SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 544
Analyzing Need of Secure Forensic Report System using Blockchain
Sonali M Patil1,Rahul Agarwal2, Saburi Ashtekar 3, Muskan Dolwani4, Snehal Nagare5
1-5Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -Online data plays an important role in the captive
of online crime as it is used to associate people with criminal
activity. Therefore, maintainingtheoriginality, authenticity, of
digital proof is of extreme importance as it travels through
various levels of hierarchy in the custody chain during online
crime investigation. The potential of blockchaintechnologyto
allow a massive view of transactions (events/actions)backto
original source gives the forensic community tremendous
hope. In this paper, need of secure forensic report is discussed.
The study shows use of block chain can be made available for
forensic applications, particularly bringing integrity and
resistance to digital custody forensics.
Key Words: Authentication, Block chain, SHA-256 Tamper
proof.
1.INTRODUCTION
The block chain technology is a distributed system which
uses ledger based transactions, which could store linked
records within the range of a decentralized database within
the P2P network, the data is stored in blocks that are having
time stamp, which are linked in an unbreakable chain,
creating immutable, publicly transparent, and validated
audit system by a consensus-based proof of work. Block
chain has its security, immutable nature of the cryptograph
hash links between blocks and instances meanwhile, it can
provide immutability, ability to trace, transparent nature,
auditing ability, and accountability.[1]
The advantage of using block chain system in Digital
Forensic is that the administrator can provide validation
upon which he can access digital evidences, which make use
of hash functions to effectively establish verifiable evidence
chain. The block chain makes use of cryptographytoconfirm
the immutable nature, visible, and public trust within the
case examination. One of the major issues indigital forensics
is that the management of evidences. From the time when
evidence is collected until the time they are exploited in a
legal court, evidences maybe accessed by many parties
involved within the investigation that take temporary
ownership of the evidence. The Forensic Report is the
process of validating how any reasonable evidence hasbeen
gathered, tracked and guarded on its thanks to a court of
law. Forensic Report may be a mandatory step in forensic
analysis. However, it's extensively used as evidence to be
accepted in a court or in legal matters, it must beprovedthat
is not tampered during investigations. Thus, a decent
process should be used for regular dealing and handling
evidences (digital or not), no matter whether the evidence
are utilized in a court or not. The main requirements of a
regular process are: Integrity: the evidence should not be
altered or tampered during the transferring. Tracing
Ability: the evidence must be traced from the time of its
collection until it's destroyed. Authentication: all the
entities interacting with the report must provide validation
as a recognizable proof of their identity. Verification
Ability: the entire process must be verifiable from every
entity involved within the process. Tampering proof:
Changeovers of an evidence can't be alteredorcorrupted.[1]
Fig 1:- Blockchain Nework Working
1.1 Problem Statement
It is observed that forensic reports are changed most of the
times during theinvestigationprocess.Unrecognizedsources
may change data of forensic reports. In most of thecases,due
to this the judgement may not be fair and justice may not be
provided to the needy. Hence,thereisdireneedofdeveloping
a system which ensures the security of forensics report,right
from the time they’re generated to the time they’re used in
legal practices.
1.2 SYSTEM OVERVIEW
Our system is fully designed and idealized by us afteraiming
to develop a system that will help in improving forensic
report security to provide seamless and tamper proof
experience. System will take input from the pathology lab in
the form of a forensic report which will then interact with
other entities of the proposed system. Output will be in the
form of a tamper proof forensic report which can be used in
legal practices and which can be relied upon.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 545
2. LITERATURE SURVEY
Sr. No PAPER TITLE AUTHOR REVIEW
1. Forensic
Automatic
Speaker
Recognition
Andrzej
Drygajlo
The existence of
highlydevelopedand
fully automated
telephone networks
in industrialized
countries and
pervasiveness of
speech.
2. Speaker
Identification
Using Gaussian
Mixture Models
Pavan
Kumar,
Mahesh
Chandra
Speech processing is
a diverse field with
many applications
but here speaker
recognition will be
discussed. Speaker
recognition can be
divided into two
classes, text
dependent and text
independentspeaker
recognition.
3. FORENSIC
IDENTIFICATION
REPORTING
USING
AUTOMATIC
SPEAKER
RECOGNITION
SYSTEMS
J. Gonzalez-
Rodriguez, J.
Fierrez-
Aguilar and
J. Ortega-
Garcia
This work deals with
the issue of how
forensic
scientists must
report to the
judge/jury their
conclusions when
Speaker recognition
techniques are used.
In this sense, they
firstly note the
difference from
system
characterization,
that is the
identification
abilities of the
technique in use, to
the characterization
of the forensic
system that will
provide objective
results to the Court.
4. Analytical Tools
for Block chain:
Review,
Taxonomy and
Open Challenges
Anastasios
Balaskas,
Virginia N. L.
Franqueira
Blockchain analysis
is an entirely new
field of research and
development, which
started to emerge in
2014 as a trend
within the
cryptocurrency
ecosystem. This
trend was mainly
pushed by its
transparent and
decentralizednature.
5. BIOMETRIC
SOLUTIONS FOR
AUTHENTICATIO
Nalini K.
Ratha,
Jonathan H.
This chapter briefly
provides a tutorial
that introduces bio
N Connell and
Ruud M
Bolle
metrics technologies
And systems.
Various existing and
potential
applications in an e-
world are reviewed,
includinguseraccess
control, smart card,
mobile security,
Internet/Web-based
