Muutke küpsiste eelistusi

E-raamat: Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan, November 11-12, 2010, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Computational Forensics, IWCF 2010, held in Tokyo, Japan in November 2010.

The 16 revised full papers presented together with two invited keynote papers were carefully selected during two rounds of reviewing and revision. The papers cover a wide range of current topics in computational forensics including authentication, biometrics, document analysis, multimedia, forensic tool evaluation, character recognition, and forensic verification.
Invited Talks
Gestalt Aspects of Security Patterns
1(12)
Mario Koppen
Physical Security Technologies at Hitachi
13(18)
Minora Sakairi
Session 1 Authentication
Exploiting Character Class Information in Forensic Writer Identification
31(12)
Fernando Alonso-Fernandez
Julian Fierrez
Javier Galbally
Javier Ortega-Garcia
Toward Forensics by Stroke Order Variation --- Performance Evaluation of Stroke Correspondence Methods
43(13)
Wenjie Cai
Seiichi Uchida
Hiroaki Sakoe
A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic Representation
56(12)
Xiaoyang Wang
Youbin Chen
Session 2 Biometrics 1
Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing Method
68(10)
Ryuichi Yanagisawa
Shinichiro Omachi
Cancellable Face Biometrics System by Combining Independent Component Analysis Coefficients
78(10)
Min Yi Jeong
Andrew Beng Jin Teoh
Footwear Print Retrieval System for Real Crime Scene Marks
88(13)
Yi Tang
Sargur N. Srihari
Harish Kasiviswanathan
Jason J. Corso
Session 3 Documents
Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral Analysis
101(13)
Yoshinori Akao
Atsushi Yamamoto
Yoshiyasu Hiyashikawa
Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diode (NIR LED) and Shape from Shading
114(12)
Takeshi Fumkawa
Session 4 Multimedia
Similar Partial Copy Detection of Line Drawings Using a Cascade Classifier and Feature Matching
126(12)
Weihan Sun
Koichi Kise
Detection of Malicious Applications on Android OS
138(12)
Francesco Di Cerbo
Andrea Girardello
Florian Michahelles
Svetlana Voronkova
JPEG Quantization Tables Forensics: A Statistical Approach
150(10)
Babak Mahdian
Stanislav Saic
Radim Nedbal
Session 5 Biometrics2
Discovering Correspondences between Fingerprints Based on the Temporal Dynamics of Eye Movements from Experts
160(13)
Chen Yu
Thomas Busey
John Vanderkolk
Latent Fingerprint Rarity Analysis in Madrid Bombing Case
173(12)
Chang Su
Sargur N. Srihari
Fingerprint Directional Image Enhancement
185(8)
Lukasz Wieclaw
Session 6 Evaluation
What Kind of Strategies Does a Document Examiner Take in Handwriting Identification?
193(7)
Yoko Seki
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data
200(13)
York Yannikos
Frederik Franke
Christian Winter
Markus Schneider
Author Index 213