Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, August 2008.
The 19 revised full papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on trends and challenges; scanner, printer, and prints; human identification; shoeprints; linguistics;decision making and search; speech analysis; signatures and handwriting.
Content Level »Research
Keywords »access control systems - automatic feature extraction - biometric - classification - computational forensics - counterfeit detection - fingerprint - fingerprints - forensic data - high-throughput - identification - law enforcement - natural language - shoeprints - web mining
Trends and Challenges.- Computational Forensics: An Overview.- Computational Methods for Determining Individuality.- Scanner, Printer, and Prints.- Survey of Scanner and Printer Forensics at Purdue University.- Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems.- Document Signature Using Intrinsic Features for Counterfeit Detection.- Human Identification.- Automatic Feature Extraction from 3D Range Images of Skulls.- 3D Processing and Visualization of Scanned Forensic Data.- Person Identification Based on Barefoot 3D Sole Shape.- Shoeprints.- Computerized Matching of Shoeprints Based on Sole Pattern.- Shoe-Print Extraction from Latent Images Using CRF.- Linguistics.- Finding Identity Group “Fingerprints” in Documents.- Supporting Law Enforcement in Digital Communities through Natural Language Analysis.- An Intelligent System for Semantic Information Retrieval Information from Textual Web Documents.- Decision Making and Search.- Support of Interviewing Techniques in Physical Access Control Systems.- Application of q-Gram Distance in Digital Forensic Search.- Speech Analysis.- Similarity Visualization for the Grouping of Forensic Speech Recordings.- Handwritten Signature and Speech: Preliminary Experiments on Multiple Source and Classifiers for Personal Identity Verification.- Signatures and Handwriting.- Signature Verification Using a Bayesian Approach.- Stroke-Morphology Analysis Using Super-Imposed Writing Movements.- Invariants Discretization for Individuality Representation in Handwritten Authorship.