[1] Bloomberg News, “Stocks weaken after Fed Statements, The New York Times”, 12 June 2011.
[2] M. G. Solomon, D. Barett, and N. Broom, Computer Forensics Jumpstart, Sybex, London, 2005, pp. 51.
[3] E. Casey, Digital evidence and computer crime, London, Academic Press, 2000, pp. 10.
[4] Gartner Research, “Which operating system will be 2011’s bestseller”, Accessed 11 August 2011.
[5] D. Jones, “Adobe 2Q Net Up 54% On Broad Sales Gains, Higher Margins”, The Wall Street Journal, Accessed 21 June 2011.
[6] A. Jones, C. Valli, Building a digital forensic laboratory, Burlington, Elsevier, 2008, pp. 285.
[7] F. Cohan, “Towards a science of digital forensic investigation”, IFIP Advances Digital Forensics VI, China, 2010, pp. 17-35.
[8] J. Grama, “Legal issues in information security”, MA, USA, Jones and Bartlett, 2011, pp. 460-471.
[9] M. V. Zelkowitz, Advances in computers; information security. Academic Press-Elsevier, 2009.
[10] Tech Specs, www.adobe.com, Accessed 22 June 2011.
[11] “A roadmap for Digital Forensic Research”, Digital Forensic Research Workshop, 2001, pp. 16.
[12] U.S. National Institute of Justice, Electronic Crime Scene Investigation Guide: A guide for First Responders, 2001.
[13] Top Tech News, “Windows 7, Office Drive Record Microsoft Revenue”, Accessed 23 July 2010.
[14] H. Carvey, Windows Forensic Analysis Dvd Toolkit, 2nd Ed., Elsevier, 2009, pp. 296.
[15] I. Rawoot, “Terrorists favour ’easy’ fake SA passports”, Mail and Guardian, 17 June 2011.
[16] H. Carvey, Windows Registry Analysis, 2nd Ed., Elsevier, 2009, pp. 194.
[17] Reglite software, www.resplendence.com/reglite, Accessed 14 July 2011.
[18] Regview, www.accessdat.com/support, Accessed 14 July 2011.
[19] T. Padova, “Adobe Acrobat 9 PDF Bible”, Indianapolis, Wiley, 2008.
[20] Winhex, www.x-ways.net/forensics, Accessed 13 June 2011.
[21] Porn detection stick, www.paraben-sticks.com/porn-detection-stick, Accessed 9 August 2011.
[22] C. Altheide, H. Carvey, Digital Forensics with Open Source tools, Elsevier, MA USA, 2011, pp.2.
[23] J. Ingram, “Criminal evidence”, 11th ed., John C Klotter Justice Administration legal Series, USA, Elsevier, 2012, pp. 846.
[24] Regslack, Downloads, www.regripper.net, Accessed September 2011.
[26] M. Reddy, Graphic design file format database, http://www.martinreddy.net/gfx/2dhi.html, Accessed 19 December 2012.
[27] Adobe XMP, http://www.adobe.com/ products/ xmp/index.html, Accessed 19 December 2012.
[28] E. K. Mabuto, H. S. Venter, “User-generated evidence from graphic design applications”, International conference on cyber security, cyber warfare and digital forensics, CyberSec2012, pp. 195-200.
[29] Open Source Computer Vision (OpenCV), www.opencv.org, Accessed 11 September 2012.
[30] Metadata Extraction Tool, www.extractmetadata.com, Accessed 11 July 2012.
[31] J. Bargas, “Brazilian man attempted to open a bank account using a fake Jack Nicholson ID”, International Business Times, http://au.ibtimes.com/, 2 March, 2012.
[32] C. C. Lien, “Fast forgery detection with the intrinsic resampling properties”, Journal of information security, vol. 1, no. 1, 2010, pp. 11-22.
[33] M. C. Stamm, “Forensic detection of image tampering using intrinsic statistical fingerprints in histograms”. APSIPA Annual summit and conference, Japan, 2009, pp. 563-572.
[34] K. Cohen, “Digital Still Camera Forensics”, Small scale digital device forensics Journal, vol. 1, no. 1, June 2007, pp. 2-8.
[35] H. Farid, “Image forgery detection”, IEEE Signal Processing Magazine, 2009, pp. 16-25.
[36] S. Bayram, I. Avcibas, B. Sankur, N. Memon, “Image manipulation detection”, Journal of Electronic Imaging, vol. 15, no. 4, 2006, pp. 41-52.
[37] J. Wang, “Image forensics based on manual blurred edge detection”, Multimedia information networking and security (MINES), 2010, pp. 907-911.
[38] N. Memon, “Photo Forensics”, International workshop on information security, NYU, 2012, pp. 1-27.