SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 544
Analyzing Need of Secure Forensic Report System using Blockchain
Sonali M Patil1,Rahul Agarwal2, Saburi Ashtekar 3, Muskan Dolwani4, Snehal Nagare5
1-5Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -Online data plays an important role in the captive
of online crime as it is used to associate people with criminal
activity. Therefore, maintainingtheoriginality, authenticity, of
digital proof is of extreme importance as it travels through
various levels of hierarchy in the custody chain during online
crime investigation. The potential of blockchaintechnologyto
allow a massive view of transactions (events/actions)backto
original source gives the forensic community tremendous
hope. In this paper, need of secure forensic report is discussed.
The study shows use of block chain can be made available for
forensic applications, particularly bringing integrity and
resistance to digital custody forensics.
Key Words: Authentication, Block chain, SHA-256 Tamper
proof.
1.INTRODUCTION
The block chain technology is a distributed system which
uses ledger based transactions, which could store linked
records within the range of a decentralized database within
the P2P network, the data is stored in blocks that are having
time stamp, which are linked in an unbreakable chain,
creating immutable, publicly transparent, and validated
audit system by a consensus-based proof of work. Block
chain has its security, immutable nature of the cryptograph
hash links between blocks and instances meanwhile, it can
provide immutability, ability to trace, transparent nature,
auditing ability, and accountability.[1]
The advantage of using block chain system in Digital
Forensic is that the administrator can provide validation
upon which he can access digital evidences, which make use
of hash functions to effectively establish verifiable evidence
chain. The block chain makes use of cryptographytoconfirm
the immutable nature, visible, and public trust within the
case examination. One of the major issues indigital forensics
is that the management of evidences. From the time when
evidence is collected until the time they are exploited in a
legal court, evidences maybe accessed by many parties
involved within the investigation that take temporary
ownership of the evidence. The Forensic Report is the
process of validating how any reasonable evidence hasbeen
gathered, tracked and guarded on its thanks to a court of
law. Forensic Report may be a mandatory step in forensic
analysis. However, it's extensively used as evidence to be
accepted in a court or in legal matters, it must beprovedthat
is not tampered during investigations. Thus, a decent
process should be used for regular dealing and handling
evidences (digital or not), no matter whether the evidence
are utilized in a court or not. The main requirements of a
regular process are: Integrity: the evidence should not be
altered or tampered during the transferring. Tracing
Ability: the evidence must be traced from the time of its
collection until it's destroyed. Authentication: all the
entities interacting with the report must provide validation
as a recognizable proof of their identity. Verification
Ability: the entire process must be verifiable from every
entity involved within the process. Tampering proof:
Changeovers of an evidence can't be alteredorcorrupted.[1]
Fig 1:- Blockchain Nework Working
1.1 Problem Statement
It is observed that forensic reports are changed most of the
times during theinvestigationprocess.Unrecognizedsources
may change data of forensic reports. In most of thecases,due
to this the judgement may not be fair and justice may not be
provided to the needy. Hence,thereisdireneedofdeveloping
a system which ensures the security of forensics report,right
from the time they’re generated to the time they’re used in
legal practices.
1.2 SYSTEM OVERVIEW
Our system is fully designed and idealized by us afteraiming
to develop a system that will help in improving forensic
report security to provide seamless and tamper proof
experience. System will take input from the pathology lab in
the form of a forensic report which will then interact with
other entities of the proposed system. Output will be in the
form of a tamper proof forensic report which can be used in
legal practices and which can be relied upon.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 545
2. LITERATURE SURVEY
Sr. No PAPER TITLE AUTHOR REVIEW
1. Forensic
Automatic
Speaker
Recognition
Andrzej
Drygajlo
The existence of
highlydevelopedand
fully automated
telephone networks
in industrialized
countries and
pervasiveness of
speech.
2. Speaker
Identification
Using Gaussian
Mixture Models
Pavan
Kumar,
Mahesh
Chandra
Speech processing is
a diverse field with
many applications
but here speaker
recognition will be
discussed. Speaker
recognition can be
divided into two
classes, text
dependent and text
independentspeaker
recognition.
3. FORENSIC
IDENTIFICATION
REPORTING
USING
AUTOMATIC
SPEAKER
RECOGNITION
SYSTEMS
J. Gonzalez-
Rodriguez, J.
Fierrez-
Aguilar and
J. Ortega-
Garcia
This work deals with
the issue of how
forensic
scientists must
report to the
judge/jury their
conclusions when
Speaker recognition
techniques are used.
In this sense, they
firstly note the
difference from
system
characterization,
that is the
identification
abilities of the
technique in use, to
the characterization
of the forensic
system that will
provide objective
results to the Court.
4. Analytical Tools
for Block chain:
Review,
Taxonomy and
Open Challenges
Anastasios
Balaskas,
Virginia N. L.
Franqueira
Blockchain analysis
is an entirely new
field of research and
development, which
started to emerge in
2014 as a trend
within the
cryptocurrency
ecosystem. This
trend was mainly
pushed by its
transparent and
decentralizednature.
5. BIOMETRIC
SOLUTIONS FOR
AUTHENTICATIO
Nalini K.
Ratha,
Jonathan H.
This chapter briefly
provides a tutorial
that introduces bio
N Connell and
Ruud M
Bolle
metrics technologies
And systems.
Various existing and
potential
applications in an e-
world are reviewed,
includinguseraccess
control, smart card,
mobile security,
