2022
DOI: 10.1109/access.2022.3147809
|View full text |Cite
|
Sign up to set email alerts
|

Improving Uncertainty in Chain of Custody for Image Forensics Investigation Applications

Abstract: Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (CoC) is a critical component of the digital evidence procedure. The aim of the CoC is to demonstrate that the evidence has not been tampered with at any point throughout the investigation. Because the uncertainty associated with digital evidence is not being assess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Maintaining a secure chain of custody-documenting every step of the evidence handling process from collection to presentation-is essential to demonstrate that the evidence has not been tampered with. This process can be technically challenging, especially when dealing with digital evidence that can be easily modified or corrupted [40][41][42][43][44][45][46][47][48].…”
Section: Data Integrity and Chain Of Custodymentioning
confidence: 99%
“…Maintaining a secure chain of custody-documenting every step of the evidence handling process from collection to presentation-is essential to demonstrate that the evidence has not been tampered with. This process can be technically challenging, especially when dealing with digital evidence that can be easily modified or corrupted [40][41][42][43][44][45][46][47][48].…”
Section: Data Integrity and Chain Of Custodymentioning
confidence: 99%
“…The hash value of each file item inside the evidence is computed, and known files are filtered for the freshly computed hash value data [18]. The file filtering technique is significant in forensically examining file systems, for example, examining file similarities, as in [19], and examining file types, as in [20]. A limitation of this technique, however, is that it cannot be applied to corrupted files.…”
Section: Digital Forensics Analysismentioning
confidence: 99%
“…The implementation of the tool would assist minor departments in eliminating the manual chain of custody process and storing information securely for an extended period without risk of modification. According to Elgohary et al (2022), the paper acknowledges the need for supplementary enhancements, such as adding a search engine and a data grouping feature, to facilitate access to information and patterns in similar cases. Overall, the research was successful in accomplishing its goal of developing a chain of custody data visualisation tool based on time.…”
Section: Chain Of Custodymentioning
confidence: 99%