Open Access Open Access  Restricted Access Subscription or Fee Access

Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography

K. Saranya, P. Kavitha

Abstract


Digital evidence is defined as information and data of value to an investigation that is stored on received or transmitted by an electronic device. Investigation takes time to prove against the intruder .The internal and external tampering can happen. Data must be collected and preserved by investigator. By cloning or imaging data can be copied to another drive. Thus Original data can be prevented from the analyzer and intruder. A data base where evidence is analyzed on the device that generates it, can be transmitted from multiple sources to a server using a novel signature scheme which can be easily falsified. Data can be changed into fake or true by working on evidence. Hence data can be preserved by falsification detection. Encrypted data can be recovered and morphed image can be detected by data hiding process. Email is the communication tool which can have much evidence by email header analysis to find the victims contacts and stores as evidence.


Keywords


Digital Evidence, Collection, Preservation Falsification, Tampering Detection, Cryptography, Steganography, Integrity Data.

Full Text:

PDF

References


Hiroyuki Date SECOM Co., Ltd.Intelligent Systems LaboratoryMitaka, Tokyo 181-8528 h-date@secom.co.jp “Gringotts: Securing Data for Digital Evidence”, 2014

Shweta Tripathi, Bandu Baburao Meshram,”Digital Evidence for Database Tamper Detection” revised February 5, 2012, Published Online April 2012

Mark B. SchmidtSt. Cloud State University “Steganography: Forensic, Security, and Legal Issues Journal of Digital Forensics”, Security and Law, Vol. 3(2), 2014

Rafael Accorsi Department of Telematics University of Freiburg, Germany “Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges “Sept. 2009

Jong Youl Choi, Philippe Golle, and Markus Jakobsson ,”Tamper-Evident Digital Signatures” 2006

Nicolai Kuntze, Carsten Rudolph “Secure digital chains of evidence”, 2010

Nicolai Kuntze, Carsten Rudolph, Thomas Kemmerich, Barbara EndicottPopovsky “Scenarios for Reliable And Secure Digital Evidence” 2001

J. Philip Craiger, Jeff Swaugerb, Chris Marberry National Center for Forensic Science & Department of Engineering Technology, University of Central Florida, Orlando, FL 32816 National Center for Forensic Science, University of Central Florida, Orlando, FL 32816. “Digital evidence obfuscation: recovery techniques”2005

Anant M.Bagade* and Sanjay N.Talbar** J Inf” “A High Quality Steganographic Method Using Morphing Process “Syst, Vol.10, No.2, pp.256~270, June 2014

Vandana M.Ladwani1, Srikanta Murthy K2 Asst.Professor, CSE Department, PESIT(BSC),Bangalore,India1 International Journal of Advanced Research in Computer and Communication EngineeringVol. 4, Issue 1, January 2015 Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4149 224”A New Approach to Securing Images” January 2015

S. Gupta ; Dept. of Computer Science & Engineering, Malaviya National Institute of Technology, Jaipur, India ; E. S. Pilli ; P. Mishra ; S.Pundir “Forensicsanalysis of E-mail address spoofing” 25-26 Sept. 2014

M. Tariq Banday University of Kashmir India Journal of Digital Forensics, Security and Law, Vol. 6(2),” Analysing E-Mail Headers for Forensic Investigation” 2010

Dilpreet Singh Bajwa et al , International Journal of Computer Science & Communication Networks,Vol 5(3), “Review of E-mail System, Security Protocols and Email Forensics “2011

Gori Mohamed .J, M. Mohammed Mohideen, Mrs.Shahira Banu. N, “E-Mail Phishing-An Open Threat to Everyone”, International Journal of Scientific and Research Publications, Vol-4, No.-2, Feb-2014.

Justin Paglierani, Mike Mabey, Gail-Joon Ahn, “Towards Comprehensive and Collaborative Forensics on Email Evidence”, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.