Forensics in Telecommunications, Information and Multimedia

Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

  • Matthew Sorell
Conference proceedings e-Forensics 2009

Table of contents

  1. Front Matter
  2. A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network

    1. Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia
      Pages 1-9
    2. Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri
      Pages 19-28
    3. Niall McGrath, Pavel Gladyshev, Tahar Kechadi, Joe Carthy
      Pages 29-35
    4. Benjamin Turnbull, Grant Osborne, Matthew Simon
      Pages 36-41
    5. M. L. Dennis Wong, Antionette W. -T. Goh, Hong Siang Chua
      Pages 42-53
    6. Lei Pan, Lynn M. Batten
      Pages 54-64
    7. Kosta Haltis, Lee Andersson, Matthew Sorell, Russell Brinkworth
      Pages 65-76
    8. Sriram Raghavan, Andrew Clark, George Mohay
      Pages 83-94
    9. Roberto Caldelli, Irene Amerini, Francesco Picchioni
      Pages 95-101
    10. Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff
      Pages 102-115
    11. Trupti Shiralkar, Michael Lavine, Benjamin Turnbull
      Pages 116-121
    12. Wang Xue-Guang, Chai Zhen-Chuan
      Pages 122-129
    13. Simon Knight, Simon Moschou, Matthew Sorell
      Pages 130-141
    14. Timothy Neville, Matthew Sorell
      Pages 142-152
    15. Heum Park, SunHo Cho, Hyuk-Chul Kwon
      Pages 160-165

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.

The focus of this year's conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance.

Keywords

authentication biometrics cryptanalysis digital evidence encryption forensic analysis forensic photography forensics identity image encryption mp3 p2p privacy security watermarking

Editors and affiliations

  • Matthew Sorell
    • 1
  1. 1.School of Electrical and Electronic EngineeringUniversity of AdelaideAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-02312-5
  • Copyright Information ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02311-8
  • Online ISBN 978-3-642-02312-5
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • About this book
Industry Sectors
Aerospace