Tampering Detection on Digital Evidence for Forensics Purposes

In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the e...

Full description

Autores:
Duvan Ortiz, Héctor
Renza. Diego
Ballesteros L., Dora M.
Tipo de recurso:
Fecha de publicación:
2018
Institución:
Universidad EAFIT
Repositorio:
Repositorio EAFIT
Idioma:
spa
OAI Identifier:
oai:repository.eafit.edu.co:10784/13191
Acceso en línea:
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818
http://hdl.handle.net/10784/13191
Palabra clave:
Watermarking
Fragile watermarking
Digital forensics
Tampering detection
Collatz conjecture
Marcado de agua
Marcado frágil
Multimedia forense
Detección de manipulaciones
Conjetura de Collatz
Rights
License
Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.
id REPOEAFIT2_390c12899e9d5d8b28189f60f1df3eb7
oai_identifier_str oai:repository.eafit.edu.co:10784/13191
network_acronym_str REPOEAFIT2
network_name_str Repositorio EAFIT
repository_id_str
spelling 2018-06-142018-11-16T16:28:59Z2018-06-142018-11-16T16:28:59Z2256-43141794-9165http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818http://hdl.handle.net/10784/1319110.17230/ingciencia.13.27.3In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.En términos de evidencia digital, la imagen de la escena de un crimen es un elemento importante en un proceso legal; razón por la cual es indispensable que se garantice su cadena de custodia. Si la imagen es modificada con operaciones como eliminación, duplicidad o difuminado de objetos, debe existir un mecanismo que identifique la existencia de dicha manipulación. En este proyecto, se propone una solución a la cadena de custodia basada en una técnica conocida como marcado de agua. Con el propósito de validar la sensibilidad y efectividad del sistema propuesto, se aplican seis clases de manipulaciones a imágenes marcadas; encontrando una alta sensibilidad a manipulaciones pequeñas (ej. 0.25% del tamaño de la imagen), dado que en todos los casos fue identificada la manipulación. Con la solución propuesta, la autoridad legal puede confiar en la cadena de custodia de la evidencia digital.application/pdfspaUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.Attribution 4.0 International (CC BY 4.0)http://creativecommons.org/licenses/by/4.0Acceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia; Vol 14 No 27 (2018); 53-74Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74Tampering Detection on Digital Evidence for Forensics PurposesDetección de manipulaciones en evidencia digital con fines forensesinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionarticlepublishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1WatermarkingFragile watermarkingDigital forensicsTampering detectionCollatz conjectureMarcado de aguaMarcado frágilMultimedia forenseDetección de manipulacionesConjetura de CollatzDuvan Ortiz, HéctorRenza. DiegoBallesteros L., Dora M.Universidad Militar Nueva GranadaIngeniería y Ciencia14275374ing.ciencTHUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/185832b3-962b-4fb3-be3b-d22da277df57/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument (4).pdfdocument (4).pdfTexto completo PDFapplication/pdf4296041https://repository.eafit.edu.co/bitstreams/959ea1d1-73b2-4de2-abb2-975c14f12ef0/downloadecbd7100c759831ac886207981dabe24MD52articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/c77ea30f-d402-4941-880b-d0bdc4904061/download733a17d9724e76f16d9d677de312f509MD5310784/13191oai:repository.eafit.edu.co:10784/131912020-03-01 12:47:22.75http://creativecommons.org/licenses/by/4.0Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co
dc.title.eng.fl_str_mv Tampering Detection on Digital Evidence for Forensics Purposes
dc.title.spa.fl_str_mv Detección de manipulaciones en evidencia digital con fines forenses
title Tampering Detection on Digital Evidence for Forensics Purposes
spellingShingle Tampering Detection on Digital Evidence for Forensics Purposes
Watermarking
Fragile watermarking
Digital forensics
Tampering detection
Collatz conjecture
Marcado de agua
Marcado frágil
Multimedia forense
Detección de manipulaciones
Conjetura de Collatz
title_short Tampering Detection on Digital Evidence for Forensics Purposes
