{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:14:02Z","timestamp":1769631242296,"version":"3.49.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031710247","type":"print"},{"value":"9783031710254","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_1","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:45:32Z","timestamp":1736149532000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On Determining the Age of Questioned Digital Documents"],"prefix":"10.1007","author":[{"given":"Martin","family":"Olivier","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"1_CR1","unstructured":"Adobe Systems, PDF Reference, Second Edition, Adobe Portable Document Format Version 1.3, Addison-Wesley, Boston, Massachusetts, 2000."},{"key":"1_CR2","unstructured":"Adobe Systems, PDF Reference, Third Edition, Adobe Portable Document Format Version 1.4, Addison-Wesley, Boston, Massachusetts, 2001."},{"key":"1_CR3","unstructured":"Adobe Systems, PDF Reference, Third Edition, Adobe Portable Document Format Version 1.5, Addison-Wesley, Boston, Massachusetts, 2003."},{"key":"1_CR4","unstructured":"Adobe Systems, PDF Reference, Fifth Edition, Adobe Portable Document Format Version 1.6, San Jose, California, 2004."},{"key":"1_CR5","unstructured":"Adobe Systems, PDF Reference Sixth Edition, Adobe Portable Document Format Version 1.7, San Jose, California, 2008."},{"key":"1_CR6","unstructured":"American Standards Association, American Standard Code for Information Interchange, Standard X3.4-1963, Washington, DC, 1963."},{"key":"1_CR7","unstructured":"A. Aotes, Navigating the PDF\/A Standard: A Case Study of Theses in the University of Oxford\u2019s Institutional Repository, M.S. Thesis, School of Information Sciences, University of Illinois at Urbana-Champaign, Urbana, Illinois, 2018."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"A. Bahjat and J. Jones, Deleted file fragment dating by analysis of allocated neighbors, Digital Investigation, vol. 28(S), pp. S60\u2013S67, 2019.","DOI":"10.1016\/j.diin.2019.01.015"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"A. Bahjat and J. Jones, File allocation chronology and its impact on digital forensics, Proceedings of the Thirteenth Annual IEEE Computing and Communication Workshop and Conference, pp. 612\u2013618, 2023.","DOI":"10.1109\/CCWC57344.2023.10099265"},{"key":"1_CR10","unstructured":"R. Bangia, Multimedia and Web Technology, Firewall Media, New Delhi, India, 2004."},{"key":"1_CR11","unstructured":"T. Bienz and R. Cohn, Portable Document Format Reference Manual, Addison-Wesley, Reading, Massachusetts, 1993."},{"key":"1_CR12","unstructured":"T. Bienz, R. Cohn, and J. Meehan, Portable Document Format Reference Manual, Version 1.1, Adobe Systems, San Jose, California, 1996."},{"key":"1_CR13","unstructured":"T. Bienz, R. Cohn and J. Meehan, Portable Document Format Reference Manual, Version 1.2, Adobe Systems, San Jose, California, 1996."},{"key":"1_CR14","unstructured":"R. Brunelle and K. Crawford, Advances in the Forensic Analysis and Dating of Writing Ink, Charles C. Thomas, Springfield, Illinois, 2003."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"F. Buchholz and E. Spafford, On the role of filesystem metadata in digital forensics, Digital Investigation, vol. 1(4), pp. 298\u2013309, 2004.","DOI":"10.1016\/j.diin.2004.10.002"},{"key":"1_CR16","unstructured":"A. Cantu, A sketch of analytical methods for document dating, Part I; The static approach: Determining age independent analytical profiles, International Journal of Forensic Document Examiners, vol. 1(1), pp. 40\u201350, 1995."},{"key":"1_CR17","unstructured":"A. Cantu, A sketch of analytical methods for document dating, Part II; The dynamic approach: Determining age dependent analytical profiles, International Journal of Forensic Document Examiners, vol. 2(3), pp. 192\u2013208, 1996."},{"key":"1_CR18","unstructured":"E. Casey, Digital Evidence and Computer Crime, Elsevier, London, United Kingdom, 2011."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"E. Casey, Digital stratigraphy: Contextual analysis of filesystem traces in forensic science, Journal of Forensic Sciences, vol. 63(5), pp. 1383\u20131391, 2018.","DOI":"10.1111\/1556-4029.13722"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"K. Chow, F. Law, M. Kwan and P. Lai, The rules of time in an NTFS filesystem, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 71\u201385, 2007.","DOI":"10.1109\/SADFE.2007.22"},{"key":"1_CR21","unstructured":"F. Cohen, Digital Forensic Evidence Examination, Fred Cohen and Associates, Livermore, California, 2012."},{"key":"1_CR22","unstructured":"X. Ding and H. Zou, Reliable time based forensics in NTFS, poster presented at the Twenty-Sixth Annual Computer Security Applications Conference, 2010."