|
|
xvii | |
Foreword |
|
xix | |
Preface |
|
xxi | |
Acknowledgements |
|
xxvii | |
|
PART ONE MULTIMEDIA EVIDENCE HANDLING |
|
|
|
1 Digital Forensics Laboratories in Operation: How Are Multimedia Data and Devices Handled? |
|
|
3 | (35) |
|
|
3 | (1) |
|
1.2 Digital and Electronics Forensic Service, Metropolitan Police Service, UK |
|
|
4 | (13) |
|
1.2.1 Background: Metropolitan Police Service |
|
|
5 | (1) |
|
1.2.2 Digital and Electronics Forensic Service |
|
|
5 | (1) |
|
1.2.3 AV Lab: Operational and Procedural Aspects |
|
|
6 | (8) |
|
7.2.4 Selected Forensic Techniques Used by AV Lab |
|
|
14 | (3) |
|
|
17 | (1) |
|
1.3 Digital Forensics Team (Including Affiliated AV Team), Surrey Police, UK |
|
|
17 | (6) |
|
1.3.1 Background: Surrey Police |
|
|
17 | (1) |
|
1.3.2 Structure of Surrey Police's Digital Forensics Team and AV Team |
|
|
18 | (1) |
|
1.3.3 Training and Certification |
|
|
19 | (1) |
|
|
19 | (1) |
|
1.3.5 Routine Tasks Involving Multimedia Data and Devices |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
1.3.8 Software and Hardware Tools Used for Handling Multimedia Data |
|
|
21 | (1) |
|
1.3.9 Cases Involving Encryption and Child Pornography |
|
|
22 | (1) |
|
1.3.10 Cases Involving Source Device Identification |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.4 Shanghai Stars Digital Forensic Centre, Third Research Institute of China's Ministry of Public Security |
|
|
23 | (5) |
|
1.4.1 Background: Third Research Institute of China 's Ministry of Public Security |
|
|
23 | (1) |
|
1.4.2 Background: Related Legislations and Regulations |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
1.4.6 Workload and Typical Cases |
|
|
26 | (1) |
|
1.4.7 Software and Hardware Tools Used |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (4) |
|
|
32 | (6) |
|
1.A Appendix: Questionnaires for Interviewing Surrey Police and Shanghai Stars Digital Forensic Centre |
|
|
32 | (2) |
|
|
34 | (4) |
|
2 Standards and Best Practices in Digital and Multimedia Forensics |
|
|
38 | (56) |
|
|
38 | (1) |
|
|
39 | (9) |
|
|
42 | (1) |
|
2.2.2 Other International/Regional Standards and Guides |
|
|
43 | (1) |
|
2.2.3 US Standards and Best Practice Guides |
|
|
43 | (4) |
|
2.2.4 UK Standards and Best Practice Guides |
|
|
47 | (1) |
|
2.3 Electronic Evidence and Digital Forensics |
|
|
48 | (22) |
|
2.3.1 International Standards |
|
|
48 | (4) |
|
|
52 | (2) |
|
2.3.3 Best Practice Guides |
|
|
54 | (1) |
|
|
55 | (11) |
|
|
66 | (4) |
|
2.4 Multimedia Evidence and Multimedia Forensics |
|
|
70 | (7) |
|
2.4.1 ASTM E2825-12 `Standard Guide for Forensic Digital Image Processing' (2012) |
|
|
70 | (1) |
|
2.4.2 US SWGs (Scientific Working Groups) |
|
|
70 | (5) |
|
2.4.3 ENFS1 Working Groups |
|
|
75 | (1) |
|
|
