Validating of digital forensic images using SHA-256
| dc.contributor.author | Quist-Aphetsi K. | |
| dc.contributor.author | Senkyire I.B. | |
| dc.date.accessioned | 2025-03-06T18:11:43Z | |
| dc.date.accessioned | 2025-03-06T18:59:01Z | |
| dc.date.issued | 2019 | |
| dc.description.abstract | Volumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern. The advancement in technology has made it easy for unauthorized persons to manipulate and illegally use sensitive digital images that are been acquired, processed, compressed, stored, broadcasted, and reproduced. This has necessitated the authentication of digital images. In this paper we propose SHA - 256 to validate digital forensic images. � 2019 IEEE. | |
| dc.identifier.doi | 10.1109/ICSIoT47925.2019.00028 | |
| dc.identifier.isbn | 978-172817417-4 | |
| dc.identifier.uri | http://162.250.124.58:4000/handle/123456789/414 | |
| dc.language.iso | en | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.source | Proceedings - 2019 International Conference on Cyber Security and Internet of Things, ICSIoT 2019 | |
| dc.subject | Authentication | |
| dc.subject | Cryptographic | |
| dc.subject | Encrypt | |
| dc.subject | Hash function | |
| dc.subject | Image | |
| dc.subject | SHA - 256 | |
| dc.title | Validating of digital forensic images using SHA-256 | |
| dc.type | Other | |
| oaire.citation.conferenceDate | 29 May 2019 through 31 May 2019 | |
| oaire.citation.conferencePlace | Accra |