Internet/Web-based
security, forensics,
and so on. Also, all
chapters are
Outlined to explain
the organization of
this book.
3. PROPOSED SYSTEM
Block chain-based Digital Forensics Investigation
The block chain technology offers a fresh and new approach
to how forensic applications with many benefits for the
procedure of investigations can be used, including the
collection of data, enhancement of data, validation of data,
data analysis, preservingofevidencesandthepresentationof
the finding.
Block chain based digital forensics investigation system has
great potential to bringhugebenefitstoforensicapplications,
by providing high level integrity, transparentnature,secured
authenticity, security and ability to audit digital evidences to
achieve the desired end.[2]
These are the 4 Nodes, that we intend to include in our
system:-
1. Pathology Lab-Pathology lab willcreateforensicreportof
the victim and send it to the doctor or hospital. In current
system reports are sent by email or hard copies are sent
which can be easily modified by the doctor or any other
sources. But in the proposed system we will upload the
forensic report on block chain network which is immutable
and a distributed network. Block chain is a highly secure
network which can never be hacked or tampered. Also, if
node fails then we can recover the data very easily because
data is stored in a distributed manner.
2. Hospital- It is the second node of the proposed system.
Hospital receives the forensic report from pathology lab.
Hospital then assigns a particular doctor who will verify the
report and attach with it his digital signatureandthensendit
to the police officer for further investigation. Doctor cannot
modify the report because when the pathology lab officials
upload the report on the network, a 16-digit hash code is
generated, which is static in nature. If someone tries to
modify the report, the hash code changes. As the hash code
should be constant through out the investigation process,
whenever it gets updated we can find out through which
node it got updated, and find out the culprit. Hospital node
can store the report in it’s ledger.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 546
3. Police Department- It is the third node of the proposed
system. Police department will get the input from the doctor
that is a digitally signed forensic report. Police department
will then assign a police officer who begins his investigation
on the basis of the forensic report. As the report which was
generated by a pathology lab and successfully verified by a
doctor, police officer gets detail of the victim which are
already verified and validated. Hence, it becomeseasyforthe
police officer as he just has to concentrate on the
investigation part. If the police officer tries to modify the
report the hash code again will be changed and the police
officer will be highlighted as the hash is updated from the
third node.
4. Final Report- It is the final node of the proposed system.
An administrator who handles the block chain network can
see through the actual transaction history and the journey of
the forensic report. If the hash code that wasgeneratedwhen
the pathology lab uploads the report on the network is static
through out the network, it means the report is tamper proof
and no one tried to modify the report. And if the hash code
has changed through the course of the network, it means the
report is tampered. As, the system is divided in nodes, he can
easily trace through which node the hash code was updated
and find out the culprit.
Fig 2:- Proposed System
Fig 3:- Use Case Diagram for the proposed system
4. MATHEMATICAL MODELING
F=Pathology Lab creates report
D=Hospital gets report from pathology lab
PD=Police department investigates and verifies report
FR=Final report is verified by an authorized person
Input: Pathology lab generates forensic report
Output: Final report is verified and is tamper proof
Set Theory:
1) Let SS be as system which trace the pathologylabreport
to final report..
SS = {In, PL, H, }
2) Identify Input In as
In = {PL}
Where,
PL = input data
3) Identify Process FR as
P = {H, PD, PL}
Where,
PL= Pathology lab creates report
PD= Police department investigates report
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 547
H= Hospital collects report from pathology
lab
4) Identify Output Op as
Op = {FR}
Where,
FR= Final report can be checked by an
authorized person
After processing this request final report can be
submitted to the victim’s family.
= Failures and Success conditions.[5]
5. SCOPE
This System can be used in every state of the country.
This system has huge potential as block chain is the most
secure technology as of now.
6. CONCLUSION
Blockchain by nature enforces authenticity, accountability,
authenticity, protection and auditability, making it the best
choice for the management and traceability of the forensic
custody chain. By that confidence, Blockchain helps to
reduce friction and thus brings the real promise to forensic
culture. This project work aims at developing complete Java
based smart digital forensic chain.
7. ACKNOWLEDGEMENT
We wish to express my profound thanks to all whohelped us
directly or indirectly in making this paper. Finally, we wish
to thank to all our friends and well-wishers who supported
us in completing this paper successfully. We are especially
grateful to our guide HOD Dr.S.M.PATIL for her time to time,
very much needed, and valuable guidance. Without the full
support and cheerful encouragement of my guide, the paper
would not have been completed on time.
REFERENCES
1. G. Giova, “Improving chain of custody in forensic
investigation of electronic digital systems,” International
Journal of Computer Science and Network Security, vol. 11,
no. 1, pp. 1–9, 2011.
2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008.
3. V. Buterin et al., “Ethereum white paper,” 2013.
4. C. Liu, “How the blockchain could transformthe processof
documenting electronic chain of custody.”
5. K. Zatyko, “Improving cyber forensics cybersecurity
through block chain technology with truth based systems,”
International Symposium on Forensic Science Error
Management, July-23-2015.