security, forensics,
and so on. Also, all
chapters are
Outlined to explain
the organization of
this book.
3. PROPOSED SYSTEM
Block chain-based Digital Forensics Investigation
The block chain technology offers a fresh and new approach
to how forensic applications with many benefits for the
procedure of investigations can be used, including the
collection of data, enhancement of data, validation of data,
data analysis, preservingofevidencesandthepresentationof
the finding.
Block chain based digital forensics investigation system has
great potential to bringhugebenefitstoforensicapplications,
by providing high level integrity, transparentnature,secured
authenticity, security and ability to audit digital evidences to
achieve the desired end.[2]
These are the 4 Nodes, that we intend to include in our
system:-
1. Pathology Lab-Pathology lab willcreateforensicreportof
the victim and send it to the doctor or hospital. In current
system reports are sent by email or hard copies are sent
which can be easily modified by the doctor or any other
sources. But in the proposed system we will upload the
forensic report on block chain network which is immutable
and a distributed network. Block chain is a highly secure
network which can never be hacked or tampered. Also, if
node fails then we can recover the data very easily because
data is stored in a distributed manner.
2. Hospital- It is the second node of the proposed system.
Hospital receives the forensic report from pathology lab.
Hospital then assigns a particular doctor who will verify the
report and attach with it his digital signatureandthensendit
to the police officer for further investigation. Doctor cannot
modify the report because when the pathology lab officials
upload the report on the network, a 16-digit hash code is
generated, which is static in nature. If someone tries to
modify the report, the hash code changes. As the hash code
should be constant through out the investigation process,
whenever it gets updated we can find out through which
node it got updated, and find out the culprit. Hospital node
can store the report in it’s ledger.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 546
3. Police Department- It is the third node of the proposed
system. Police department will get the input from the doctor
that is a digitally signed forensic report. Police department
will then assign a police officer who begins his investigation
on the basis of the forensic report. As the report which was
generated by a pathology lab and successfully verified by a
doctor, police officer gets detail of the victim which are
already verified and validated. Hence, it becomeseasyforthe
police officer as he just has to concentrate on the
investigation part. If the police officer tries to modify the
report the hash code again will be changed and the police
officer will be highlighted as the hash is updated from the
third node.
4. Final Report- It is the final node of the proposed system.
An administrator who handles the block chain network can
see through the actual transaction history and the journey of
the forensic report. If the hash code that wasgeneratedwhen
the pathology lab uploads the report on the network is static
through out the network, it means the report is tamper proof
and no one tried to modify the report. And if the hash code
has changed through the course of the network, it means the
report is tampered. As, the system is divided in nodes, he can
easily trace through which node the hash code was updated
and find out the culprit.
Fig 2:- Proposed System
Fig 3:- Use Case Diagram for the proposed system
4. MATHEMATICAL MODELING
F=Pathology Lab creates report
D=Hospital gets report from pathology lab
PD=Police department investigates and verifies report
FR=Final report is verified by an authorized person
Input: Pathology lab generates forensic report
Output: Final report is verified and is tamper proof
Set Theory:
1) Let SS be as system which trace the pathologylabreport
to final report..
SS = {In, PL, H, }
2) Identify Input In as
In = {PL}
Where,
PL = input data
3) Identify Process FR as
P = {H, PD, PL}
Where,
PL= Pathology lab creates report
PD= Police department investigates report
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 547
H= Hospital collects report from pathology
lab
4) Identify Output Op as
Op = {FR}
Where,
FR= Final report can be checked by an
authorized person
After processing this request final report can be
submitted to the victim’s family.
= Failures and Success conditions.[5]
5. SCOPE
This System can be used in every state of the country.
This system has huge potential as block chain is the most
secure technology as of now.
6. CONCLUSION
Blockchain by nature enforces authenticity, accountability,
authenticity, protection and auditability, making it the best
choice for the management and traceability of the forensic
custody chain. By that confidence, Blockchain helps to
reduce friction and thus brings the real promise to forensic
culture. This project work aims at developing complete Java
based smart digital forensic chain.
7. ACKNOWLEDGEMENT
We wish to express my profound thanks to all whohelped us
directly or indirectly in making this paper. Finally, we wish
to thank to all our friends and well-wishers who supported
us in completing this paper successfully. We are especially
grateful to our guide HOD Dr.S.M.PATIL for her time to time,
very much needed, and valuable guidance. Without the full
support and cheerful encouragement of my guide, the paper
would not have been completed on time.
REFERENCES
1. G. Giova, “Improving chain of custody in forensic
investigation of electronic digital systems,” International
Journal of Computer Science and Network Security, vol. 11,
no. 1, pp. 1–9, 2011.
2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system,” 2008.
3. V. Buterin et al., “Ethereum white paper,” 2013.
4. C. Liu, “How the blockchain could transformthe processof
documenting electronic chain of custody.”
5. K. Zatyko, “Improving cyber forensics cybersecurity
through block chain technology with truth based systems,”
International Symposium on Forensic Science Error
Management, July-23-2015.

