Difference between pages "Biometrics Bibliography" and "File Format Identification"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
m (Bibliography)
 
Line 1: Line 1:
<bibtex>
+
File Format Identification is the process of figuring out the format of a sequence of bytes. Operating systems typically do this by file extension or by embedded MIME information. Forensic applications need to identify file types by content.
@inproceedings{642639,
+
author = {Lynne Coventry and Antonella De Angeli and Graham Johnson},
+
title = {Usability and biometric verification at the ATM interface},
+
booktitle = {CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems},
+
year = {2003},
+
isbn = {1-58113-630-7},
+
pages = {153--160},
+
location = {Ft. Lauderdale, Florida, USA},
+
doi = {http://doi.acm.org/10.1145/642611.642639},
+
publisher = {ACM Press},
+
address = {New York, NY, USA},
+
url="http://portal.acm.org/citation.cfm?id=642611.642639",
+
abstract="This paper describes some of the consumer-driven usability research conducted by NCR Self Service Strategic Solutions in the development of an understanding of usability and user acceptance of leading-edge biometrics verification techniques. We discuss biometric techniques in general and focus upon the usability phases and issues, associated with iris verification technology at the Automated Teller Machine (ATM) user interface. The paper concludes with a review of some of the major research issues encountered, and an outline of future work in the area."
+
}
+
</bibtex>
+
  
<bibtex>
+
=Tools=
@article{1221459,
+
==libmagic==
author = "Doroteo T. Toledano and Rub\'{e}n Fern\'{a}ndez Pozo and \'{A}lvaro Hern\'{a}ndez Trapote and Luis Hern\'{a}ndez G\'{o}mez",
+
* Written in C.
title = {Usability evaluation of multi-modal biometric verification systems},
+
* Rules in /usr/share/file/magic and compiled at runtime.
journal = {Interact. Comput.},
+
* Powers the Unix “file” command, but you can also call the library directly from a C program.
volume = {18},
+
* http://sourceforge.net/projects/libmagic
number = {5},
+
year = {2006},
+
issn = {0953-5438},
+
pages = {1101--1122},
+
doi = {http://dx.doi.org/10.1016/j.intcom.2006.01.004},
+
publisher = {Elsevier Science Inc.},
+
address = {New York, NY, USA},
+
}
+
</bibtex>
+
  
<bibtex>
+
==DROID==
@article{1272062,
+
* Writen in Java
author = {M. Angela Sasse},
+
* Developed by National Archives of the United Kingdom.
title = {Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems},
+
* http://droid.sourceforge.net
journal = {IEEE Security and Privacy},
+
volume = {5},
+
number = {3},
+
year = {2007},
+
issn = {1540-7993},
+
pages = {78--81},
+
doi = {http://dx.doi.org/10.1109/MSP.2007.69},
+
publisher = {IEEE Educational Activities Department},
+
address = {Piscataway, NJ, USA},
+
abstract = {The author examines user interaction with biometric systems at airports, and emphasizes usability's importance in successfully operating biometric systems.}
+
}
+
  
</bibtex>
+
==TrID==
 +
* XML config file
 +
* Closed source; free for non-commercial use
 +
* http://mark0.net/soft-trid-e.html
  
<bibtex>
+
==Stellent/Oracle Outside-In==
@article{wwk001,
+
* Proprietary but free demo.
author = {Adams Wai-Kin Konga, David Zhanga and Guangming Luc  },
+
* http://www.oracle.com/technology/products/content-management/oit/oit_all.html
title = {A study of identical twins’ palmprints for personal verification},
+
journal = {Pattern Recognition},
+
volume = {39},
+
number = {11},
+
year = {2006},
+
pages = {2149--2156},
+
doi = {http://dx.doi.org/10.1016/j.physletb.2003.10.071},
+
publisher = {Elsevier B.V},
+
+
abstract = {Automatic biometric systems based on human characteristics for personal identification have attracted great attention. Their performance highly depends on the distinctive information in the biometrics. Identical twins having the closest genetics-based relationship are expected to have maximum similarity in their biometrics. Classifying identical twins is a challenging problem for some automatic biometric systems. Palmprint has been studied for personal identification for over seven years. Most of the previous research concentrates on algorithm development. In this paper, we systemically examine palmprints from the same DNA for automatic personal identification and to uncover the genetically related palmprint features. The experimental results show that the three principal lines and some portions of weak lines are genetically related features but our palms still contain rich genetically unrelated features for classifying identical twins.}
+
}
+
  
</bibtex>
+
[[Category:Tools]]
  
