A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network / Fariborz Mahmoudi ; Mohsen Mirzashaeri ; Ehsan Shahamatnia ; Saed Faridnia |
Forensics for Detecting P2P Network Originated MP3 Files on the User Device / Heikki Kokkinen ; Janne Nöyränen |
Image Encryption Using Chaotic Signal and Max-Heap Tree / Rasul Enayatifar |
Investigating Encrypted Material / Niall McGrath ; Pavel Gladyshev ; Tahar Kechadi ; Joe Carthy |
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source / Benjamin Turabull ; Grant Osborne ; Matthew Simon |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt / M.L. Dennis Wong ; Antionette W.-T. Goh ; Hong Siang Chua |
Robust Correctness Testing for Digital Forensic Tools / Lei Pan ; Lynn M. Batten |
Surveillance Applications of Biologically-Inspired Smart Cameras / Kosta Haltis ; Lee Andersson ; Matthew Sorell ; Russell Brinkworth |
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems / Jill Slay ; Elena Sitnikova |
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence / Sriram Raghavan ; Andrew Clark ; George Mohay |
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis / Roberto Caldelli ; Irene Amerini ; Francesco Picchioni |
Developing Speaker Recognition System: From Prototype to Practical Application / Pasi Fränti ; Juhani Saastamoinen ; Ismo Kärkkäinen ; Tomi Kinnunen ; Ville Hautamäki ; Ilja Sidoroff |
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC / Trupti Shiralkar ; Michael Lavine ; Benjamin Turnbull |
A Provable Security Scheme of ID-Based Threshold Decryption / Wang Xue-Guang ; Choi Zhen-Chuan |
Analysis of Sensor Photo Response Non-Uniformity in RAW Images / Simon Knight ; Simon Moschou |
Audit Log for Forensic Photography / Timothy Neville |
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking / Chang-Tsun Li ; Yue Li |
Cyber Forensics Ontology for Cyber Criminal Investigation / Heum Park ; SunHo Gho ; Hyuk-Chul Kwon |
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis |
Detection of Block Artifacts for Digital Forensic Analysis |
Vocal Forgery in Forensic Sciences / Patrick Perrot ; Mathieu Morel ; Joseph Razik ; Gérard Chollet |
International Workshop on e-Forensics Law |
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights / Milton H. Luoma ; Vicki M. Luoma |
Digital Identity - The Legal Person? / Clare Sullivan |
Surveillance and Datenschutz in Virtual Environments / Sabine Cikic ; Fritz Lehmann-Grube ; Jan Sablatnig |
Author Index |
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network / Fariborz Mahmoudi ; Mohsen Mirzashaeri ; Ehsan Shahamatnia ; Saed Faridnia |
Forensics for Detecting P2P Network Originated MP3 Files on the User Device / Heikki Kokkinen ; Janne Nöyränen |
Image Encryption Using Chaotic Signal and Max-Heap Tree / Rasul Enayatifar |
Investigating Encrypted Material / Niall McGrath ; Pavel Gladyshev ; Tahar Kechadi ; Joe Carthy |
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source / Benjamin Turabull ; Grant Osborne ; Matthew Simon |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt / M.L. Dennis Wong ; Antionette W.-T. Goh ; Hong Siang Chua |