Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography
Abstract
Digital evidence is defined as information and data of value to an investigation that is stored on received or transmitted by an electronic device. Investigation takes time to prove against the intruder .The internal and external tampering can happen. Data must be collected and preserved by investigator. By cloning or imaging data can be copied to another drive. Thus Original data can be prevented from the analyzer and intruder. A data base where evidence is analyzed on the device that generates it, can be transmitted from multiple sources to a server using a novel signature scheme which can be easily falsified. Data can be changed into fake or true by working on evidence. Hence data can be preserved by falsification detection. Encrypted data can be recovered and morphed image can be detected by data hiding process. Email is the communication tool which can have much evidence by email header analysis to find the victims contacts and stores as evidence.
Keywords
Full Text:
PDFReferences
Hiroyuki Date SECOM Co., Ltd.Intelligent Systems LaboratoryMitaka, Tokyo 181-8528 h-date@secom.co.jp “Gringotts: Securing Data for Digital Evidence”, 2014
Shweta Tripathi, Bandu Baburao Meshram,”Digital Evidence for Database Tamper Detection” revised February 5, 2012, Published Online April 2012
Mark B. SchmidtSt. Cloud State University “Steganography: Forensic, Security, and Legal Issues Journal of Digital Forensics”, Security and Law, Vol. 3(2), 2014
Rafael Accorsi Department of Telematics University of Freiburg, Germany “Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges “Sept. 2009
Jong Youl Choi, Philippe Golle, and Markus Jakobsson ,”Tamper-Evident Digital Signatures” 2006
Nicolai Kuntze, Carsten Rudolph “Secure digital chains of evidence”, 2010
Nicolai Kuntze, Carsten Rudolph, Thomas Kemmerich, Barbara EndicottPopovsky “Scenarios for Reliable And Secure Digital Evidence” 2001
J. Philip Craiger, Jeff Swaugerb, Chris Marberry National Center for Forensic Science & Department of Engineering Technology, University of Central Florida, Orlando, FL 32816 National Center for Forensic Science, University of Central Florida, Orlando, FL 32816. “Digital evidence obfuscation: recovery techniques”2005
Anant M.Bagade* and Sanjay N.Talbar** J Inf” “A High Quality Steganographic Method Using Morphing Process “Syst, Vol.10, No.2, pp.256~270, June 2014
Vandana M.Ladwani1, Srikanta Murthy K2 Asst.Professor, CSE Department, PESIT(BSC),Bangalore,India1 International Journal of Advanced Research in Computer and Communication EngineeringVol. 4, Issue 1, January 2015 Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4149 224”A New Approach to Securing Images” January 2015
S. Gupta ; Dept. of Computer Science & Engineering, Malaviya National Institute of Technology, Jaipur, India ; E. S. Pilli ; P. Mishra ; S.Pundir “Forensicsanalysis of E-mail address spoofing” 25-26 Sept. 2014
M. Tariq Banday University of Kashmir India Journal of Digital Forensics, Security and Law, Vol. 6(2),” Analysing E-Mail Headers for Forensic Investigation” 2010
Dilpreet Singh Bajwa et al , International Journal of Computer Science & Communication Networks,Vol 5(3), “Review of E-mail System, Security Protocols and Email Forensics “2011
Gori Mohamed .J, M. Mohammed Mohideen, Mrs.Shahira Banu. N, “E-Mail Phishing-An Open Threat to Everyone”, International Journal of Scientific and Research Publications, Vol-4, No.-2, Feb-2014.
Justin Paglierani, Mike Mabey, Gail-Joon Ahn, “Towards Comprehensive and Collaborative Forensics on Email Evidence”, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2013.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.