Abstract
We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
West Midland Toxicology Laboratory: Chain of Custody (June 21, 2003), http://www.toxlab.co.uk/coc.htm (accessed, March 2008)
National Geographic: History of Photography, http://photography.nationalgeographic.com/photography/photographers/photography-timeline.html (accessed, September 2008)
Pelly, M., Norrie, J.: Speedcam slip puts $100m fines in doubt. Sydney Morning Herald (March 26, 2006), http://www.smh.com.au/news/national/speedcam-slip-may-cost-100m/2006/03/23/1142703456320.html (accessed, March 2008)
Bergstein, B.: Digital Photos Pose Issues in Court. CRN -Channel Web (February 8, 2004), http://www.crn.com/digital-home/18831429 (accessed, March 2008)
Foray Technology: Foray Technology - Clients (2008), http://www.foray.com/company/clients.php (accessed, September 2008)
Blythe, P., Fridrich, J.: Secure Digital Camera. Digital Forensic Research Workshop (2004)
ITU: CCITT T.81 information technology – Digital compression and coding of continuous-tone still images – Requirements and guidelines. International Telecommunications Union (1993)
JEITA: JEITA CP-3451 Exchangeable image file format for digital still cameras: Exif Version 2.2. Japan Electronics and Information Technology Industries Association (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Neville, T., Sorell, M. (2009). Audit Log for Forensic Photography. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)