Advertisement

Computational Intelligence in Digital Forensics

  • Satrya Fajri Pratama
  • Lustiana Pratiwi
  • Ajith Abraham
  • Azah Kamilah Muda
Part of the Studies in Computational Intelligence book series (SCI, volume 555)

Abstract

Forensic Science has been around for quite some time. Although various forensic methods have been proved for their reliability and credibility in the criminal justice system, their main problem lies in the necessity of highly qualified forensic investigators. In the course of analysis of evidences, forensic investigators must be thorough and rigorous, hence time consuming. Digital Forensic techniques have been introduced to aid the forensic investigators to acquire as reliable and credible results as manual labor to be presented in the criminal court system. In order to perform the forensic investigation using Digital Forensic techniques accurately and efficiently, computational intelligence oftentimes employed in the implementation of Digital Forensic techniques, which has been proven to reduce the time consumption, while maintaining the reliability and credibility of the result, moreover in some cases, it is producing the results with higher accuracy. The introduction of computational intelligence in Digital Forensic has attracted a vast amount of researchers to work in, and leads to emergence of numerous new forensic investigation domains.

Keywords

computational intelligence digital forensics forensic science computational forensics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Eckert, W.G.: Introduction to the Forensic Sciences. In: Eckert, W.G. (ed.) Introduction to Forensic Science Second Edition, p. 10. CRC Press, Inc., United States of America (1997)Google Scholar
  2. 2.
    Tilstone, W.J., Savage, K.A., Clark, L.A.: Forensic Science: An Encyclopedia of History, Methods, and Techniques. ABC-CLIO, Inc., Santa Barbara (2006)Google Scholar
  3. 3.
    Saferstein, R.: Criminalistics: An Introduction to Forensic Science. Prentice Hall, New York (2011)Google Scholar
  4. 4.
    Eckert, W.G.: Historical Development of Forensic Sciences. In: Eckert, W.G. (ed.) Introduction to Forensic Science Second Edition, p. 20. CRC Press, Inc., United States of America (1997)Google Scholar
  5. 5.
    Connors, E., Lundregan, T., Miller, N., McEwen, T.: Convicted by Juries, Exonerated by Science: Case Studies in the Use of DNA Evidence to Establish Innocence After Trial, vol. NCJ 161258, U.S. Department of Justice (1996)Google Scholar
  6. 6.
    Fantino, J.: The Police Chief. In: Forensic Science: A Fundamental Perspective, vol. 74(11), p. 1. International Association of Chiefs of Police, USA (2007)Google Scholar
  7. 7.
    Muriuki, P.N.: Pathological Truth: The Use of Forensic Science in Kenya’s Criminal Justice System. World Academy of Science 78, 2089–2099 (2013)Google Scholar
  8. 8.
    Bertino, A.J., Bertino, P.N.: Forensic Science: Fundamentals and Investigations, 1st edn. South-Western Cengage Learning, USA (2008)Google Scholar
  9. 9.
    Lawson, T.F.: Before the Verdict and Beyond the Verdict: The CSI Infection Within Modern Criminal Jury Trials. Loyola University Chicago Law Journal 41(132), 119–173 (2009)Google Scholar
  10. 10.
    Shelton, D.E., Kim, Y.S., Barak, G.: An Indirect-Effects Model of Mediated Adjudication: The CSI Myth, the Tech Effect, and Metropolitan Jurors’ Expectations for Scientific Evidence. Vanderbilt Journal of Entertainment and Technology Law 12(1), 1–43 (2009)Google Scholar
  11. 11.
    Podlas, K.: The CSI Effect and Other Forensic Fictions. Loyola of Los Angeles Entertainment Law Review 27(2), 87–125 (2006)Google Scholar
  12. 12.
    Reith, M., Carr, C., Gunsch, G.: An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), 1–12 (2002)Google Scholar
  13. 13.
    Huang, J., Ling, Z., Xiang, T., Wang, J., Fu, X.: When Digital Forensic Research Meets Laws. In: 32nd International Conference on Distributed Computing Systems Workshops, Macau 2012. IEEE (2012)Google Scholar
  14. 14.
    Stahl, B., Carroll-Mayer, M., Elizondo, D., Wakunuma, K., Zheng, Y.: Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law. In: Elizondo, D.A., Solanas, A., Martinez, A. (eds.) Computational Intelligence for Privacy and Security. SCI, vol. 394, pp. 237–258. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  15. 15.
    Elizondo, D.A., Solanas, A., Martínez-Ballesté, A.: Computational Intelligence for Privacy and Security: Introduction. In: Elizondo, D.A., Solanas, A., Martinez, A. (eds.) Computational Intelligence for Privacy and Security. SCI, vol. 394, pp. 1–4. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  16. 16.
    Mumford, C.: Synergy in Computational Intelligence. In: Mumford, C., Jain, L. (eds.) Computational Intelligence. Intelligent Systems Reference Library, pp. 3–21. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  17. 17.
    Deguang, W., Hua, S., Haibo, M.: Application of Adaptive Particle Swarm Optimization in Computer Forensics. In: 2010 WASE International Conference on Information Engineering (ICIE), August 14-15, pp. 147–149 (2010)Google Scholar
  18. 18.
    Feng, L., Cong, D., Shu, H., Liu, B.: Adaptive Halftone Watermarking Algorithm Based on Particle Swarm Optimization 8(3) (2013)Google Scholar
  19. 19.
    Pratama, S.F., Muda, A.K., Choo, Y.-H., Muda, N.A.: SOCIFS Feature Selection Framework for Handwritten Authorship. International Journal of Hybrid Intelligent Systems 10(2), 83–91 (2013), doi:10.3233/HIS-130167Google Scholar
  20. 20.
    Prandtstetter, M., Raidl, G.R.: Meta-heuristics for reconstructing cross cut shredded text documents. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, Montreal, Canada, pp. 349–356. ACM, 1569950 (2009)Google Scholar
  21. 21.
    Hanumantharaju, M.C., Aradhya, V.N.M., Ravishankar, M., Mamatha, A.: A particle swarm optimization method for tuning the parameters of multiscale retinex based color image enhancement. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, Chennai, India, pp. 721–727. ACM, 2345514 (2012)Google Scholar
  22. 22.
    Nemati, S., Basiri, M.E.: Particle swarm optimization for feature selection in speaker verification. In: Di Chio, C., et al. (eds.) EvoApplicatons 2010, Part I. LNCS, vol. 6024, pp. 371–380. Springer, Heidelberg (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Satrya Fajri Pratama
    • 1
  • Lustiana Pratiwi
    • 1
  • Ajith Abraham
    • 1
    • 2
  • Azah Kamilah Muda
    • 1
  1. 1.Computational Intelligence and Technologies (CIT) Research Group, Center of Advanced Computing and Technologies, Faculty of Information and Communication TechnologyUniversiti Teknikal Malaysia MelakaDurian TunggalMalaysia
  2. 2.Machine Intelligence Research Labs (MIR Labs)Scientific Network for Innovation and Research ExcellenceAuburnUSA

Personalised recommendations