{"title":"A Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function","authors":"Isaac Baffour Senkyire, Q. Kester","doi":"10.1109/ICCMA53594.2021.00033","DOIUrl":null,"url":null,"abstract":"The current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function..","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMA53594.2021.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function..