Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2037252.2037254acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy

Published: 29 September 2011 Publication History

Abstract

Traditional forensic disciplines get increasingly digitized. This allows for new investigations and often provides more details for each trace. Due to this digitalization, digital and digitized forensic disciplines have very similar courses of action and requirements. Therefore, we introduce a generic process model, which can be easily adapted for different purposes. Here, we show an exemplary study for the digital dactyloscopy as part of digitized forensics. The digitalization effort can potentially allow for different investigations of the very same trace, is possible because the original trace is acquired non-destructively.

References

[1]
M. Barrett, A. Tajbakhsh, and G. Warren. Portable forensic ballistics examination instrument: Advanced ballistics analysis system (alias). AFTE Journal, 43(1):74--78, 2011.
[2]
M. Bishop. Computer Security: Art and Science. Addison-Wesley, 2003. ISBN: 0--2014--4099--7.
[3]
B. Carrier. Open source digital forensics tools, the legal argument. @stake Research Report, 2002. {Online}. Available: http://www.digital-evidence.org/papers/opensrc_legal.pdf.
[4]
B. Carrier and E. H. Spafford. Getting physical with the digital investigation process. IJDE, 2(2):1--20, 2003.
[5]
N. J. Crane, E. G. Bartick, R. S. Perlman, and S. Huffman. Infrared spectroscopic imaging for noninvasive detection of latent fingerprints. J FORENSIC SCI, 52(1):48--53, 2007.
[6]
CrimTrac. Fingerprint analysis - the basics. 2011. {Online}. Available: http://www.crimtrac.gov.au/systems_projects/FingerprintAnalysis-TheBasics.html.
[7]
L. Dixon and B. Gill. Changes in the Standards for Admitting Expert Evidence in Federal Civil Cases Since the Daubert Decision. RAND Institute for Civil Justice, 2001. ISBN: 0--8330--3088--4.
[8]
Federal Evidence Review. Fingerprint expert testimony satisfied daubert reliability factors. 2009. {Online}. Available: http://federalevidence.com/blog/2009/january/fingerprint-expert-testimony-%satisfied-daubert-reliability-factors.
[9]
Federal Evidence Review. Federal Rules of Evidence, 2011. {Online} Available: http://federalevidence.com/downloads/rules.of.evidence.pdf.
[10]
S. L. Garfinkel. Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools. IJDCF, 1(1):1--28, 2009.
[11]
V. Gruhn and R. Laue. A heuristic method for business process model evaluation. In CIAO! 2009 and EOMAS 2009, LNBIP 34.
[12]
M. Hayakawa, S. Yamamoto, H. Motani, D. Yajima, Y. Sato, and H. Iwase. Does imaging technology overcome problems of conventional postmortem examination? INT J LEGAL MED, 120:24--26, 2006.
[13]
M. Hildebrandt, S. Kiltz, and J. Dittmann. A common scheme for evaluation of forensic software. In Proceedings of the 6th International Conference on IT Security Incident Management and IT Forensics, pages 92--106, 2011.
[14]
A. Jain, Y. Chen, and M. Demirkus. Pores and ridges: Fingerprint matching using level 3 features. Pattern Recognition, International Conference on, 4:477--480, 2006.
[15]
A. K. Jain, J. Feng, A. Nagar, and K. Nandakumar. On matching latent fingerprints. In Computer Vision and Pattern Recognition Workshops, 2008. IEEE Computer Society Conference on, pages 1 -- 8, 2008.
[16]
L. Janczewski and A. Colarik. Cyber Warfare and Cyber Terrorism. Idea Group, 2007. ISBN: 978--1591409915.
[17]
Japan Electronics and Information Technology Industries Association (JEITA). Exchangeable image file format for digital still cameras: Exif Version 2.2. 2002. {Online}. Available: http://www.exif.org/Exif2--2.PDF.
[18]
S. Kiltz, T. Hoppe, J. Dittmann, and C. Vielhauer. Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. In S. Fischer, E. Maehle, and R. Reischuk, editors, Proceedings of Informatik2009 - Digitale Multimedia-Forensik, pages 1619--1633, 2009.
[19]
S. Kiltz, M. Leich, J. Dittmann, C. Vielhauer, and M. Ulrich. Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (cwl). In Proc. SPIE 7881, 78810G, 2011.
[20]
S.-S. Lin, K. M. Yemelyanov, E. N. P. Jr., and N. Engheta. Polarization- and specular-reflection-based, non-contact latent fingerprint imaging and lifting. J OPT SOC AM A, 23(9):2137--2153, 2006.
[21]
M. Pollitt. An ad hoc review of digital forensic models. In Systematic Approaches to Digital Forensic Engineering, Second International Workshop on, pages 43 --54, 2007.
[22]
M. Pollitt. Applying traditional forensic taxonomy to digital forensics. In I. Ray and S. Shenoi, editors, Advances in Digital Forensics IV, volume 285 of IFIP, pages 17--26. Springer Boston, 2008.
[23]
Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST). Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent). 2010. {Online}. Available: http://www.swgfast.org/documents/documentation/100310_Standard_Doumentation_ACE-V_1.0.pdf.
[24]
U.S. District Court - Southern District of Indiana. United States v. Havvard. 2000. {Online}. Available: http://federalevidence.com/pdf/2009/01-Jan/US_v._Havvard.pdf.
[25]
C. Vielhauer. Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Springer, New York, 2006. ISBN: 978-0387261942.
[26]
K. Yen, K.-O. Lövblad, E. Scheurer, C. Ozdoba, M. J. Thali, E. Aghayev, C. Jackowski, J. Anon, N. Frickey, K. Zwygart, J. Weis, and R. Dirnhofer. Post-mortem forensic neuroimaging: Correlation of MSCT and MRI findings with autopsy results. FORENSIC SCI INT, 173(1):21 -- 35, 2007.

