A Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function

dc.contributor.authorSenkyire I.B.
dc.contributor.authorKester Q.-A.
dc.date.accessioned2025-03-06T18:11:43Z
dc.date.accessioned2025-03-06T18:58:54Z
dc.date.issued2021
dc.description.abstractThe current age permits for legal, official, sensitive, and confidential documents to be exchanged using digital channels among stakeholders. In this digital age, new advances in technology are tremendously vital creating more sophisticated and intelligent tools in areas like informatics, electronics, and telecommunication. In the wake of these new advances, any individual can digitize any kind of document, and modern computing tools can alter all these using computational drawing tools, such as GIMP or Paint Shop Pro, without causing any distortions hence, tampered documents can be presented with the same quality as the original documents. Documents tampered, when used or distributed illegally can cause economic, political, legal and moral damages to individuals and organizations. In this paper, we propose to detect the tampering of documents using SHA-384 hash function.. � 2021 IEEE
dc.identifier.doi10.1109/ICCMA53594.2021.00033
dc.identifier.isbn978-166542567-4
dc.identifier.urihttp://162.250.124.58:4000/handle/123456789/332
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.sourceProceedings - 2021 International Conference on Computing, Computational Modelling and Applications, ICCMA 2021
dc.subjectContent authentication
dc.subjectCryptographic
dc.subjectHash function
dc.subjectSHA - 384
dc.subjectTamper detection
dc.titleA Cryptographic Tamper Detection Approach for Storage and Preservation of Forensic Digital Data Based on SHA 384 Hash Function
dc.typeOther
oaire.citation.conferenceDate14 July 2021 through 16 July 2021
oaire.citation.conferencePlaceBrest

Files