{"id":"https://openalex.org/W1985580731","doi":"https://doi.org/10.1109/iihmsp.2007.4457641","title":"Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera","display_name":"Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera","publication_year":2007,"publication_date":"2007-11-01","ids":{"openalex":"https://openalex.org/W1985580731","doi":"https://doi.org/10.1109/iihmsp.2007.4457641","mag":"1985580731"},"language":"en","primary_location":{"id":"doi:10.1109/iihmsp.2007.4457641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098365730","display_name":"Mariko Irisawa","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Mariko Irisawa","raw_affiliation_strings":["Tokyo Denki University, Japan","Tokyo Denki Univ., Tokyo"],"affiliations":[{"raw_affiliation_string":"Tokyo Denki University, Japan","institution_ids":["https://openalex.org/I165522056"]},{"raw_affiliation_string":"Tokyo Denki Univ., Tokyo","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109867619","display_name":"Yuki Ashino","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuki Ashino","raw_affiliation_strings":["Tokyo Denki University, Japan","Tokyo Denki Univ., Tokyo"],"affiliations":[{"raw_affiliation_string":"Tokyo Denki University, Japan","institution_ids":["https://openalex.org/I165522056"]},{"raw_affiliation_string":"Tokyo Denki Univ., Tokyo","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109870192","display_name":"Keisuke Fujita","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keisuke Fujita","raw_affiliation_strings":["Tokyo Denki University, Japan","Tokyo Denki Univ., Tokyo"],"affiliations":[{"raw_affiliation_string":"Tokyo Denki University, Japan","institution_ids":["https://openalex.org/I165522056"]},{"raw_affiliation_string":"Tokyo Denki Univ., Tokyo","institution_ids":["https://openalex.org/I165522056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101137905","display_name":"Ry\u00f4ichi Sasaki","orcid":null},"institutions":[{"id":"https://openalex.org/I165522056","display_name":"Tokyo Denki University","ror":"https://ror.org/01pa62v70","country_code":"JP","type":"education","lineage":["https://openalex.org/I165522056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryoichi Sasaki","raw_affiliation_strings":["Tokyo Denki University, Japan","Tokyo Denki Univ., Tokyo"],"affiliations":[{"raw_affiliation_string":"Tokyo Denki University, Japan","institution_ids":["https://openalex.org/I165522056"]},{"raw_affiliation_string":"Tokyo Denki Univ., Tokyo","institution_ids":["https://openalex.org/I165522056"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5098365730"],"corresponding_institution_ids":["https://openalex.org/I165522056"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09808719,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"8","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7451731562614441},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6901503205299377},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6665512323379517},{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.6248000264167786},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5912379026412964},{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.5865172743797302},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5165225863456726},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4930855929851532},{"id":"https://openalex.org/keywords/digital-camera","display_name":"Digital camera","score":0.4350929260253906},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38862279057502747},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21378293633460999},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.20000898838043213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13105079531669617}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7451731562614441},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6901503205299377},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6665512323379517},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.6248000264167786},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5912379026412964},{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.5865172743797302},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5165225863456726},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4930855929851532},{"id":"https://openalex.org/C2779705975","wikidata":"https://www.wikidata.org/wiki/Q62927","display_name":"Digital camera","level":2,"score":0.4350929260253906},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38862279057502747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21378293633460999},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.20000898838043213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13105079531669617},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iihmsp.2007.4457641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iihmsp.2007.4457641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2074106648"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4283205458","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W4242633011","https://openalex.org/W93745046","https://openalex.org/W3001565613","https://openalex.org/W3002268218","https://openalex.org/W2548287415"],"abstract_inverted_index":{"The":[0,160],"digital":[1,44,80],"forensics":[2,45],"used":[3],"in":[4,9,46],"the":[5,43,84,136,151,163],"corporate":[6],"world":[7],"primarily":[8],"relation":[10],"to":[11,41],"litigation":[12],"involving":[13],"computer-":[14],"related":[15],"evidence":[16],"such":[17,100,112],"as":[18,101,169,171],"civil":[19],"matters,":[20],"breach":[21,24],"of":[22,25,37,153],"contract,":[23],"confidence,":[26],"and":[27,74,95,106],"so":[28],"on,":[29],"has":[30],"recently":[31],"been":[32],"gaining":[33],"a":[34,47,52,66,70,75,97,113,119,125,133,141,145],"great":[35],"deal":[36],"attention.":[38],"In":[39,83,111],"order":[40],"support":[42],"stand-alone":[48],"environment,":[49],"we":[50,87,149],"proposed":[51],"system":[53,138,164],"named":[54],"\"Dig-Force":[55],"(Digital":[56],"Forensic":[57],"System":[58],"with":[59,69],"Chaining":[60],"Signature":[61],"for":[62,92,135,144,167],"Evidence)\"":[63],"that":[64,139,156],"uses":[65,140],"USB":[67],"device":[68],"smart":[71],"card":[72],"function":[73,142],"hysteresis":[76],"signature":[77,81],"based":[78],"on":[79,132],"technology.":[82],"present":[85],"paper,":[86],"discuss":[88],"an":[89,154],"application":[90],"suitable":[91,143],"our":[93],"system,":[94],"pro-pose":[96],"practical":[98],"use":[99],"surgical":[102],"procedures":[103],"where":[104],"misconduct":[105],"mistakes":[107],"are":[108,127],"not":[109,115],"permissible.":[110],"scene,":[114],"only":[116],"data":[117,123],"from":[118,124],"keyboard":[120,168],"but":[121],"also":[122,130],"camera":[126,146,172],"required.":[128],"We":[129],"report":[131],"program":[134],"Dig-Force":[137],"application.":[147],"Moreover,":[148],"show":[150],"result":[152,161],"experiment":[155],"applies":[157],"this":[158],"program.":[159],"shows":[162],"is":[165],"useful":[166],"well":[170],"applications.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
