2022
DOI: 10.3390/sym14020334
|View full text |Cite
|
Sign up to set email alerts
|

A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain

Abstract: Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (CoC) is a critical component of the digital evidence procedure. The aim of the CoC is to demonstrate that the evidence has not been tampered with at any point throughout the investigation. Because the uncertainty associated with digital evidence is not being assess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 33 publications
0
7
0
1
Order By: Relevance
“…First is the integration of blockchain technology into cloud forensics, offering methods and architectures that enhance the credibility, effectiveness, and security of forensic investigations in digital environments mostly related to the chain of custody (CoC). The central focus of [3][4][5][6][7][8][9][10][11][12][13][14][15] was the utilization of blockchain technology for ensuring the integrity, traceability, and privacy of digital evidence and CoC in digital forensics. Some of the solutions for specific use cases such as image forensics, healthcare, and finance were generally discussed, as well as blockchain integration with computer forensics in the context of CoC.…”
Section: Chain-of-custody Integration With Blockchainmentioning
confidence: 99%
See 1 more Smart Citation
“…First is the integration of blockchain technology into cloud forensics, offering methods and architectures that enhance the credibility, effectiveness, and security of forensic investigations in digital environments mostly related to the chain of custody (CoC). The central focus of [3][4][5][6][7][8][9][10][11][12][13][14][15] was the utilization of blockchain technology for ensuring the integrity, traceability, and privacy of digital evidence and CoC in digital forensics. Some of the solutions for specific use cases such as image forensics, healthcare, and finance were generally discussed, as well as blockchain integration with computer forensics in the context of CoC.…”
Section: Chain-of-custody Integration With Blockchainmentioning
confidence: 99%
“…Some of the solutions for specific use cases such as image forensics, healthcare, and finance were generally discussed, as well as blockchain integration with computer forensics in the context of CoC. Ali et al [3] introduced a novel technique that integrates fuzzy hashing within blockchain structures, primarily used for image forensics. Both Yan et al [4] and Silva et al [5] presented frameworks based on blockchain technology that emphasize the importance of traceability and integrity in the chain of custody.…”
Section: Chain-of-custody Integration With Blockchainmentioning
confidence: 99%
“…In [23], the authors suggest standardising smart contracts for a secure and reliable chain of custody process, but note that a holistic approach, including robust evidence and participant management, is necessary. The work in [24] evaluates the effectiveness of fuzzy hashing algorithms in preserving the integrity of digital evidence in image forensics compared to conventional cryptographic hash algorithms, showing that fuzzy hash-based blockchain effectively supports the chain of custody process.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Chain of custody is often a problem when dealing with digital evidence. The chain of custody plays a crucial role in digital forensic investigations by keeping track of every detail of digital evidence as it passes through different organisational levels [5]. Metadata on the method, time, place, and people who handled the data during its acquisition, processing, storage, and eventual use in investigations are all recorded by chain of custody.…”
Section: Introductionmentioning
confidence: 99%