Abstract is missing.
- A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural NetworkFariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia. 1-9 [doi]
- Forensics for Detecting P2P Network Originated MP3 Files on the User DeviceHeikki Kokkinen, Janne Nöyränen. 10-18 [doi]
- Image Encryption Using Chaotic Signal and Max-Heap TreeFariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri. 19-28 [doi]
- Investigating Encrypted MaterialNiall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy. 29-35 [doi]
- Legal and Technical Implications of Collecting Wireless Data as an Evidence SourceBenjamin Turnbull, Grant Osborne, Matthew Simon. 36-41 [doi]
- Medical Image Authentication Using DPT Watermarking: A Preliminary AttemptM. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua. 42-53 [doi]
- Robust Correctness Testing for Digital Forensic ToolsLei Pan, Lynn Margaret Batten. 54-64 [doi]
- Surveillance Applications of Biologically-Inspired Smart CamerasKosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth. 65-76 [doi]
- The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control SystemsJill Slay, Elena Sitnikova. 77-82 [doi]
- FIA: An Open Forensic Integration Architecture for Composing Digital EvidenceSriram Raghavan, Andrew Clark, George M. Mohay. 83-94 [doi]
- Distinguishing between Camera and Scanned Images by Means of Frequency AnalysisRoberto Caldelli, Irene Amerini, Francesco Picchioni. 95-101 [doi]
- Developing Speaker Recognition System: From Prototype to Practical ApplicationPasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff. 102-115 [doi]
- A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PCTrupti Shiralkar, Michael Lavine, Benjamin Turnbull. 116-121 [doi]
- A Provable Security Scheme of ID-Based Threshold DecryptionXue-Guang Wang, Zhen-Chuan Chai. 122-129 [doi]
- Analysis of Sensor Photo Response Non-Uniformity in RAW ImagesSimon Knight, Simon Moschou, Matthew Sorell. 130-141 [doi]
- Audit Log for Forensic PhotographyTimothy Neville, Matthew Sorell. 142-152 [doi]
- Authenticating Medical Images through Repetitive Index Modulation Based WatermarkingChang-Tsun Li, Yue Li. 153-159 [doi]
- Cyber Forensics Ontology for Cyber Criminal InvestigationHeum Park, SunHo Cho, Hyuk-Chul Kwon. 160-165 [doi]
- Decomposed Photo Response Non-Uniformity for Digital Forensic AnalysisYue Li, Chang-Tsun Li. 166-172 [doi]
- Detection of Block Artifacts for Digital Forensic AnalysisChang-Tsun Li. 173-178 [doi]
- Vocal Forgery in Forensic SciencesPatrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet. 179-185 [doi]
- Complying across Continents: At the Intersection of Litigation Rights and Privacy RightsMilton H. Luoma, Vicki Miller Luoma. 186-194 [doi]
- Digital Identity - The Legal Person?Clare Sullivan. 195-211 [doi]
- Surveillance and Datenschutz in Virtual EnvironmentsSabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig. 212-219 [doi]