},{"key":"1_CR23","unstructured":"England and Wales High Court (Chancery Division), Patel v Patel, Case no. 133, London, United Kingdom, February 10, 2017."},{"key":"1_CR24","unstructured":"England and Wales High Court (Chancery Division), Yashwant Dahyabhai Patel v Girish Dahyabhai Patel and Others, Case no. 1588, London, United Kingdom, May 26, 2017."},{"key":"1_CR25","unstructured":"Google, Google Workspace Status Dashboard, Mountain View, California (www.google.com\/appsstatus\/dashboard\/summary), 2024."},{"key":"1_CR26","unstructured":"R. Harris, Selling Hitler, Pantheon Books, New York, 1986."},{"key":"1_CR27","unstructured":"O. Hilton, Scientific Examination of Questioned Documents, Revised Edition, Routledge and Littlefield, Lanham, Maryland, 1992."},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"S. Ho, D. Kao and W. Wu, Following the breadcrumbs: Timestamp pattern identification for cloud forensics, Digital Investigation, vol. 24, pp. 79\u201394, 2018.","DOI":"10.1016\/j.diin.2017.12.001"},{"key":"1_CR29","unstructured":"International Organization for Standardization, ISO 32000-2:2017, Document Management \u2013 Portable Document Format, Part 2: PDF 2.0, Geneva, Switzerland, 2017."},{"key":"1_CR30","unstructured":"International Organization for Standardization, ISO 32000-2:2020, Document Management \u2013 Portable Document Format, Part 2: PDF 2.0, Geneva, Switzerland, 2020."},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"N. Kapoor, P. Sulke, R. Shukla, R. Kakad, P. Pardeshi and A. Badiye, Forensic analytical approaches to the dating of documents: An overview, Microchemical Journal, vol. 170, article no. 106722, 2021.","DOI":"10.1016\/j.microc.2021.106722"},{"key":"1_CR32","unstructured":"R. Koen and M. Olivier, The use of file timestamps in digital forensics, in Proceedings of the ISSA 2008 Innovative Minds Conference, H. Venter, M. Eloff, J. Eloff and L. Labuschagne (Eds.), pp. 133\u2013148, 2008."},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"A. Mohamed and C. Khalid, Detection of timestamp tampering in NTFS using machine learning, Procedia Computer Science, vol. 160, pp. 778\u2013784, 2019.","DOI":"10.1016\/j.procs.2019.11.011"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"M. Olivier, Digital forensics and the big data deluge \u2013 Some concerns based on Ramsey theory, in Advances in Digital Forensics XVI, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 3\u201323, 2020.","DOI":"10.1007\/978-3-030-56223-6_1"},{"key":"1_CR35","unstructured":"A. Osborn, Questioned Documents: A Study of Questioned Documents with an Outline of Methods by Which the Facts May be Discovered and Shown, Lawyers\u2019 Cooperative Publishing Company, Rochester, New York, 1910."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"D. Palmbach and F. Breitinger, Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability, Forensic Science International: Digital Investigation, vol. 32(S), article no. 300920, 2020.","DOI":"10.1016\/j.fsidi.2020.300920"},{"key":"1_CR37","unstructured":"J. Peters, Gmail had two outages this week that delayed emails, The Verge, December 1, 2023."},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"M. Peyravian, A. Roginsky and A. Kshemkalyani, On probabilities of hash value matches, Computers and Security, vol. 17(2), pp. 171\u2013176, 1998.","DOI":"10.1016\/S0167-4048(97)82016-0"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"H. Pieterse, M. Olivier and R. van Heerden, Playing hide-and-seek: Detecting the manipulation of Android timestamps, in Proceedings of the Fourteenth Information Security for South Africa Conference, H. Venter, M. Loock, M. Coetzee, M. Eloff and S. Flowerday (Eds.), 2015.","DOI":"10.1109\/ISSA.2015.7335065"},{"key":"1_CR40","unstructured":"R. Pike and K. Thompson, Hello world, Proceedings of the USENIX Winter 1993 Conference Proceedings, pp. 43\u201350, 1993."},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"K. Rani and C. Sharma, Tampering detection of distributed databases using blockchain technology, Proceedings of the Twelfth International Conference on Contemporary Computing, 2019.","DOI":"10.1109\/IC3.2019.8844938"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"D. Spennemann and R. Spennemann, Establishing genealogies of born digital content: The suitability of revision identifier (RSID) numbers in MS Word for forensic enquiry, Publications, vol. 11(3), article no. 35, 2023.","DOI":"10.3390\/publications11030035"},{"key":"1_CR43","unstructured":"Supreme Court of Appeal, Van der Merwe v Master of the High Court and Another, Case no. 605\/09, Bloemfontein, South Africa, September 6, 2010."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:14:55Z","timestamp":1745320495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}