75 | (2) |
|
2.5 Digital Forensics Laboratory Accreditation |
|
|
77 | (2) |
|
2.5.1 International Standards |
|
|
77 | (2) |
|
2.6 General Quality Assurance (Management) |
|
|
79 | (2) |
|
2.6.1 ISO 9001:2008 `Quality Management Systems --Requirements' |
|
|
80 | (1) |
|
2.6.2 ISO/IEC 27001:2005 `Information Security Management Systems -- Requirements' |
|
|
80 | (1) |
|
2.6.3 ISO/IEC 27002:2013 `Code of Practice for Information Security Controls' |
|
|
80 | (1) |
|
2.7 Training, Education and Certification on Digital and Multimedia Forensics |
|
|
81 | (3) |
|
2.7.1 Standards and Best Practice Guides |
|
|
81 | (3) |
|
2.7.2 Certification, Training and Educational Programs |
|
|
84 | (1) |
|
|
84 | (10) |
|
|
86 | (1) |
|
|
86 | (8) |
|
3 A Machine Learning-Based Approach to Digital Triage |
|
|
94 | (39) |
|
|
94 | (2) |
|
|
96 | (1) |
|
3.2 Related Work on Digital Triage |
|
|
96 | (4) |
|
3.2.1 Triage in the Medical Field |
|
|
96 | (1) |
|
3.2.2 Early Digital Triage Models |
|
|
97 | (1) |
|
3.2.3 Machine Learning-Based Digital Triage |
|
|
98 | (2) |
|
3.2.4 Other Multimedia Source Classification Techniques |
|
|
100 | (1) |
|
3.3 A Machine Learning-Based Digital Triage Framework |
|
|
100 | (10) |
|
3.3.1 Machine Learning Terminology |
|
|
101 | (1) |
|
3.3.2 The framework in Detail |
|
|
102 | (1) |
|
3.3.3 Collection-Data Extraction |
|
|
103 | (1) |
|
3.3.4 Processing-Feature Extraction, Dataset Creation and Processing Algorithms |
|
|
104 | (3) |
|
|
107 | (1) |
|
|
107 | (3) |
|
3.4 A Child Pornography Exchange Case Study |
|
|
110 | (18) |
|
3.4.1 Definition of Child Pornography Exchange |
|
|
110 | (1) |
|
3.4.2 Child Pornography Exchange-State Vector |
|
|
111 | (4) |
|
|
115 | (1) |
|
3.4.4 Learning from Available Data |
|
|
116 | (7) |
|
3.4.5 Experiment Setup, Results and Discussion |
|
|
123 | (5) |
|
|
128 | (1) |
|
3.6 Challenges and Future Directions for the Digital Forensics Community |
|
|
128 | (5) |
|
|
130 | (1) |
|
|
130 | (3) |
|
4 Forensic Authentication of Digital Audio and Video Files |
|
|
133 | (52) |
|
|
133 | (1) |
|
4.2 Examination Requests and Submitted Evidence |
|
|
134 | (4) |
|
4.2.1 Examination Requests |
|
|
134 | (1) |
|
|
135 | (1) |
|
4.2.3 Digital Recording Devices |
|
|
136 | (1) |
|
4.2.4 Digital File Formats |
|
|
137 | (1) |
|
|
138 | (1) |
|
4.4 Laboratory Software and Equipment |
|
|
138 | (9) |
|
4.4.1 High-Speed Computers, Computer Peripherals, Media Readers/Writers, Hardware/Software Write Blockers, Professional Headphones, Amplifiers, Cables and Connectors |
|
|
139 | (1) |
|
4.4.2 Proprietary Audio and Video Playback Software |
|
|
140 | (1) |
|
4.4.3 Digital Data Imaging and Analysis Software |
|
|
141 | (1) |
|
4.4.4 High-Resolution Audio Waveform Analysis Software |
|
|