<bibtex>
+
=Bibliography=
@article{ganeshana001,
+
author = {Balaji Ganeshana, Dhananjay Theckedathb, Rupert Younga and Chris Chatwina  },
+
title = {Biometric iris recognition system using a fast and robust iris localization and alignment procedure },
+
journal = {Optics and Lasers in Engineering },
+
volume = {44},
+
number = {1},
+
month = {January},
+
year = {2006},
+
pages = {1--24},
+
doi = {http://dx.doi.org/10.1016/j.optlaseng.2005.03.010 },
+
publisher = {Elsevier B.V},
+
+
abstract = {Iris recognition as a biometric technique for personal identification and verification is examined. The motivation for this stems from the observation that the human iris provides a unique structure suitable for non-invasive biometric assessment. In particular the irises are as distinct as fingerprints or patterns of retinal blood vessels and the appearance of the iris is amenable to remote examination. In this paper we have used a database of iris images of more than 100 people, which was used in the implementation of the iris recognition software. The software developed uses a novel technique of localization, alignment, pattern matching of the irises and finally the decision regarding the degree of match. }
+
}
+
  
</bibtex>
+
;2001
  
<bibtex>
+
Current research papers on the file format identification problem. Most of these papers concern themselves with identifying file format of a few file sectors, rather than an entire file'''Please note that this bibliography is in chronological order!'''
@article{ross001,
+
author = {Arun Ross and Anil Jain },
+
title = {Information fusion in biometrics},
+
journal = {Pattern Recognition Letters },
+
volume = {24},
+
number = {13},
+
month = {September},
+
year = {2003},
+
pages = {2115--2125},
+
doi = {http://dx.doi.org/10.1016/S0167-8655(03)00079-5  },
+
publisher = {Elsevier B.V},
+
+
abstract = {Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. Automatic verification methods based on physical biometric characteristics such as fingerprint or iris can provide positive verification with a very high accuracy. However, the biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. We show that a state-of-the-art automatic fingerprint verification system can successfully distinguish identical twins though with a slightly lower accuracy than nontwins. }
+
  }
+
  
</bibtex>
+
* Mason McDaniel, [[Media:Mcdaniel01.pdf|Automatic File Type Detection Algorithm]], Masters Thesis, James Madison University,2001
  
<bibtex>
+
; 2003
@article{sou001,
+
author = {Colin Soutar },
+
title = {Implementation of Biometric Systems — Security and Privacy Considerations },
+
journal = {Information Security Technical Report},
+
volume = {7},
+
number = {4},
+
month = {December},
+
year = {2002},
+
pages = {49--55},
+
doi = {http://dx.doi.org/10.1016/S1363-4127(02)00406-5  },
+
publisher = {Elsevier Science Ltd},
+
+
abstract = {As biometric systems are deployed within security systems, or as part of identification programs, implementation issues relating to security and privacy need to be considered. The role of a biometric system is to recognize (or not) an individual through specific physiological or behavioral traits. The use of the word ‘recognize’ is significant — defined in the Oxford Dictionary as “identify as already known”. In other words, a biometric system does not establish the identity of an individual in any way, it merely recognizes that they are who they say they are (in a verification or a ‘positive identification’ system), or that they were not previously known to the system (in a ‘negative identification’ system, for example, to avoid double enrollment in a welfare system). This tie between the actual identity of an individual and the use of biometrics is subtle and provokes much debate, particularly relating to privacy and other societal issues. This paper seeks to clarify come of these issues by providing a framework, and by distinguishing between technology and societal issues.  }
+
}
+
  
</bibtex>
+
* [http://www2.computer.org/portal/web/csdl/abs/proceedings/hicss/2003/1874/09/187490332a.pdf Content Based File Type Detection Algorithms], Mason McDaniel and M. Hossain Heydari, 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9, 2003.
  
<bibtex>
+
; 2005
@article{jain001,
+
author = {Anil K. Jain, Salil Prabhakar,and Sharath Pankanti},
+
title = {On the similarity of identical twin fingerprints },
+
journal = {Pattern Recognition },
+
volume = {35},
+
number = {11},
+
month = {November},
+
year = {2002},
+
pages = {2653--2663},
+
doi = {http://dx.doi.org/10.1016/S0031-3203(01)00218-7 },
+
publisher = {Elsevier B.V.},
+
+
abstract = {Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. Automatic verification methods based on physical biometric characteristics such as fingerprint or iris can provide positive verification with a very high accuracy. However, the biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. We show that a state-of-the-art automatic fingerprint verification system can successfully distinguish identical twins though with a slightly lower accuracy than nontwins.  }
+
}
+
  
</bibtex>
+
* [http://www1.cs.columbia.edu/ids/publications/FilePrintPaper-revised.pdf Fileprints: identifying file types by n-gram analysis], LiWei-Jen, Wang Ke, Stolfo SJ, Herzog B..,  IProceeding of the 2005 IEEE workshop on information assurance; 2005 [http://www.itoc.usma.edu/workshop/2005/Papers/Follow%20ups/FilePrintPresentation-final.pdf [slides]]
  
