TU Darmstadt / ULB / TUbiblio

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

Katzenbeisser, Stefan and Liu, Huajian and Steinebach, Martin
Li, Chang-Tsun (ed.) (2010):
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Idea Group Reference, pp. 155-175, [Book Section]

Abstract

Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.

Item Type: Book Section
Erschienen: 2010
Editors: Li, Chang-Tsun
Creators: Katzenbeisser, Stefan and Liu, Huajian and Steinebach, Martin
Title: Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Language: German
Abstract:

Multimedia document authentication allows judging the authenticity and integrity of digital documents. Today a variety of such tools exist, which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.

Series Name: Handbook of Research
Publisher: Idea Group Reference
ISBN: 1605668362
Uncontrolled Keywords: Secure Data
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Date Deposited: 30 Dec 2016 20:23
Identification Number: TUD-CS-2010-2385
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item