Skip to main content

Courtroom Considerations in Digital Image Forensics

Abstract

The manner in which results of digital image forensic investigations are presented in the courtroom can be positively or adversely affected by case law, federal rules, legislative acts, availability of discovery materials, tools, and the use of exhibits. Issues pertinent to effective and successful testimony are addressed, along with suggestions for improvement of methods.

Keywords

  • Authentication
  • Certification
  • Custody
  • Daubert
  • Evidence
  • Frye
  • Hash
  • Knowledge
  • Pornography
  • Possession
  • Testimony
  • Thumbnail
  • Timestamps

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-1-4614-0757-7_11
  • Chapter length: 13 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   129.00
Price excludes VAT (USA)
  • ISBN: 978-1-4614-0757-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   169.99
Price excludes VAT (USA)
Hardcover Book
USD   219.99
Price excludes VAT (USA)

References

  1. Mercuri RT (2004) The HIPAA-potamus in Health Care Data Security. Security Watch, Communications of the Association for Computing Machinery, 47(7), July 2004

    Google Scholar 

  2. United States General Accounting Office (2003) Child pornography is readily accessible over peer-to-peer networks. GAO-03-537T, 13 Mar, 2003

    Google Scholar 

  3. Morse MA, Gaugler AC (2007) Daubert challenges to experts in federal criminal cases: an overlooked defense. The National Association of Criminal Defense Lawyers Champion, July 2007

    Google Scholar 

  4. Stevens M (2010) Admissibility of scientific evidence under Daubert. http://faculty.ncwc.edu/mstevens/425/lecture03.htm. Accessed 22 Oct 2010

  5. Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHA-1. In: Shoup V (ed) Crypto 2005, LNCS vol. 3621. Springer, Heidelberg, pp. 17–36

    Google Scholar 

  6. National Public Radio (2009) ‘Megan’s Law’ Mom Criticizes ‘Sexting’ Charges, 26 Mar, 2009

    Google Scholar 

  7. Myers C, Doft D (2010) Nothing wrong with jet’s air show maneuver, FAA says. CNN, 19 Oct, 2010

    Google Scholar 

Download references

Acknowledgments

The author would like to recognize Attorneys Anna M. Durbin and Michael W. Hoffman who provided salient feedback during the writing of this chapter. Clients and attorneys whom the author has worked with (or against!) on cases involving digital imagery, whose names have not been instantiated for reasons of privacy, are also thanked for the numerous insights they have provided. Dr. Norman Badler, director of the Center for Human Modeling and Simulation at the School of Engineering and Applied Science of the University of Pennsylvania is also acknowledged for his long-standing encouragement and support of research in computer graphics in general and this author in particular.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca Mercuri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Mercuri, R. (2013). Courtroom Considerations in Digital Image Forensics. In: Sencar, H., Memon, N. (eds) Digital Image Forensics. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0757-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-0757-7_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-0756-0

  • Online ISBN: 978-1-4614-0757-7

  • eBook Packages: EngineeringEngineering (R0)