More Related Content

What's hot

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET Journal
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricIRJET Journal
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochureColin Valencia
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpalIcdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpalArpan Pal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainPaul Hofmann
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingeSAT Publishing House
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploadingIJAEMSJORNAL
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkRezgar Mohammad
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One PagerSydney Wolff
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environmentfaisalcp
 

What's hot (20)

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
4
44
4
 
5
55
5
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpalIcdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 

Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain

IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET Journal
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET Journal
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET Journal
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Product Serialization using Blockchain
Product Serialization using BlockchainProduct Serialization using Blockchain
Product Serialization using BlockchainIRJET Journal
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET Journal
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...IRJET Journal
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 

Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain (20)

IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Product Serialization using Blockchain
Product Serialization using BlockchainProduct Serialization using Blockchain
Product Serialization using Blockchain
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET - Analyzing Need of Secure Forensic Report System using Blockchain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 544 Analyzing Need of Secure Forensic Report System using Blockchain Sonali M Patil1,Rahul Agarwal2, Saburi Ashtekar 3, Muskan Dolwani4, Snehal Nagare5 1-5Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -Online data plays an important role in the captive of online crime as it is used to associate people with criminal activity. Therefore, maintainingtheoriginality, authenticity, of digital proof is of extreme importance as it travels through various levels of hierarchy in the custody chain during online crime investigation. The potential of blockchaintechnologyto allow a massive view of transactions (events/actions)backto original source gives the forensic community tremendous hope. In this paper, need of secure forensic report is discussed. The study shows use of block chain can be made available for forensic applications, particularly bringing integrity and resistance to digital custody forensics. Key Words: Authentication, Block chain, SHA-256 Tamper proof. 1.INTRODUCTION The block chain technology is a distributed system which uses ledger based transactions, which could store linked records within the range of a decentralized database within the P2P network, the data is stored in blocks that are having time stamp, which are linked in an unbreakable chain, creating immutable, publicly transparent, and validated audit system by a consensus-based proof of work. Block chain has its security, immutable nature of the cryptograph hash links between blocks and instances meanwhile, it can provide immutability, ability to trace, transparent nature, auditing ability, and accountability.[1] The advantage of using block chain system in Digital Forensic is that the administrator can provide validation upon which he can access digital evidences, which make use of hash functions to effectively establish verifiable evidence chain. The block chain makes use of cryptographytoconfirm the immutable nature, visible, and public trust within the case examination. One of the major issues indigital forensics is that the management of evidences. From the time when evidence is collected until the time they are exploited in a legal court, evidences maybe accessed by many parties involved within the investigation that take temporary ownership of the evidence. The Forensic Report is the process of validating how any reasonable evidence hasbeen gathered, tracked and guarded on its thanks to a court of law. Forensic Report may be a mandatory step in forensic analysis. However, it's extensively used as evidence to be accepted in a court or in legal matters, it must beprovedthat is not tampered during investigations. Thus, a decent process should be used for regular dealing and handling evidences (digital or not), no matter whether the evidence are utilized in a court or not. The main requirements of a regular process are: Integrity: the evidence should not be altered or tampered during the transferring. Tracing Ability: the evidence must be traced from the time of its collection until it's destroyed. Authentication: all the entities interacting with the report must provide validation as a recognizable proof of their identity. Verification Ability: the entire process must be verifiable from every entity involved within the process. Tampering proof: Changeovers of an evidence can't be alteredorcorrupted.