Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography


Affiliations
1 Department of M.Tech (ISCF), India
2 CSE, India
     

   Subscribe/Renew Journal


Digital evidence is defined as information and data of value to an investigation that is stored on received or transmitted by an electronic device. Investigation takes time to prove against the intruder .The internal and external tampering can happen. Data must be collected and preserved by investigator. By cloning or imaging data can be copied to another drive. Thus Original data can be prevented from the analyzer and intruder. A data base where evidence is analyzed on the device that generates it, can be transmitted from multiple sources to a server using a novel signature scheme which can be easily falsified. Data can be changed into fake or true by working on evidence. Hence data can be preserved by falsification detection. Encrypted data can be recovered and morphed image can be detected by data hiding process. Email is the communication tool which can have much evidence by email header analysis to find the victims contacts and stores as evidence.


Keywords

Digital Evidence, Collection, Preservation Falsification, Tampering Detection, Cryptography, Steganography, Integrity Data.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 219

PDF Views: 2




  • Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography

Abstract Views: 219  |  PDF Views: 2

Authors

K. Saranya
Department of M.Tech (ISCF), India
P. Kavitha
CSE, India

Abstract


Digital evidence is defined as information and data of value to an investigation that is stored on received or transmitted by an electronic device. Investigation takes time to prove against the intruder .The internal and external tampering can happen. Data must be collected and preserved by investigator. By cloning or imaging data can be copied to another drive. Thus Original data can be prevented from the analyzer and intruder. A data base where evidence is analyzed on the device that generates it, can be transmitted from multiple sources to a server using a novel signature scheme which can be easily falsified. Data can be changed into fake or true by working on evidence. Hence data can be preserved by falsification detection. Encrypted data can be recovered and morphed image can be detected by data hiding process. Email is the communication tool which can have much evidence by email header analysis to find the victims contacts and stores as evidence.


Keywords


Digital Evidence, Collection, Preservation Falsification, Tampering Detection, Cryptography, Steganography, Integrity Data.