Hashing and data Fingerprinting in digital Forensics

被引:26
|
作者
Roussev, Vassil [1 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
关键词
Digital forensics; Fingerprinting; Hashing; Security;
D O I
10.1109/MSP.2009.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the significant problems that need to be resolved to make 'hashing' an useful tool in digital forensic investigations, are discussed. Hashing of data can be used to validate data integrity and identify known content because of their high throughput and memory efficiency. A hash function can take an arbitrary string of binary data and produces a number, termed a digest, in a predefined patterns. Cryptographic hash functions like MD5, RIPEDMD-160, SHA-1, SHA-256, and SHA-512 are designed to be collision resistant and to produce 128- to 512-bit results. Hashing algorithms like checksums, polynomial hashes, and universal hashes have very limited use in digital forensics. Hashing can also help to efficiently and rapidly find versions of known objects, with which an inquiry can be narrowed. It can also be used to screen targets for trace evidence like remnants of a JPEG files, without depending on file system metadata.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [31] Digital Forensics: Focusing on Image Forensics
    Khalaf, Rayan Sulaiman
    Varol, Asaf
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [32] The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
    Barrett, Diane
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2014, 9 (01) : 83 - 85
  • [33] Fast Fingerprinting for File-System Forensics
    Chawathe, Sudarshan S.
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 591 - 596
  • [34] Digital provenance: Enabling secure data forensics in cloud computing
    Li, Jin
    Chen, Xiaofeng
    Huang, Qiong
    Wong, Duncan S.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 259 - 266
  • [35] Group-oriented fingerprinting for multimedia forensics
    Wang, ZJ
    Wu, M
    Trappe, W
    Liu, KJR
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (14) : 2153 - 2173
  • [36] Group-Oriented Fingerprinting for Multimedia Forensics
    Z. Jane Wang
    Min Wu
    Wade Trappe
    K.J. Ray Liu
    EURASIP Journal on Advances in Signal Processing, 2004
  • [37] Scalable multimedia fingerprinting forensics with side information
    Lin, W. Sabrina
    Zhao, H. Vicky
    Liu, K. J. Ray
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2293 - +
  • [38] Evaluation of Automotive Event Data Recorder towards Digital Forensics
    Kurachi, Ryo
    Katayama, Takanari
    Sasaki, Takamitsu
    Saito, Masaki
    Ajioka, Yoshimasa
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [39] Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities
    Zawoad, Shams
    Hasan, Ragib
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1320 - 1325
  • [40] Quantum Hashing via is an element of-Universal Hashing Constructions and Classical Fingerprinting
    Ablayev, F.
    Ablayev, M.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2015, 36 (02) : 89 - 96