensics applications

2016 Digital Media Industry & Academic Forum (DMIAF), 2016

This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This ...


DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations

2014 IEEE Security and Privacy Workshops, 2014

The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases. Increasingly there is a requirement from the various legal and judicial authorities throughout the world, that any digital evidence presented in criminal and civil cases should meet requirements regarding the acceptance and ...


A Study of Cost Structure Visualization for Digital Forensics Deployment

2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence, 2015

Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated. However, digital forensics ...


More Xplore Articles

Educational Resources on Digital Forensics

Back to Top

IEEE-USA E-Books

  • The importance of standardization in biometric data for digital forensics

    Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.

  • Analysis of mobile phones in digital forensics

    Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.

  • Face to Iris Area Ratio as a feature for children detection in digital forensics applications

    This paper presents a new geometrical feature based on iris geometry for automatic children detection in digital images. The proposed feature is based on simple geometrical measures of face elements and especially iris. Iris outer boundary is approximated as a circle and the proposed feature is defined using the iris area and the distance of iris from mouth line. This approach is compared with two similar geometrical features. Experimental results show the superiority of the proposed feature over the existing ones. The proposed feature is more robust compared to the existing features that use geometrical information from human faces and gives better classification results, useful to digital forensics applications.

  • DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations

    The field of digital forensics has emerged as one of the fastest changing and most rapidly developing investigative specialisations in a wide range of criminal and civil cases. Increasingly there is a requirement from the various legal and judicial authorities throughout the world, that any digital evidence presented in criminal and civil cases should meet requirements regarding the acceptance and admissibility of digital evidence, e.g., Daubert or Frye in the US. There is also increasing expectation that digital forensics labs are accredited to ISO 17025 or the US equivalent ASCLD-Lab International requirements. On the one hand, these standards cover general requirements and are not geared specifically towards digital forensics. On the other hand, digital forensics labs are mostly left with costly piece-meal efforts in order to try and address such pressing legal and regulatory requirements. In this paper, we address these issues by proposing DF-C<sup>2</sup>M<sup>2</sup>, a capability maturity model that enables organisations to evaluate the maturity of their digital forensics capabilities and identify roadmaps for improving it in accordance with business or regulatory requirements. The model has been developed through consultations and interviews with digital forensics experts. The model has been evaluated by using it to assess the digital forensics capability maturity of a lab in a law enforcement agency.

  • A Study of Cost Structure Visualization for Digital Forensics Deployment

    Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated. However, digital forensics technology has not spread widely due to problems such as its high cost structure. In addition, this cost structure has not been fully analyzed yet. Therefore, in this study, the cost structure of digital forensics is quantified with the Work Breakdown Method (WBS), which is a project management method. First, literature about digital forensics was studied, and components were extracted. Next, a digital forensic cost structure was calculated with the WBS method. The cost structure of digital forensics can be divided roughly into system, operation, and facility. The results of the WBS clearly show that digital forensics requires many costs for practical use. As a result, the study can contribute to helping the manager of a company decide whether to introduce digital forensics or not.

  • Towards a Built-In Digital Forensics-Aware Framework for Web Services

    In this paper, we consider digital forensics in the context of Web services based infrastructures. We propose a built in forensics aware framework called (Fi4SOA). Fi4SOA uses Sherwood Applied Business Security (SABSA) methodology to merge forensics properties with business requirements at service design phase, and a reasoning machine over a new proposed ontology to define forensics properties and monitor forensics events at run time phase.

  • Requirements-driven adaptive digital forensics

    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, and provide immediate investigative suggestions before an investigation starts. These activities adapt depending on suspicious events, which in turn might require the collection and analysis of additional evidence. The reactive activities of a traditional digital forensics process are also adapted depending on the investigation findings.

  • Proactive Digital Forensics: The Ever-Increasing Need for Standardization

    Proactive digital forensics is a phase within the digital forensics lifecycle that deals with pre-incident preparation. Despite the increasing research on the pre-incident side of forensic investigations, little steps have been taken towards standardizing and regulating the process. This paper expresses the need for the standardization of the proactive forensics domain and argues that the first step towards the realization of a unified standard is the identification and evaluation of current proactive initiatives.

  • Digital forensics random access memory using live technique based on network attacked

    The development of information and communication technologies are increasing rapidly. The security of data processed and stored also must be prepared in higher security. One of the techniques in data security is digital forensics. Digital forensics is an investigative technique to identify or collect the information on a digital storage as evidence to expose crimes legally defensible. However, in this research we use a live forensics digital technique. Investigations using live forensics technique requires special handling because the volatile data in Random Access Memory which can be lost if the system is in off investigation. This investigation conducted on the system by dump memory investigator to the system which has been attacked and then transferred the file on system investigator. We investigate the data inside the RAM and make analysis about the accuracy using several cyber attacks like session hijacking, FTP attack, and illegal access. The result shows that all the attacks can be investigated and produced the evidence which is authentic, reliable, and defensible.

  • Trustworthy Digital Forensics in the Cloud

    Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics.



Standards related to Digital Forensics

Back to Top

No standards are currently tagged "Digital Forensics"


Jobs related to Digital Forensics

Back to Top