<bibtex>
+
* [http://www.micsymposium.org/mics_2005/papers/paper7.pdf File Type Detection Technology], Douglas J. Hickok, Daine Richard Lesniak, Michael C. Rowe, 2005 Midwest Instruction and Computing Symposium.
@article{doro01,
+
author = {Doroteo T. Toledano, Rubén Fernández Pozo, Álvaro Hernández Trapote and Luis Hernández Gómez},
+
title = {Usability evaluation of multi-modal biometric verification systems },
+
journal = {Interacting with Computers },
+
volume = {18},
+
number = {5},
+
month = {September},
+
year = {2006},
+
pages = {1101--1122},
+
doi = {http://dx.doi.org/10.1016/j.intcom.2006.01.004 },
+
publisher = {Elsevier B.V.},
+
+
abstract = {As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared based on the recognition and verification of several biometric features considered unique to each individual. Signature and voice characteristics, facial features, and iris and fingerprint patterns have all been used to identify a person or just to verify that the person is who he/she claims to be. Although still relatively new, these new technologies have already reached a level of development that allows its commercialization. However, there is a lack of studies devoted to the evaluation of these technologies from a user-centered perspective. This paper is intended to promote user-centered design and evaluation of biometric technologies. Towards this end, we have developed a platform to perform empirical evaluations of commercial biometric identity verification systems, including fingerprint, voice and signature verification. In this article, we present an initial empirical study in which we evaluate, compare and try to get insights into the factors that are crucial for the usability of these systems.   }
+
}
+
  
</bibtex>
+
; 2006
  
=Surveys=
+
* [http://ieeexplore.ieee.org/iel5/10992/34632/01652088.pdf  File type identification of data fragments by their binary structure. ], Karresand Martin, Shahmehri Nahid. Proceedings of the IEEE workshop on information assurance; 2006. p. 140–7. [http://www.itoc.usma.edu/workshop/2006/Program/Presentations/IAW2006-07-3.pdf [slides]]
  
Things to check:
+
* [http://www.mantechcfia.com/SlidingWindowMeasurementforFileTypeIdentification.pdf Sliding Window Measurement for File Type Identification], Gregory A. Hall, Ph.D., Computer Forensics and Intrusion Analysis Group, ManTech Security and Mission Assurance, 2006
  
NIST  Face Recognition Vendor Test (FRVT) 2006 and the Iris Challenge Evaluation (ICE) 2006
+
* FORSIGS; Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints, John Haggerty and Mark Taylor, IFIP TC11 International Information Security Conference, 2006, Sandton, South Africa.
  
<bibtex>
+
; 2007
@report {ORC_PATUBITGPS},
+
title = {Public Attitudes Toward the Uses of Biometric Identification Technologies by Government and the Private Sector},
+
year = {2002},
+
url = {http://dematerialisedid.com/PDFs/Biometricsurveyfindings.pdf}
+
</bibtex>
+
  
 +
* Karresand M., Shahmehri N., [http://dx.doi.org/10.1007/0-387-33406-8_35 Oscar: File Type Identification of Binary Data in Disk Clusters and RAM Pages], Proceedings of IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (SEC2006), Springer, ISBN 0-387-33405-x, pp 413-424, May 22 - 24, Karlstad, Sweden. 
  
<bibtex>
+
* "Identification and Localization of Data Types within Large-Scale File Systems," Robert F. Erbacher and John Mulholland,, Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007,
@paper {simon001,
+
author = {A. Simon, D. M. Worthen, and J. A. Mitas},  
+
title = {An evaluation of iridology},  
+
journal = {Journal of Ameerican Medical Assoc},  
+
vol = {242},  
+
pages = { 1385--1387},  
+
year = {1979}
+
}
+
  
</bibtex>
+
* [https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2007-19.pdf Using Artificial Neural Networks for Forensic File Type Identification], Ryan M. Harris, Master's Thesis, Purdue University, May 2007
  
 +
* [http://www.dfrws.org/2008/proceedings/p14-calhoun.pdf Predicting the Types of File Fragments], William Calhoun, Drue Coles, DFRWS 2008 [http://www.dfrws.org/2008/proceedings/p14-calhoun_pres.pdf [slides]]
 +
 +
* [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04545366 SÁDI – Statistical Analysis for Data type Identification], Sarah J. Moody and Robert F. Erbacher, 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008]
  
 
[[Category:Bibliographies]]
 
[[Category:Bibliographies]]

Revision as of 17:20, 8 January 2009

File Format Identification is the process of figuring out the format of a sequence of bytes. Operating systems typically do this by file extension or by embedded MIME information. Forensic applications need to identify file types by content.

Tools

libmagic

  • Written in C.
  • Rules in /usr/share/file/magic and compiled at runtime.
  • Powers the Unix “file” command, but you can also call the library directly from a C program.
  • http://sourceforge.net/projects/libmagic

DROID

TrID

Stellent/Oracle Outside-In

Bibliography

2001

Current research papers on the file format identification problem. Most of these papers concern themselves with identifying file format of a few file sectors, rather than an entire file. Please note that this bibliography is in chronological order!

2003
2005
2006
  • FORSIGS; Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints, John Haggerty and Mark Taylor, IFIP TC11 International Information Security Conference, 2006, Sandton, South Africa.
2007
  • "Identification and Localization of Data Types within Large-Scale File Systems," Robert F. Erbacher and John Mulholland,, Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007,