{"title":"基于SHA 384哈希函数的法医数字数据存储与保存密码篡改检测方法","authors":"Isaac Baffour Senkyire, Q. Kester","doi":"10.1109/ICCMA53594.2021.00033","DOIUrl":null,"url":null,"abstract":"The current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function..","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function\",\"authors\":\"Isaac Baffour Senkyire, Q. Kester\",\"doi\":\"10.1109/ICCMA53594.2021.00033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function..\",\"PeriodicalId\":131082,\"journal\":{\"name\":\"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMA53594.2021.00033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMA53594.2021.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function
The current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function..