Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Multimedia forensics and security : foundations, innovations, and applications
Hassanien A., Fouad M., Manaf A., Zamani M., Ahmad R., Kacprzyk J., Springer International Publishing, New York, NY, 2016. 414 pp. Type: Book (978-3-319442-68-6)
Date Reviewed: Nov 29 2017

Computer forensics is concerned with scientific techniques used in the investigation of crimes committed by means of computers and related paraphernalia. This book was published as part of Springer’s “Intelligent Systems Reference Library” series. It has 17 chapters contributed by 35 authors from Algeria, Bosnia and Herzegovina, Egypt, India, Malaysia, Saudi Arabia, Tunisia, United Arab Emirates (UAE), Ukraine, and the US. The book was edited by six editors and includes many color illustrations. All chapters include ample references to the literature.

The book comprises three parts. The first part, “Forensic Analysis in Cloud Computing,” consists of six chapters. Cloud computing is a new paradigm that has many benefits; however, it has significantly enhanced the challenges of investigating cybercrime. Some light is shed on the trends and challenges in forensic analysis involving cloud computing. Nowadays, a significant amount of data is stored in clouds. This offers many advantages, but also ushers in numerous security challenges. Therefore, the focus is on challenges related to cloud storage services and some solutions to these. The emerging technique of homomorphic encryption for data security in public clouds is discussed. A cloud-based view allocation algorithm for getting better performance from a data warehousing system is presented. An improved distributed database system design over cloud environments is studied. An algorithm to convert words into their root forms is described. This is useful for web search and information retrieval.

“Forensics Multimedia and Watermarking Techniques,” Part 2, has five chapters. Managing illumination with respect to facial recognition is difficult, so this is discussed. A novel application of artificial intelligence techniques for the problem of detecting substantial changes in image sequences is presented. A new watermarking technique for video watermarking with a focus on authentication and tamper detection is proposed. A digital watermarking technique that is claimed to be both computationally efficient and robust is studied. The use of block ciphers for the encryption of images is an interesting topic.

The third part, “Digital Forensic Applications,” has six chapters. Query processing techniques for continuous data streams are discussed, and the benefits of gait recognition for forensic analysis are highlighted. The acceptability of digital evidence, with a specific focus on its acceptability in the courts of Bosnia and Herzegovina, is looked at. A framework for data acquisition from smartphones employing Android is studied. A cryptosystem for Internet of Things (IoT) applications is demonstrated. A method for collecting volatile information during the investigation of an ongoing botnet attack on computer networks is captivating.

The popularity of cloud computing has brought along with it several challenges to computer forensics. There are not many books on the market that focus on cloud forensics; hence, this book is timely. The book discusses sparingly some techniques from multimedia forensics and watermarking. It is well organized and informative. Many of the chapters present topics that are worthy of further research. Some chapters, such as the first, are insightful; a few are novel; and some, such as the chapter on botnet attacks, are stimulating. There are various security challenges in cloud computing forensics, multimedia forensics, and watermarking techniques. This book provides a glimpse of some of these and presents a few solutions, too. The applications of these solutions in practice should be explored in depth. Often, there are not many evaluations of those methods in the real world. The strengths and weaknesses of the algorithms described in the book should be researched further. The practical applications of the techniques mentioned have not been highlighted, for example, for terrorism detection. However, practitioners, researchers, faculty, and students of computer security, cybercrime, and public policy will find this book useful. It is suitable for teaching courses on multimedia forensics and security. I recommend it for its intended readers.

Reviewer:  S. V. Nagaraj Review #: CR145683 (1802-0049)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Multimedia Information Systems (H.5.1 )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Cloud Computing (C.2.4 ... )
 
 
Public Policy Issues (K.4.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Multimedia Information Systems": Date
Use of graph-theoretic models for optimal relational database accesses to perform join
Pramanik S., Ittner D. ACM Transactions on Database Systems 10(1): 57-74, 1985. Type: Article
Nov 1 1985
Multi-media document translation: ODA and the EXPRES project
Rosenberg J., Sherman M., Marks A., Akkerhuis J., Springer-Verlag New York, Inc., New York, NY, 1991. Type: Book (9780387973975)
Dec 1 1991
MediaView
Phillips R. Communications of the ACM 34(7): 74-83, 1991. Type: Article
May 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy