Tampering Detection on Digital Evidence for Forensics Purposes
In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the e...
- Autores:
-
Duvan Ortiz, Héctor
Renza. Diego
Ballesteros L., Dora M.
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad EAFIT
- Repositorio:
- Repositorio EAFIT
- Idioma:
- spa
- OAI Identifier:
- oai:repository.eafit.edu.co:10784/13191
- Acceso en línea:
- http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818
http://hdl.handle.net/10784/13191
- Palabra clave:
- Watermarking
Fragile watermarking
Digital forensics
Tampering detection
Collatz conjecture
Marcado de agua
Marcado frágil
Multimedia forense
Detección de manipulaciones
Conjetura de Collatz
- Rights
- License
- Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.
id |
REPOEAFIT2_390c12899e9d5d8b28189f60f1df3eb7 |
---|---|
oai_identifier_str |
oai:repository.eafit.edu.co:10784/13191 |
network_acronym_str |
REPOEAFIT2 |
network_name_str |
Repositorio EAFIT |
repository_id_str |
|
spelling |
2018-06-142018-11-16T16:28:59Z2018-06-142018-11-16T16:28:59Z2256-43141794-9165http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818http://hdl.handle.net/10784/1319110.17230/ingciencia.13.27.3In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.En términos de evidencia digital, la imagen de la escena de un crimen es un elemento importante en un proceso legal; razón por la cual es indispensable que se garantice su cadena de custodia. Si la imagen es modificada con operaciones como eliminación, duplicidad o difuminado de objetos, debe existir un mecanismo que identifique la existencia de dicha manipulación. En este proyecto, se propone una solución a la cadena de custodia basada en una técnica conocida como marcado de agua. Con el propósito de validar la sensibilidad y efectividad del sistema propuesto, se aplican seis clases de manipulaciones a imágenes marcadas; encontrando una alta sensibilidad a manipulaciones pequeñas (ej. 0.25% del tamaño de la imagen), dado que en todos los casos fue identificada la manipulación. Con la solución propuesta, la autoridad legal puede confiar en la cadena de custodia de la evidencia digital.application/pdfspaUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.Attribution 4.0 International (CC BY 4.0)http://creativecommons.org/licenses/by/4.0Acceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia; Vol 14 No 27 (2018); 53-74Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74Tampering Detection on Digital Evidence for Forensics PurposesDetección de manipulaciones en evidencia digital con fines forensesinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionarticlepublishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1WatermarkingFragile watermarkingDigital forensicsTampering detectionCollatz conjectureMarcado de aguaMarcado frágilMultimedia forenseDetección de manipulacionesConjetura de CollatzDuvan Ortiz, HéctorRenza. DiegoBallesteros L., Dora M.Universidad Militar Nueva GranadaIngeniería y Ciencia14275374ing.ciencTHUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/185832b3-962b-4fb3-be3b-d22da277df57/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument (4).pdfdocument (4).pdfTexto completo PDFapplication/pdf4296041https://repository.eafit.edu.co/bitstreams/959ea1d1-73b2-4de2-abb2-975c14f12ef0/downloadecbd7100c759831ac886207981dabe24MD52articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/c77ea30f-d402-4941-880b-d0bdc4904061/download733a17d9724e76f16d9d677de312f509MD5310784/13191oai:repository.eafit.edu.co:10784/131912020-03-01 12:47:22.75http://creativecommons.org/licenses/by/4.0Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co |
dc.title.eng.fl_str_mv |
Tampering Detection on Digital Evidence for Forensics Purposes |
dc.title.spa.fl_str_mv |
Detección de manipulaciones en evidencia digital con fines forenses |
title |
Tampering Detection on Digital Evidence for Forensics Purposes |
spellingShingle |
Tampering Detection on Digital Evidence for Forensics Purposes Watermarking Fragile watermarking Digital forensics Tampering detection Collatz conjecture Marcado de agua Marcado frágil Multimedia forense Detección de manipulaciones Conjetura de Collatz |
title_short |
Tampering Detection on Digital Evidence for Forensics Purposes |
title_full |
Tampering Detection on Digital Evidence for Forensics Purposes |
title_fullStr |
Tampering Detection on Digital Evidence for Forensics Purposes |
title_full_unstemmed |
Tampering Detection on Digital Evidence for Forensics Purposes |
title_sort |
Tampering Detection on Digital Evidence for Forensics Purposes |
dc.creator.fl_str_mv |
Duvan Ortiz, Héctor Renza. Diego Ballesteros L., Dora M. |
dc.contributor.author.none.fl_str_mv |
Duvan Ortiz, Héctor Renza. Diego Ballesteros L., Dora M. |
dc.contributor.affiliation.spa.fl_str_mv |
Universidad Militar Nueva Granada |
dc.subject.keyword.eng.fl_str_mv |
Watermarking Fragile watermarking Digital forensics Tampering detection Collatz conjecture |
topic |
Watermarking Fragile watermarking Digital forensics Tampering detection Collatz conjecture Marcado de agua Marcado frágil Multimedia forense Detección de manipulaciones Conjetura de Collatz |
dc.subject.keyword.spa.fl_str_mv |
Marcado de agua Marcado frágil Multimedia forense Detección de manipulaciones Conjetura de Collatz |
description |
In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence. |
publishDate |
2018 |
dc.date.available.none.fl_str_mv |
2018-11-16T16:28:59Z |
dc.date.issued.none.fl_str_mv |
2018-06-14 |
dc.date.accessioned.none.fl_str_mv |
2018-11-16T16:28:59Z |
dc.date.none.fl_str_mv |
2018-06-14 |
dc.type.eng.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion article publishedVersion |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.local.spa.fl_str_mv |
Artículo |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2256-4314 1794-9165 |
dc.identifier.uri.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818 http://hdl.handle.net/10784/13191 |
dc.identifier.doi.none.fl_str_mv |
10.17230/ingciencia.13.27.3 |
identifier_str_mv |
2256-4314 1794-9165 10.17230/ingciencia.13.27.3 |
url |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818 http://hdl.handle.net/10784/13191 |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.isversionof.none.fl_str_mv |
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818 |
dc.rights.eng.fl_str_mv |
Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L. Attribution 4.0 International (CC BY 4.0) |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.none.fl_str_mv |
http://creativecommons.org/licenses/by/4.0 |
dc.rights.local.spa.fl_str_mv |
Acceso abierto |
rights_invalid_str_mv |
Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L. Attribution 4.0 International (CC BY 4.0) http://creativecommons.org/licenses/by/4.0 Acceso abierto http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad EAFIT |
dc.source.none.fl_str_mv |
instname:Universidad EAFIT reponame:Repositorio Institucional Universidad EAFIT |
dc.source.eng.fl_str_mv |
Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74 |
dc.source.spa.fl_str_mv |
Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74 |
instname_str |
Universidad EAFIT |
institution |
Universidad EAFIT |
reponame_str |
Repositorio Institucional Universidad EAFIT |
collection |
Repositorio Institucional Universidad EAFIT |
bitstream.url.fl_str_mv |
https://repository.eafit.edu.co/bitstreams/185832b3-962b-4fb3-be3b-d22da277df57/download https://repository.eafit.edu.co/bitstreams/959ea1d1-73b2-4de2-abb2-975c14f12ef0/download https://repository.eafit.edu.co/bitstreams/c77ea30f-d402-4941-880b-d0bdc4904061/download |
bitstream.checksum.fl_str_mv |
da9b21a5c7e00c7f1127cef8e97035e0 ecbd7100c759831ac886207981dabe24 733a17d9724e76f16d9d677de312f509 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad EAFIT |
repository.mail.fl_str_mv |
repositorio@eafit.edu.co |
_version_ |
1814110109003939840 |