title_full Tampering Detection on Digital Evidence for Forensics Purposes
title_fullStr Tampering Detection on Digital Evidence for Forensics Purposes
title_full_unstemmed Tampering Detection on Digital Evidence for Forensics Purposes
title_sort Tampering Detection on Digital Evidence for Forensics Purposes
dc.creator.fl_str_mv Duvan Ortiz, Héctor
Renza. Diego
Ballesteros L., Dora M.
dc.contributor.author.none.fl_str_mv Duvan Ortiz, Héctor
Renza. Diego
Ballesteros L., Dora M.
dc.contributor.affiliation.spa.fl_str_mv Universidad Militar Nueva Granada
dc.subject.keyword.eng.fl_str_mv Watermarking
Fragile watermarking
Digital forensics
Tampering detection
Collatz conjecture
topic Watermarking
Fragile watermarking
Digital forensics
Tampering detection
Collatz conjecture
Marcado de agua
Marcado frágil
Multimedia forense
Detección de manipulaciones
Conjetura de Collatz
dc.subject.keyword.spa.fl_str_mv Marcado de agua
Marcado frágil
Multimedia forense
Detección de manipulaciones
Conjetura de Collatz
description In terms of digital evidence, images of a crime scene play an important role in a legal process; therefore it is essential to guarantee their chain of custody. If the image is tampered with operations such as cropping, duplicity or blurring of objects, there must be a mechanism that identifies the existence of such manipulation. In this paper, a solution to the chain of custody based on a technique known as watermarking is proposed. In order to validate the sensitivity and effectiveness of the proposed system, six classes of manipulations are applied to watermarked images; finding a high sensitivity to small manipulations (e.g 0.25% of the image size), since in all cases the manipulation was identified. With the proposed solution, legal authority can rely on the chain of custody of the digital evidence.
publishDate 2018
dc.date.available.none.fl_str_mv 2018-11-16T16:28:59Z
dc.date.issued.none.fl_str_mv 2018-06-14
dc.date.accessioned.none.fl_str_mv 2018-11-16T16:28:59Z
dc.date.none.fl_str_mv 2018-06-14
dc.type.eng.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
article
publishedVersion
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.local.spa.fl_str_mv Artículo
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2256-4314
1794-9165
dc.identifier.uri.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818
http://hdl.handle.net/10784/13191
dc.identifier.doi.none.fl_str_mv 10.17230/ingciencia.13.27.3
identifier_str_mv 2256-4314
1794-9165
10.17230/ingciencia.13.27.3
url http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818
http://hdl.handle.net/10784/13191
dc.language.iso.none.fl_str_mv spa
language spa
dc.relation.isversionof.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/4818
dc.rights.eng.fl_str_mv Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.
Attribution 4.0 International (CC BY 4.0)
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by/4.0
dc.rights.local.spa.fl_str_mv Acceso abierto
rights_invalid_str_mv Copyright (c) 2018 Héctor Duvan Ortiz, Diego Renza, Dora M. Ballesteros L.
Attribution 4.0 International (CC BY 4.0)
http://creativecommons.org/licenses/by/4.0
Acceso abierto
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad EAFIT
dc.source.none.fl_str_mv instname:Universidad EAFIT
reponame:Repositorio Institucional Universidad EAFIT
dc.source.eng.fl_str_mv Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74
dc.source.spa.fl_str_mv Ingeniería y Ciencia; Vol 14 No 27 (2018); 53-74
instname_str Universidad EAFIT
institution Universidad EAFIT
reponame_str Repositorio Institucional Universidad EAFIT
collection Repositorio Institucional Universidad EAFIT
bitstream.url.fl_str_mv https://repository.eafit.edu.co/bitstreams/185832b3-962b-4fb3-be3b-d22da277df57/download
https://repository.eafit.edu.co/bitstreams/959ea1d1-73b2-4de2-abb2-975c14f12ef0/download
https://repository.eafit.edu.co/bitstreams/c77ea30f-d402-4941-880b-d0bdc4904061/download
bitstream.checksum.fl_str_mv da9b21a5c7e00c7f1127cef8e97035e0
ecbd7100c759831ac886207981dabe24
733a17d9724e76f16d9d677de312f509
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad EAFIT
repository.mail.fl_str_mv repositorio@eafit.edu.co
_version_ 1814110109003939840