[1] Fig 1:- Blockchain Nework Working 1.1 Problem Statement It is observed that forensic reports are changed most of the times during theinvestigationprocess.Unrecognizedsources may change data of forensic reports. In most of thecases,due to this the judgement may not be fair and justice may not be provided to the needy. Hence,thereisdireneedofdeveloping a system which ensures the security of forensics report,right from the time they’re generated to the time they’re used in legal practices. 1.2 SYSTEM OVERVIEW Our system is fully designed and idealized by us afteraiming to develop a system that will help in improving forensic report security to provide seamless and tamper proof experience. System will take input from the pathology lab in the form of a forensic report which will then interact with other entities of the proposed system. Output will be in the form of a tamper proof forensic report which can be used in legal practices and which can be relied upon.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 545 2. LITERATURE SURVEY Sr. No PAPER TITLE AUTHOR REVIEW 1. Forensic Automatic Speaker Recognition Andrzej Drygajlo The existence of highlydevelopedand fully automated telephone networks in industrialized countries and pervasiveness of speech. 2. Speaker Identification Using Gaussian Mixture Models Pavan Kumar, Mahesh Chandra Speech processing is a diverse field with many applications but here speaker recognition will be discussed. Speaker recognition can be divided into two classes, text dependent and text independentspeaker recognition. 3. FORENSIC IDENTIFICATION REPORTING USING AUTOMATIC SPEAKER RECOGNITION SYSTEMS J. Gonzalez- Rodriguez, J. Fierrez- Aguilar and J. Ortega- Garcia This work deals with the issue of how forensic scientists must report to the judge/jury their conclusions when Speaker recognition techniques are used. In this sense, they firstly note the difference from system characterization, that is the identification abilities of the technique in use, to the characterization of the forensic system that will provide objective results to the Court. 4. Analytical Tools for Block chain: Review, Taxonomy and Open Challenges Anastasios Balaskas, Virginia N. L. Franqueira Blockchain analysis is an entirely new field of research and development, which started to emerge in 2014 as a trend within the cryptocurrency ecosystem. This trend was mainly pushed by its transparent and decentralizednature. 5. BIOMETRIC SOLUTIONS FOR AUTHENTICATIO Nalini K. Ratha, Jonathan H. This chapter briefly provides a tutorial that introduces bio N Connell and Ruud M Bolle metrics technologies And systems. Various existing and potential applications in an e- world are reviewed, includinguseraccess control, smart card, mobile security, Internet/Web-based security, forensics, and so on. Also, all chapters are Outlined to explain the organization of this book. 3. PROPOSED SYSTEM Block chain-based Digital Forensics Investigation The block chain technology offers a fresh and new approach to how forensic applications with many benefits for the procedure of investigations can be used, including the collection of data, enhancement of data, validation of data, data analysis, preservingofevidencesandthepresentationof the finding. Block chain based digital forensics investigation system has great potential to bringhugebenefitstoforensicapplications, by providing high level integrity, transparentnature,secured authenticity, security and ability to audit digital evidences to achieve the desired end.[2] These are the 4 Nodes, that we intend to include in our system:- 1. Pathology Lab-Pathology lab willcreateforensicreportof the victim and send it to the doctor or hospital. In current system reports are sent by email or hard copies are sent which can be easily modified by the doctor or any other sources. But in the proposed system we will upload the forensic report on block chain network which is immutable and a distributed network. Block chain is a highly secure network which can never be hacked or tampered. Also, if node fails then we can recover the data very easily because data is stored in a distributed manner. 