More Related Content

What's hot

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
IRJET Journal
 
4
44
5
55
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Domenico Catalano
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
IJTET Journal
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
IRJET Journal
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
Colin Valencia
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
 
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpalIcdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
Arpan Pal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
Paul Hofmann
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
G2 Research Ltd.
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
eSAT Publishing House
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
IJERA Editor
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
IJAEMSJORNAL
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
Rezgar Mohammad
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
Sydney Wolff
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
faisalcp
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
 

What's hot (20)

IRJET- EMR using RFID Technology
IRJET- EMR using RFID TechnologyIRJET- EMR using RFID Technology
IRJET- EMR using RFID Technology
 
4
44
4
 
5
55
5
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
Icdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpalIcdcn healthcare ws_arpanpal
Icdcn healthcare ws_arpanpal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
 
Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare EnvironmentA Framework for Malicious Traffic Detection in IoT Healthcare Environment
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 

Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain

IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET Journal
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
IAESIJAI
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET Journal
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
IRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET Journal
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
Editor IJCATR
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
IRJET Journal
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET Journal
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
Elsa Prieto
 
Product Serialization using Blockchain
Product Serialization using BlockchainProduct Serialization using Blockchain
Product Serialization using Blockchain
IRJET Journal
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
IRJET Journal
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
IRJET Journal
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
MalikPinckney86
 

Similar to IRJET - Analyzing Need of Secure Forensic Report System using Blockchain (20)

IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
IRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral SystemIRJET-Cloud Based Patient Referral System
IRJET-Cloud Based Patient Referral System
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Product Serialization using Blockchain
Product Serialization using BlockchainProduct Serialization using Blockchain
Product Serialization using Blockchain
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 

Recently uploaded (20)

