Digital image forensics:
This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has bee...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2011
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781612845197 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477153 | ||
003 | DE-604 | ||
005 | 20220214 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781612845197 |9 978-1-61284-519-7 | ||
035 | |a (ZDB-37-ICG)EDP228 | ||
035 | |a (OCoLC)1269397157 | ||
035 | |a (DE-599)BVBBV047477153 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 621.367 |2 23 | |
100 | 1 | |a Memon, Nasir |e Verfasser |4 aut | |
245 | 1 | 0 | |a Digital image forensics |c Nasir Memon |
264 | 1 | |a United States |b IEEE |c 2011 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) | ||
520 | |a This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated | ||
650 | 4 | |a Image processing | |
650 | 4 | |a Authentication | |
650 | 4 | |a Cameras | |
650 | 4 | |a Forensics | |
650 | 4 | |a Digital images | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878714 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP228 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP228 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793144500224 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Memon, Nasir |
author_facet | Memon, Nasir |
author_role | aut |
author_sort | Memon, Nasir |
author_variant | n m nm |
building | Verbundindex |
bvnumber | BV047477153 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP228 (OCoLC)1269397157 (DE-599)BVBBV047477153 |
dewey-full | 621.367 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.367 |
dewey-search | 621.367 |
dewey-sort | 3621.367 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01725nmm a2200409zc 4500</leader><controlfield tag="001">BV047477153</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220214 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781612845197</subfield><subfield code="9">978-1-61284-519-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP228</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269397157</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477153</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.367</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Memon, Nasir</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital image forensics</subfield><subfield code="c">Nasir Memon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cameras</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital images</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878714</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP228</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP228</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477153 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:11Z |
institution | BVB |
isbn | 9781612845197 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878714 |
oclc_num | 1269397157 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IEEE |
record_format | marc |
spelling | Memon, Nasir Verfasser aut Digital image forensics Nasir Memon United States IEEE 2011 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 13, 2020) This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated Image processing Authentication Cameras Forensics Digital images (DE-588)4017102-4 Film gnd-content |
spellingShingle | Memon, Nasir Digital image forensics Image processing Authentication Cameras Forensics Digital images |
subject_GND | (DE-588)4017102-4 |
title | Digital image forensics |
title_auth | Digital image forensics |
title_exact_search | Digital image forensics |
title_exact_search_txtP | Digital image forensics |
title_full | Digital image forensics Nasir Memon |
title_fullStr | Digital image forensics Nasir Memon |
title_full_unstemmed | Digital image forensics Nasir Memon |
title_short | Digital image forensics |
title_sort | digital image forensics |
topic | Image processing Authentication Cameras Forensics Digital images |
topic_facet | Image processing Authentication Cameras Forensics Digital images Film |
work_keys_str_mv | AT memonnasir digitalimageforensics |