Identity authentication based on keystroke latencies
Communications of the ACM
Digital Evidence and Computer Crime
Digital Evidence and Computer Crime
Standardizing digital evidence storage
Communications of the ACM - Next-generation cyber forensics
Exposing digital forgeries through chromatic aberration
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Exposing digital forgeries in video by detecting duplication
Proceedings of the 9th workshop on Multimedia & security
Can we trust digital image forensics?
Proceedings of the 15th international conference on Multimedia
Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue
Proceedings of the 10th ACM workshop on Multimedia and security
Overwriting Hard Drive Data: The Great Wiping Controversy
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
An improved clock-skew measurement technique for revealing hidden services
SS'08 Proceedings of the 17th conference on Security symposium
An Epistemological Approach to Steganography
Information Hiding
Feature-Based Camera Model Identification Works in Practice
Information Hiding
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Exposing Digital Forgeries in Complex Lighting Environments
IEEE Transactions on Information Forensics and Security - Part 1
Digital camera identification from sensor pattern noise
IEEE Transactions on Information Forensics and Security
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
IEEE Transactions on Information Forensics and Security
Determining Image Origin and Integrity Using Sensor Noise
IEEE Transactions on Information Forensics and Security
Hiding Traces of Resampling in Digital Images
IEEE Transactions on Information Forensics and Security
Classification of digital camera-models based on demosaicing artifacts
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A survey of forensic characterization methods for physical devices
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Linear row and column predictors for the analysis of resized images
Proceedings of the 12th ACM workshop on Multimedia and security
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Hi-index | 0.00 |
The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator's view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.