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 

IRJET - Analyzing Need of Secure Forensic Report System using Blockchain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 544 Analyzing Need of Secure Forensic Report System using Blockchain Sonali M Patil1,Rahul Agarwal2, Saburi Ashtekar 3, Muskan Dolwani4, Snehal Nagare5 1-5Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune, Maharashtra ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -Online data plays an important role in the captive of online crime as it is used to associate people with criminal activity. Therefore, maintainingtheoriginality, authenticity, of digital proof is of extreme importance as it travels through various levels of hierarchy in the custody chain during online crime investigation. The potential of blockchaintechnologyto allow a massive view of transactions (events/actions)backto original source gives the forensic community tremendous hope. In this paper, need of secure forensic report is discussed. The study shows use of block chain can be made available for forensic applications, particularly bringing integrity and resistance to digital custody forensics. Key Words: Authentication, Block chain, SHA-256 Tamper proof. 1.INTRODUCTION The block chain technology is a distributed system which uses ledger based transactions, which could store linked records within the range of a decentralized database within the P2P network, the data is stored in blocks that are having time stamp, which are linked in an unbreakable chain, creating immutable, publicly transparent, and validated audit system by a consensus-based proof of work. Block chain has its security, immutable nature of the cryptograph hash links between blocks and instances meanwhile, it can provide immutability, ability to trace, transparent nature, auditing ability, and accountability.[1] The advantage of using block chain system in Digital Forensic is that the administrator can provide validation upon which he can access digital evidences, which make use of hash functions to effectively establish verifiable evidence chain. The block chain makes use of cryptographytoconfirm the immutable nature, visible, and public trust within the case examination. One of the major issues indigital forensics is that the management of evidences. From the time when evidence is collected until the time they are exploited in a legal court, evidences maybe accessed by many parties involved within the investigation that take temporary ownership of the evidence. The Forensic Report is the process of validating how any reasonable evidence hasbeen gathered, tracked and guarded on its thanks to a court of law. Forensic Report may be a mandatory step in forensic analysis. However, it's extensively used as evidence to be accepted in a court or in legal matters, it must beprovedthat is not tampered during investigations. Thus, a decent process should be used for regular dealing and handling evidences (digital or not), no matter whether the evidence are utilized in a court or not. The main requirements of a regular process are: Integrity: the evidence should not be altered or tampered during the transferring. Tracing Ability: the evidence must be traced from the time of its collection until it's destroyed. Authentication: all the entities interacting with the report must provide validation as a recognizable proof of their identity. Verification Ability: the entire process must be verifiable from every entity involved within the process. Tampering proof: Changeovers of an evidence can't be alteredorcorrupted.[1] Fig 1:- Blockchain Nework Working 1.1 Problem Statement It is observed that forensic reports are changed most of the times during theinvestigationprocess.Unrecognizedsources may change data of forensic reports. In most of thecases,due to this the judgement may not be fair and justice may not be provided to the needy. Hence,thereisdireneedofdeveloping a system which ensures the security of forensics report,right from the time they’re generated to the time they’re used in legal practices. 1.2 SYSTEM OVERVIEW Our system is fully designed and idealized by us afteraiming to develop a system that will help in improving forensic report security to provide seamless and tamper proof experience. System will take input from the pathology lab in the form of a forensic report which will then interact with other entities of the proposed system. Output will be in the form of a tamper proof forensic report which can be used in legal practices and which can be relied upon.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 545 2. LITERATURE SURVEY Sr. No PAPER TITLE AUTHOR REVIEW 1. Forensic Automatic Speaker Recognition Andrzej Drygajlo The existence of highlydevelopedand fully automated telephone networks in industrialized countries and pervasiveness of speech. 2. Speaker Identification Using Gaussian Mixture Models Pavan Kumar, Mahesh Chandra Speech processing is a diverse field with many applications but here speaker recognition will be discussed. Speaker recognition can be divided into two classes, text dependent and text independentspeaker recognition. 3. FORENSIC IDENTIFICATION REPORTING USING AUTOMATIC SPEAKER RECOGNITION SYSTEMS J. Gonzalez- Rodriguez, J. Fierrez- Aguilar and J. Ortega- Garcia This work deals with the issue of how forensic scientists must report to the judge/jury their conclusions when Speaker recognition techniques are used. In this sense, they firstly note the difference from system characterization, that is the identification abilities of the technique in use, to the characterization of the forensic system that will provide objective results to the Court. 4. Analytical Tools for Block chain: Review, Taxonomy and Open Challenges Anastasios Balaskas, Virginia N. L. Franqueira Blockchain analysis is an entirely new field of research and development, which started to emerge in 2014 as a trend within the cryptocurrency ecosystem. This trend was mainly pushed by its transparent and decentralizednature. 