142 | (1) |
|
4.4.5 FFT Analyzers and Software |
|
|
143 | (2) |
|
4.4.6 Spectrographs Analysis Software |
|
|
145 | (1) |
|
4.4.7 Scientific Computing Software |
|
|
146 | (1) |
|
4.4.8 Professional Audio and Non-linear Video Editing and Playback Software |
|
|
146 | (1) |
|
4.4.9 Media Conversion/Transcoding Software |
|
|
147 | (1) |
|
4.4.10 Professional Image Measurement and Processing Software |
|
|
147 | (1) |
|
4.5 Audio/Video Authentication Examinations |
|
|
147 | (24) |
|
4.5.1 Overview of Examinations |
|
|
147 | (3) |
|
4.5.2 Hashing and Imaging |
|
|
150 | (1) |
|
4.5.3 Playback and Conversion Optimization |
|
|
150 | (2) |
|
4.5.4 Dig ital Data Ana lysis |
|
|
152 | (4) |
|
|
156 | (11) |
|
|
167 | (4) |
|
4.6 Preparation of Work Notes and Laboratory Reports |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (4) |
|
4.8.1 Case Example Number 1 |
|
|
173 | (2) |
|
4.8.2 Case Example Number 2 |
|
|
175 | (2) |
|
|
177 | (8) |
|
|
178 | (7) |
|
PART TWO DIGITAL EVIDENCE EXTRACTION |
|
|
|
5 Photogrammetry in Digital Forensics |
|
|
185 | (34) |
|
|
185 | |
|
|
187 | |
|
|
88 | (106) |
|
5.2.1 Projective Geometry or Orthorectification |
|
|
188 | (3) |
|
5.2.2 Space Resection and Multi-image Photogrammetry |
|
|
191 | (1) |
|
|
192 | (2) |
|
5.3 Measurement Uncertainty |
|
|
194 | (1) |
|
5.3.1 Difficulties in Creating Reference Recordings |
|
|
195 | (1) |
|
|
195 | (17) |
|
|
196 | (6) |
|
|
202 | (6) |
|
5.4.3 Determining the Absolute Position of an Object |
|
|
208 | (4) |
|
5.5 3D Modelling/Scenario Testing |
|
|
212 | (5) |
|
|
217 | (2) |
|
|
217 | (2) |
|
6 Advanced Multimedia File Carving |
|
|
219 | (51) |
|
|
219 | (1) |
|
|
220 | (5) |
|
|
221 | (2) |
|
6.2.2 Logical Data Organization |
|
|
223 | (2) |
|
6.2.3 Forensic Data Investigation |
|
|
225 | (1) |
|
6.3 File Carving of Binary Data |
|
|
225 | (1) |
|
6.4 Multimedia Data Structures |
|
|
226 | (6) |
|
|
227 | (2) |
|
|
229 | (2) |
|
|
231 | (1) |
|
6.5 File Carving of Multimedia Data |
|
|
232 | (409) |
|
|
232 | (1) |
|
|
233 | (2) |
|
|
235 | (3) |
|
6.5.4 Special Considerations for Multimedia |
|
|
238 | (403) |
|
6.6 Content Identification |
|
|
641 | |
|
6.6.1 Cryptographic Hashing |
|
|
243 | (2) |
|
|
245 | (1) |
|
|
246 | (5) |
|
6.6.4 Searching and Indexing of Hashes |
|
|
251 | (2) |
|
6.7 File Carving Frameworks |
|
|
253 | (11) |
|
6.7.1 Current Practice and Existing Solutions |
|
|
254 | (1) |
|
6.7.2 Framework Requirements |
|
|
254 | (1) |
|
6.7.3 An Example Framework |
|
|
255 | (7) |
|
|
262 | (2) |
|
|
264 | (6) |
|
|
265 | (1) |
|
|
265 | (5) |
|
7 On Forensic Use of Biometrics |
|
|
270 | (35) |
|
|
270 | (3) |
|
7.2 Biometrics Performance Metrics |
|
|
273 | (1) |
|
7.3 Face: The Natural Means for Human Recognition |
|
|
274 | (9) |