2. Hospital- It is the second node of the proposed system. Hospital receives the forensic report from pathology lab. Hospital then assigns a particular doctor who will verify the report and attach with it his digital signatureandthensendit to the police officer for further investigation. Doctor cannot modify the report because when the pathology lab officials upload the report on the network, a 16-digit hash code is generated, which is static in nature. If someone tries to modify the report, the hash code changes. As the hash code should be constant through out the investigation process, whenever it gets updated we can find out through which node it got updated, and find out the culprit. Hospital node can store the report in it’s ledger.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 546 3. Police Department- It is the third node of the proposed system. Police department will get the input from the doctor that is a digitally signed forensic report. Police department will then assign a police officer who begins his investigation on the basis of the forensic report. As the report which was generated by a pathology lab and successfully verified by a doctor, police officer gets detail of the victim which are already verified and validated. Hence, it becomeseasyforthe police officer as he just has to concentrate on the investigation part. If the police officer tries to modify the report the hash code again will be changed and the police officer will be highlighted as the hash is updated from the third node. 4. Final Report- It is the final node of the proposed system. An administrator who handles the block chain network can see through the actual transaction history and the journey of the forensic report. If the hash code that wasgeneratedwhen the pathology lab uploads the report on the network is static through out the network, it means the report is tamper proof and no one tried to modify the report. And if the hash code has changed through the course of the network, it means the report is tampered. As, the system is divided in nodes, he can easily trace through which node the hash code was updated and find out the culprit. Fig 2:- Proposed System Fig 3:- Use Case Diagram for the proposed system 4. MATHEMATICAL MODELING F=Pathology Lab creates report D=Hospital gets report from pathology lab PD=Police department investigates and verifies report FR=Final report is verified by an authorized person Input: Pathology lab generates forensic report Output: Final report is verified and is tamper proof Set Theory: 1) Let SS be as system which trace the pathologylabreport to final report.. SS = {In, PL, H, } 2) Identify Input In as In = {PL} Where, PL = input data 3) Identify Process FR as P = {H, PD, PL} Where, PL= Pathology lab creates report PD= Police department investigates report
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 547 H= Hospital collects report from pathology lab 4) Identify Output Op as Op = {FR} Where, FR= Final report can be checked by an authorized person After processing this request final report can be submitted to the victim’s family. = Failures and Success conditions.[5] 5. SCOPE This System can be used in every state of the country. This system has huge potential as block chain is the most secure technology as of now. 6. CONCLUSION Blockchain by nature enforces authenticity, accountability, authenticity, protection and auditability, making it the best choice for the management and traceability of the forensic custody chain. By that confidence, Blockchain helps to reduce friction and thus brings the real promise to forensic culture. This project work aims at developing complete Java based smart digital forensic chain. 7. ACKNOWLEDGEMENT We wish to express my profound thanks to all whohelped us directly or indirectly in making this paper. Finally, we wish to thank to all our friends and well-wishers who supported us in completing this paper successfully. We are especially grateful to our guide HOD Dr.S.M.PATIL for her time to time, very much needed, and valuable guidance. Without the full support and cheerful encouragement of my guide, the paper would not have been completed on time. REFERENCES 1. G. Giova, “Improving chain of custody in forensic investigation of electronic digital systems,” International Journal of Computer Science and Network Security, vol. 11, no. 1, pp. 1–9, 2011. 2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. 3. V. Buterin et al., “Ethereum white paper,” 2013. 4. C. Liu, “How the blockchain could transformthe processof documenting electronic chain of custody.” 5. K. Zatyko, “Improving cyber forensics cybersecurity through block chain technology with truth based systems,” International Symposium on Forensic Science Error Management, July-23-2015.