{"title":"用于取证目的的数字证据篡改检测","authors":"H. D. Ortiz, R. Diego, L. DoraM.Ballesteros","doi":"10.17230/INGCIENCIA.13.27.3","DOIUrl":null,"url":null,"abstract":"In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.","PeriodicalId":30405,"journal":{"name":"Ingenieria y Ciencia","volume":" ","pages":"53-74"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Tampering Detection on Digital Evidence for Forensics Purposes\",\"authors\":\"H. D. Ortiz, R. Diego, L. DoraM.Ballesteros\",\"doi\":\"10.17230/INGCIENCIA.13.27.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.\",\"PeriodicalId\":30405,\"journal\":{\"name\":\"Ingenieria y Ciencia\",\"volume\":\" \",\"pages\":\"53-74\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ingenieria y Ciencia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17230/INGCIENCIA.13.27.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ingenieria y Ciencia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17230/INGCIENCIA.13.27.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tampering Detection on Digital Evidence for Forensics Purposes
In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.