Cited By

View all
  • (2021)Non-contact Technologies and Digital Approaches to (Latent) Fingermark Aging StudiesTechnologies for Fingermark Age Estimations: A Step Forward10.1007/978-3-030-69337-4_4(85-111)Online publication date: 16-Jun-2021
  • (2015)ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking PropertiesProceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security10.1145/2756601.2756615(91-96)Online publication date: 17-Jun-2015
  • (2015)Latent Fingerprint Aging from a Hyperspectral PerspectiveProceedings of the 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (imf 2015)10.1109/IMF.2015.18(121-135)Online publication date: 18-May-2015
  • Show More Cited By

Index Terms

  1. Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
    September 2011
    140 pages
    ISBN:9781450308069
    DOI:10.1145/2037252
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 September 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IT-forensics
    2. digital forensics
    3. digitized forensics
    4. forensics
    5. latent fingerprints
    6. legal aspects
    7. process model

    Qualifiers

    • Research-article

    Conference

    MM&Sec '11
    Sponsor:
    MM&Sec '11: Multimedia and Security Workshop
    September 29 - 30, 2011
    New York, Buffalo, USA

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 22 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Non-contact Technologies and Digital Approaches to (Latent) Fingermark Aging StudiesTechnologies for Fingermark Age Estimations: A Step Forward10.1007/978-3-030-69337-4_4(85-111)Online publication date: 16-Jun-2021
    • (2015)ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking PropertiesProceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security10.1145/2756601.2756615(91-96)Online publication date: 17-Jun-2015
    • (2015)Latent Fingerprint Aging from a Hyperspectral PerspectiveProceedings of the 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (imf 2015)10.1109/IMF.2015.18(121-135)Online publication date: 18-May-2015
    • (2015)Supporting Forensic Design - A Course Profile to Teach ForensicsProceedings of the 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (imf 2015)10.1109/IMF.2015.16(85-95)Online publication date: 18-May-2015
    • (2014)Latent fingerprint persistence: A new temporal feature space for forensic trace evidence analysis2014 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2014.7026003(4952-4956)Online publication date: Oct-2014
    • (2012)An evaluation of biometric fingerprint matchers in a forensic context using latent impressionsProceedings of the on Multimedia and security10.1145/2361407.2361430(133-138)Online publication date: 6-Sep-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media