scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Proceedings ArticleDOI
13 Apr 2015
TL;DR: The proposed framework improves the investigation efficiency using Data Warehouse (DW) concept, which provides a selective evidence identification, collection and analysis, so, only relevant data is investigated instead of investigating the entire user data.
Abstract: In this paper, we have proposed the design of an efficient computer forensics investigation framework The proposed framework improves the investigation efficiency using Data Warehouse (DW) concept, which provides a selective evidence identification, collection and analysis So, only relevant data is investigated instead of investigating the entire user data The proposed framework consists of a Data Warehouse Engine (DWE) to selectively identify, collect and analyze digital evidences from multiple digital resources A Digital Evidence Preservation (DEP) mechanism is also introduced for preservation of the collected digital evidences whose authenticity is ensured using cryptographic techniques An access control mechanism is implemented to allow only authorized investigator to access the preserved digital evidences The DEP mechanism provides court of law with a Secure Forensic Audit Trial (SFAT) that helps in tracking happened activities on the collected evidences for ensuring the authenticity and reliability of the presented digital evidence

11 citations

Journal ArticleDOI
TL;DR: Digital forensics analysts must be prepared to provide both proper lay testimony on cell phones as well as details and justifications for their own tools, techniques, and qualifications as required by Daubert and Federal Rule of Evid...
Abstract: Digital systems are found in a number of casual consumer tools, including cellular telephones. Their prevalence in society is matched by a growing presence as evidence in civil and criminal court cases. The current survey research suggests that cell phones and their potential evidence may be found in over half of all violent crime and even more substantially in drug crimes in some jurisdiction. The police commander respondents to this survey reported that cell phones had been used as evidence via lay testimony and expert analysis in their jurisdictions. Such evidence may face increasing judicial challenges in the future as the specialized nature of the analysis, even with commercially available, easy-to-use practices, goes “well beyond that of the average layperson.” Digital forensics analysts must be prepared to provide both proper lay testimony on cell phones as well as details and justifications for their own tools, techniques, and qualifications as required by Daubert and Federal Rule of Evid...

11 citations

DissertationDOI
01 Jan 2009
TL;DR: This work proposes to consider a chain of digital evidence as a multi-component validation problem that ensures the security of access control, confidentiality, integrity, and non-repudiation of origin and offers contributions to many of the fields used in the formation of the framework.
Abstract: Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence. Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses.

11 citations

Journal ArticleDOI
TL;DR: The current position in English law is examined to show the advantages and problems of pre-trial meetings between experts.

11 citations

Proceedings ArticleDOI
07 Nov 2005
TL;DR: An integrated image authentication system for digital forensics is proposed and the improved detection schemes effectively solve the detection problems and take into account the reliability, the security, and the practicability of the system.
Abstract: With the advent of digital times, the digital data has gradually taken the place of the original analog data. However, the authenticity of digital data faces a great challenge due to the fact that the digital edit software is ubiquitous. It has aroused the suspicion on the reliability of digital data especially when the digital data renders to the court as the digital evidence. We propose an integrated image authentication system for digital forensics and improve the detection problems of a DCT quantization-based image authentication scheme. The improved detection schemes effectively solve the detection problems and, at the same time, take into account the reliability, the security, and the practicability of the system. It is expected to reduce the wrong detection probability of the digital evidence. Finally, the improved image authentication schemes are implemented. If the digital evidence presented to the court is under suspicions, the system is expected to provide accurate information to help the judiciary to make the verdict right and objective.

11 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111