5. BIOMETRIC SOLUTIONS FOR AUTHENTICATIO Nalini K. Ratha, Jonathan H. This chapter briefly provides a tutorial that introduces bio N Connell and Ruud M Bolle metrics technologies And systems. Various existing and potential applications in an e- world are reviewed, includinguseraccess control, smart card, mobile security, Internet/Web-based security, forensics, and so on. Also, all chapters are Outlined to explain the organization of this book. 3. PROPOSED SYSTEM Block chain-based Digital Forensics Investigation The block chain technology offers a fresh and new approach to how forensic applications with many benefits for the procedure of investigations can be used, including the collection of data, enhancement of data, validation of data, data analysis, preservingofevidencesandthepresentationof the finding. Block chain based digital forensics investigation system has great potential to bringhugebenefitstoforensicapplications, by providing high level integrity, transparentnature,secured authenticity, security and ability to audit digital evidences to achieve the desired end.[2] These are the 4 Nodes, that we intend to include in our system:- 1. Pathology Lab-Pathology lab willcreateforensicreportof the victim and send it to the doctor or hospital. In current system reports are sent by email or hard copies are sent which can be easily modified by the doctor or any other sources. But in the proposed system we will upload the forensic report on block chain network which is immutable and a distributed network. Block chain is a highly secure network which can never be hacked or tampered. Also, if node fails then we can recover the data very easily because data is stored in a distributed manner. 2. Hospital- It is the second node of the proposed system. Hospital receives the forensic report from pathology lab. Hospital then assigns a particular doctor who will verify the report and attach with it his digital signatureandthensendit to the police officer for further investigation. Doctor cannot modify the report because when the pathology lab officials upload the report on the network, a 16-digit hash code is generated, which is static in nature. If someone tries to modify the report, the hash code changes. As the hash code should be constant through out the investigation process, whenever it gets updated we can find out through which node it got updated, and find out the culprit. Hospital node can store the report in it’s ledger.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 546 3. Police Department- It is the third node of the proposed system. Police department will get the input from the doctor that is a digitally signed forensic report. Police department will then assign a police officer who begins his investigation on the basis of the forensic report. As the report which was generated by a pathology lab and successfully verified by a doctor, police officer gets detail of the victim which are already verified and validated. Hence, it becomeseasyforthe police officer as he just has to concentrate on the investigation part. If the police officer tries to modify the report the hash code again will be changed and the police officer will be highlighted as the hash is updated from the third node. 4. Final Report- It is the final node of the proposed system. An administrator who handles the block chain network can see through the actual transaction history and the journey of the forensic report. If the hash code that wasgeneratedwhen the pathology lab uploads the report on the network is static through out the network, it means the report is tamper proof and no one tried to modify the report. And if the hash code has changed through the course of the network, it means the report is tampered. As, the system is divided in nodes, he can easily trace through which node the hash code was updated and find out the culprit. Fig 2:- Proposed System Fig 3:- Use Case Diagram for the proposed system 4. MATHEMATICAL MODELING F=Pathology Lab creates report D=Hospital gets report from pathology lab PD=Police department investigates and verifies report FR=Final report is verified by an authorized person Input: Pathology lab generates forensic report Output: Final report is verified and is tamper proof Set Theory: 1) Let SS be as system which trace the pathologylabreport to final report.. SS = {In, PL, H, } 2) Identify Input In as In = {PL} Where, PL = input data 3) Identify Process FR as P = {H, PD, PL} Where, PL= Pathology lab creates report PD= Police department investigates report
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 547 H= Hospital collects report from pathology lab 4) Identify Output Op as Op = {FR} Where, FR= Final report can be checked by an authorized person After processing this request final report can be submitted to the victim’s family. = Failures and Success conditions.[5] 5. SCOPE This System can be used in every state of the country. This system has huge potential as block chain is the most secure technology as of now. 6. CONCLUSION Blockchain by nature enforces authenticity, accountability, authenticity, protection and auditability, making it the best choice for the management and traceability of the forensic custody chain. By that confidence, Blockchain helps to reduce friction and thus brings the real promise to forensic culture. This project work aims at developing complete Java based smart digital forensic chain. 7. ACKNOWLEDGEMENT We wish to express my profound thanks to all whohelped us directly or indirectly in making this paper. Finally, we wish to thank to all our friends and well-wishers who supported us in completing this paper successfully. We are especially grateful to our guide HOD Dr.S.M.PATIL for her time to time, very much needed, and valuable guidance. Without the full support and cheerful encouragement of my guide, the paper would not have been completed on time. REFERENCES 1. G. Giova, “Improving chain of custody in forensic investigation of electronic digital systems,” International Journal of Computer Science and Network Security, vol. 11, no. 1, pp. 1–9, 2011. 2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. 3. V. Buterin et al., “Ethereum white paper,” 2013. 4. C. Liu, “How the blockchain could transformthe processof documenting electronic chain of custody.” 5. K. Zatyko, “Improving cyber forensics cybersecurity through block chain technology with truth based systems,” International Symposium on Forensic Science Error Management, July-23-2015.