|
7.3.1 Forensic Face Recognition |
|
|
275 | (3) |
|
7.3.2 Automatic Face Recognition Techniques |
|
|
278 | (1) |
|
7.3.3 Challenges and Trends of Face Recognition |
|
|
279 | (3) |
|
|
282 | (1) |
|
7.4 Ears as a Means of Forensic Identification |
|
|
283 | (16) |
|
7.4.1 Earprints in Forensics |
|
|
285 | (5) |
|
7.4.2 From Earprints to Ear Images |
|
|
290 | (4) |
|
7.4.3 Ear Morphology Features |
|
|
294 | (4) |
|
|
298 | (1) |
|
|
299 | (6) |
|
|
299 | (6) |
|
8 Multimedia Analytics for Image Collection Forensics |
|
|
305 | (26) |
|
|
305 | (3) |
|
|
308 | (1) |
|
|
309 | (3) |
|
8.4 Visual Analytics Processes |
|
|
312 | (1) |
|
|
313 | (7) |
|
|
313 | (6) |
|
8.5.2 Visual Analytics Processes |
|
|
319 | (1) |
|
|
320 | (3) |
|
|
320 | (1) |
|
8.6.2 Visual Analytics Processes |
|
|
321 | (2) |
|
|
323 | (2) |
|
|
325 | (6) |
|
|
326 | (5) |
|
PART THREE MULTIMEDIA DEVICE AND SOURCE FORENSICS |
|
|
|
9 Forensic Camera Model Identification |
|
|
331 | (44) |
|
|
331 | (2) |
|
9.2 Forensic Source Identification |
|
|
333 | (4) |
|
9.2.1 Identification Granularity |
|
|
333 | (1) |
|
9.2.2 Intra- and Inter-Class Similarity, Feature Space Representation |
|
|
334 | (1) |
|
9.2.3 Digital Camera Acquisition Characteristics |
|
|
335 | (2) |
|
9.3 Digital Camera Model Identification |
|
|
337 | (2) |
|
9.4 Benchmarking Camera Model Identification Algorithms |
|
|
339 | (2) |
|
9.4.1 A Dataset Template for Camera Model Identification Research |
|
|
339 | (1) |
|
9.4.2 The Dresden linage Database |
|
|
340 | (1) |
|
9.4.3 Benchmarking Procedure |
|
|
341 | (1) |
|
9.5 Model-Specific Characteristics of Digital Camera Components |
|
|
341 | (10) |
|
9.5.1 Compression Parameters, Metadata and File Format |
|
|
341 | (1) |
|
|
342 | (4) |
|
9.5.3 CFA and Demosaicing |
|
|
346 | (3) |
|
9.5.4 Camera Response Function |
|
|
349 | (1) |
|
9.5.5 Summary and Limitations |
|
|
350 | (1) |
|
9.6 Black Box Camera Model Identification |
|
|
351 | (13) |
|
9.6.1 General-Purpose Image Descriptors |
|
|
352 | (3) |
|
9.6.2 Dresden Image Database Case Study: Closed-Set Camera Model Identification |
|
|
355 | (7) |
|
|
362 | (2) |
|
9.7 Camera Model Identification in Open Sets |
|
|
364 | (2) |
|
9.7.1 Dresden Image Database Case Study: One-Class SVM |
|
|
364 | (1) |
|
9.7.2 Summary and Outlook |
|
|
365 | (1) |
|
9.8 Model-Specific Characteristics in Device-Level Identification |
|
|
366 | (2) |
|
9.9 Open Challenges Towards Practical Applications |
|
|
368 | (7) |
|
|
370 | (5) |
|
10 Printer and Scanner Forensics |
|
|
375 | (36) |
|
|
375 | (4) |
|
10.1.1 Comparison with Digital Image Forensics |
|
|
377 | (1) |
|
10.1.2 Document Lifecycle |
|
|
378 | (1) |
|
|
379 | (7) |
|
10.2.1 Working Principles of Laser Printers and Inkjet Printers |
|
|
