TU Darmstadt / ULB / TUbiblio

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Hrsg.: Li, Chang-Tsun (2010)
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Buchkapitel, Bibliographie

Kurzbeschreibung (Abstract)

Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.

Typ des Eintrags: Buchkapitel
Erschienen: 2010
Herausgeber: Li, Chang-Tsun
Autor(en): Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Art des Eintrags: Bibliographie
Titel: Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Sprache: Deutsch
Publikationsjahr: September 2010
Verlag: Idea Group Reference
Reihe: Handbook of Research
Kurzbeschreibung (Abstract):

Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.

Freie Schlagworte: Secure Data
ID-Nummer: TUD-CS-2010-2385
Fachbereich(e)/-gebiet(e): LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Hinterlegungsdatum: 30 Dez 2016 20:23
Letzte Änderung: 17 Mai 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen