Abstract
In this paper we describe methods for forensic charac-
terization of devices. This is important in verifying the
trust and authenticity of data and the device that created
it. We will present and examine current forensic identica-
tion techniques for RF devices, printers, cameras, and show
how these techniques can be generalized for use with other
devices.