379 | (1) |
|
10.2.2 Flowchart of Printer Forensics |
|
|
380 | (1) |
|
10.2.3 Laser Printer Forensics |
|
|
381 | (4) |
|
10.2.4 Inkjet Printer Forensics |
|
|
385 | (1) |
|
|
386 | (3) |
|
10.3.1 Flowchart of Scanner Forensics |
|
|
387 | (1) |
|
|
387 | (1) |
|
10.3.3 Dust and Scratches |
|
|
388 | (1) |
|
10.4 Photocopier Identification |
|
|
389 | (2) |
|
10.4.1 Contact between Printer and photocopier |
|
|
389 | (1) |
|
10.4.2 Character Signature |
|
|
390 | (1) |
|
10.5 Forgery Detection for Printed and Scanned Documents |
|
|
391 | (5) |
|
10.5.1 Flowchart of Forgery Detection |
|
|
392 | (1) |
|
10.5.2 Forgery Detection for Printed Documents |
|
|
393 | (2) |
|
10.5.3 Forgery Detection for Scanned Documents |
|
|
395 | (1) |
|
10.6 Sample Algorithms with Case Studies |
|
|
396 | (10) |
|
10.6.1 Printer Identification |
|
|
396 | (4) |
|
10.6.2 Scanner Identification |
|
|
400 | (3) |
|
10.6.3 Document Forgery Detection |
|
|
403 | (3) |
|
10.7 Open Problems and Challenges |
|
|
406 | (2) |
|
|
408 | (3) |
|
|
408 | (1) |
|
|
408 | (3) |
|
|
411 | (31) |
|
|
411 | (3) |
|
11.2 Pattern Recognition for Microphone Forensics |
|
|
414 | (7) |
|
11.2.1 Pattern Recognition and Its Sub-Disciplines |
|
|
414 | (2) |
|
11.2.2 State-of-the-Art in Pattern Recognition-Based Microphone Forensics |
|
|
416 | (5) |
|
11.3 Guidelines for Microphone Registration |
|
|
421 | (2) |
|
|
423 | (12) |
|
11.4.1 Investigation Tasks |
|
|
423 | (2) |
|
11.4.2 Implementation of the Statistical Pattern Recognition Pipeline |
|
|
425 | (2) |
|
|
427 | (2) |
|
11.4.4 Evaluation Results |
|
|
429 | (6) |
|
|
435 | (7) |
|
|
436 | (1) |
|
|
437 | (5) |
|
12 Forensic Identification of Printed Documents |
|
|
442 | (41) |
|
|
442 | (7) |
|
12.1.1 Hardware Considerations |
|
|
444 | (2) |
|
12.1.2 Performance Characterization |
|
|
446 | (3) |
|
|
449 | (1) |
|
|
450 | (5) |
|
|
450 | (1) |
|
|
451 | (1) |
|
12.3.3 Substrate Scanning |
|
|
452 | (1) |
|
|
452 | (3) |
|
12.3.5 Practical Considerations |
|
|
455 | (1) |
|
|
455 | (18) |
|
12.4.1 Authenticating Printed Glyphs |
|
|
457 | (2) |
|
12.4.2 Model-Based Authentication |
|
|
459 | (6) |
|
12.4.3 Authenticating Printed Halftones |
|
|
465 | (6) |
|
12.4.4 Authenticating Data-Bearing Halftones |
|
|
471 | (2) |
|
12.5 Real World Example: Currency Protection |
|
|
473 | (2) |
|
12.6 Summary and Ecosystem Considerations |
|
|
475 | (8) |
|
|
478 | (5) |
|
PART FOUR MULTIMEDIA CONTENT FORENSICS |
|
|
|
13 Digital Image Forensics with Statistical Analysis |
|
|
483 | (39) |
|
|
483 | (5) |
|
13.1.1 Digital Image Forensics |
|
|
483 | (1) |
|
|
484 | (4) |
|
13.2 Detecting Region Duplication |
|
|
488 | (12) |
|
13.2.1 Problem Definition |
|
|
488 | (1) |
|
|
489 | (2) |
|
|
491 | (4) |
|
13.2.4 Performance Analysis |
