The Association of Digital Forensics, Security and Law (ADFSL)
Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered from certain graphic design applications, which indicates that a counterfeit document was created. This inference is made by associating the digital forensic information gathered with the possible actions taken, more specifically, the scanning, editing, saving and printing of counterfeit documents. The digital forensic information is gathered by analysing the files generated by the particular graphic design application used for creating the document. The acquired digital forensic information is corroborated to the creation of counterfeit documents and interpreted accordingly. In the end determining if a system was utilised for counterfeiting.
Altheide, C., & Carvey, H. (2011). Digital Forensics with Open Source Tools. Elsevier, MA USA p. 2.
Bayram, S., Avcibas, I., Sankur, B., & Memon, N. (2006). Image manipulation detection. Journal of Electron Imaging, 15(4), 41-52.
Bloomberg News. (2011). Stocks weaken after fed statements. The New York Times, 12 June 2011.
Casey, E. (2000). Digital Evidence and Computer Crime, London, Academic Press, p. 10.
Cohen, K. (2007). Digital still camera forensics. Small Scale Digital Device Forensics Journal, 1(1), 2-8.
Cohan, F. (2010). Towards a science of digital forensic investigation. IFIP Advances Digital Forensics VI, China, p. 17-35.
DFRWS. (2001). A roadmap for digital forensic research. Digital Forensic Research Workshop, p. 16.
Farid, H. (2009). Image forgery detection. IEEE Signal Processing Magn, 16 25.
Gartner Research. (2013). Which operating system will be 2011’s bestseller. Retrieved from http://www.gartner.com/technology/research on 15 January 2013.
Jones, A., & Valli, C. (2008). Building a digital forensic laboratory, Burlington, Elsevier pp 285.
Lien, C. C. (2010). Fast forgery detection with the intrinsic resampling properties. Journal of Information Security, 1(1), 11-22.
Memon, N. (2012). Photo forensics. International Workshop on Information Security, New York University, p. 1-27.
Porn detection stick. (2012). Retrieved from www.paraben-sticks.com/porndetection-stick on 9 August 2012.
Rawoot, I. (2011). Terrorists favour ‘easy’ fake SA passports, Mail & Guardian, 17 June 2011.
Solomon, M.G., Barrett, D., & Broom, N. (2005). Computer forensics jumpstart. Sybex, London, p. 51.
Stamm, M. C. (2009). Forensic detection of image tampering using intrinsic statistical fingerprints in histograms. APSIPA Annual Summit and Conference, Japan, 563-572.
Tech Specs. (2013). Retrieved from http://www.adobe.com on 15 January 2013.
Top Tech News. (2010). Windows 7, Office drive record Microsoft revenue. Retrieved from http://www.toptechnews.com/story.xhtml?story_id=11300CM9DYVG on 15 January 2013. U.S.
National Institute of Justice (2001). Electronic Crime Scene Investigation Guide: A Guide for First Responders.
Wang, J. (2010). Image forensics based on manual blurred edge detection. Multimedia Information Networking and Security (MINES), 907-911.
Winhex. (2012). Retrieved from www.x-ways.net/forensics on 13 June 2012.
Zelkowitz, M. V. (2009). Advances in Computers Information Security. Academic Press, Elsevier.
Mabuto, Enos and Venter, Hein
"System-Generated Digital Forensic Evidence in Graphic Design Applications,"
Journal of Digital Forensics, Security and Law: Vol. 8
, Article 4.
Available at: http://commons.erau.edu/jdfsl/vol8/iss3/4