Validating of digital forensic images using SHA-256

dc.contributor.authorQuist-Aphetsi K.
dc.contributor.authorSenkyire I.B.
dc.date.accessioned2025-03-06T18:11:43Z
dc.date.accessioned2025-03-06T18:59:01Z
dc.date.issued2019
dc.description.abstractVolumes of digital images are produced per time, whiles these digital images may be for friendly and or social activities they can be manipulated for illegal purposes. Sensitive digital images have been a core part of security correspondences between sensitive institutions. Such sensitive digital images security has been a prime concern. The advancement in technology has made it easy for unauthorized persons to manipulate and illegally use sensitive digital images that are been acquired, processed, compressed, stored, broadcasted, and reproduced. This has necessitated the authentication of digital images. In this paper we propose SHA - 256 to validate digital forensic images. � 2019 IEEE.
dc.identifier.doi10.1109/ICSIoT47925.2019.00028
dc.identifier.isbn978-172817417-4
dc.identifier.urihttp://162.250.124.58:4000/handle/123456789/414
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.sourceProceedings - 2019 International Conference on Cyber Security and Internet of Things, ICSIoT 2019
dc.subjectAuthentication
dc.subjectCryptographic
dc.subjectEncrypt
dc.subjectHash function
dc.subjectImage
dc.subjectSHA - 256
dc.titleValidating of digital forensic images using SHA-256
dc.typeOther
oaire.citation.conferenceDate29 May 2019 through 31 May 2019
oaire.citation.conferencePlaceAccra

Files