|
|
495 | (5) |
|
13.3 Exposing Splicing Forgery |
|
|
500 | (8) |
|
13.5.1 Problem Definition |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
503 | (3) |
|
13.3.4 Performance Analysis |
|
|
506 | (2) |
|
|
508 | (4) |
|
13.4.1 Region Duplication Forgeries |
|
|
508 | (2) |
|
13.4.2 Splicing Forgeries |
|
|
510 | (2) |
|
|
512 | (3) |
|
13.5.1 Detecting Audio Splicing |
|
|
512 | (2) |
|
13.5.2 Exposing Video Forgery |
|
|
514 | (1) |
|
|
515 | (7) |
|
|
517 | (5) |
|
14 Camera-Based Image Forgery Detection |
|
|
522 | (50) |
|
|
522 | (2) |
|
|
524 | (11) |
|
|
524 | (6) |
|
|
530 | (3) |
|
14.2.3 Image Processing Pipeline |
|
|
533 | (2) |
|
14.3 Camera-Based Forgery Detection Methods |
|
|
535 | (13) |
|
14.3.1 Optics-Based Forgery Detection |
|
|
536 | (1) |
|
14.3.2 Sensors-Based Forgery Detection |
|
|
537 | (1) |
|
14.3.3 Image Processing Pipeline-Based Forgery Detection |
|
|
538 | (10) |
|
14.4 Forgery Detection Based on PFA: A Case Study |
|
|
548 | (16) |
|
14.4.1 Forgery Detection Based on PFA |
|
|
549 | (2) |
|
|
551 | (6) |
|
|
557 | (5) |
|
|
562 | (2) |
|
|
564 | (8) |
|
|
565 | (7) |
|
15 Image and Video Processing History Recovery |
|
|
572 | (40) |
|
|
572 | (1) |
|
|
573 | (13) |
|
|
574 | (3) |
|
15.2.2 Double JPEG Compression |
|
|
577 | (6) |
|
|
583 | (2) |
|
|
585 | (1) |
|
|
586 | (4) |
|
|
587 | (2) |
|
|
589 | (1) |
|
15.4 Estimation of Processing Parameters |
|
|
590 | (11) |
|
15.4.1 Estimation of Coding Parameters |
|
|
590 | (5) |
|
15.4.2 Estimation of Editing Parameters |
|
|
595 | (3) |
|
15.4.3 Artefact Localization |
|
|
598 | (3) |
|
|
601 | (4) |
|
15.5.1 Localization of Forgeries in JPEG Images |
|
|
601 | (2) |
|
15.5.2 Localization of Forgeries in MPEG-2 Videos |
|
|
603 | (2) |
|
|
605 | (7) |
|
|
607 | (5) |
|
16 Anti-Forensics of Multimedia Data and Countermeasures |
|
|
612 | (41) |
|
|
612 | (1) |
|
16.2 Anti-forensic Approaches Proposed in the Literature |
|
|
613 | (10) |
|
16.2.1 Anti-forensics of Acquisition Fingerprints |
|
|
614 | (3) |
|
16.2.2 Anti-forensic oj Compression Fingerprints |
|
|
617 | (2) |
|
16.2.3 Anti-forensic of Editing Fingerprints |
|
|
619 | (4) |
|
16.3 Case Study: JPEG Image Forensics |
|
|
623 | (21) |
|
16.3.1 JPEG Compression and JPEG Compression Footprints |
|
|
623 | (2) |
|
16.3.2 JPEG Compression Anti-forensics |
|
|
625 | (1) |
|
16.3.3 Analysis of Anti forensic Dithering |
|
|
626 | (7) |
|
16.3.4 Countering JPEG Compression Anti-forensics |
|
|
633 | (11) |
|
16.4 Trade-off between Forensics and Anti-forensics |
|
|
644 | (3) |
|
16.4.1 Performance Analysis of Anti-forensics |
|
|
644 | (1) |
|
16.4.2 Interplay between Forger and Forensic Analyst Using Game Theory |
|
|
645 | (2) |
|
|
647 | (6) |
|
|
647 | (6) |
Index |
|
653 | |