| |||||||||||
FoSec 2016 : Call for Book Chapters in Innovation in Multimedia Forensics and Security: Theory and Practice | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. However, digital forensics compared with traditional forensic science poses major challenges. Information on a computer system can be altered or hidden without a trace. Moreover the variety formats and the exponential growth data added another challenge that related to the need to analyse and take decisions in vast times. The objective of
this edited book is to provide the researchers of computer science and information technology the recent advances in the fields of digital forensics, which are required to achieve necessary knowledge about that field of computer science. In order to achieve these objectives, the book chapters will emphasize on theoretical advances and its applications to real life problems. Description and Scope of the Book Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early '80s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. Forensics may also feature in the private sector; such as during internal corporate investigations or intrusion investigation (a specialist probes into the nature and extent of an unauthorized network intrusion). The ultimate objectives of this volume are to provide challenges and opportunities to the research communities with an updated, in-depth material on the Multimedia Forensics and Security: Foundations, Innovations, and Applications in order to finding solutions to the challenges and problems facing forensics and information security applications. We invite all researchers and practitioners who are developing algorithms, systems, and applications, to share their results, ideas, and experiences. Besides the main topic covering all related multimedia Forensics and security problems in the area of information security are also welcomed. Topics include, but are not limited to: Technology Crime Investigation: Mobile forensics Forensics Multimedia analysis An examination of digital forensic models Basic Digital Forensic Investigation Concepts Computer and intrusion forensics Forensic analysis in the digital world Legal Aspects of Digital Forensics Watermarking technology Cloud security Cryptology Multimedia authentication Digital Fingerprinting for Multimedia Security and Forensics Detection of forgeries Digital evidences Submission Deadlines Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, or Words , and according to the Springer's svmlt template that can be downloaded from the (link) Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should submit their manuscripts electronically through the email to Dr. Mohamed Mostafa via email mmostafa_fouad@yahoo.com. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. FULL CHAPTER SUBMISSION: Chapters have to be no more than 25 pages length and will be reviewed by two expert reviewers to ensure the quality of the volume. The deadline of submission is January 15, 2016. NOTIFICATION: Authors of submitted chapters will be notified by 15th February 2016, about their acceptance. Camera-ready version of accepted chapters is expected to be submitted by March 1st , 2016. Volume Editors Mohamed Mostafa Fouad Arab Academy for Science, Technology, and Maritime Transport. Scientific Research Group in Egypt (SRGE) mmostafa_fouad@yahoo.com Azizah Abdul Manaf, Advanced Informatics School, Universiti Teknologi Malaysia, Jalan Semarak, 54100 Kuala Lumpur, Malaysia azizaham.kl@utm.my Abou Ella Hassanien Scientific Research Group in Egypt (SRGE) Faculty of Computers & Information Cairo University, Egypt aboitcairo@gmail.com Mazdak Zamani Advanced Informatics School, Universiti Teknologi Malaysia, Jalan Semarak, 54100 Kuala Lumpur, Malaysia mazdak@utm.my Rabiah Ahmad Universiti Teknikal Melaka (UTem), Malaysia rabiah@utem.edu.my Janusz Kacprzyk Systems Research Institute Polish Academy of Sciences, Poland E-mail: Janusz.Kacprzyk@ibspan.waw.pl |
|