Javascript must be enabled to continue!
Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
View through CrossRef
The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage.
Title: Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
Description:
The development of the Internet has resulted in an increasing variety of cyber crimes.
Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence.
This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence.
This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.
exe in terms of its function, the result, CPU usage.
The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value.
Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications.
Applications developed are better in terms of function, results, and CPU usage.
.
Related Results
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Abstract
The era of disruption has presented a new phenomenon in wedding procedures, namely digital weddings. The emergence of digital marriage raises questions about its validity...
Deep Supervised Hashing for Fast Multi-Label Image
Deep Supervised Hashing for Fast Multi-Label Image
In this paper, most of the existing Hashing methods is mapping the hand extracted features to binary code, and designing the loss function with the label of images. However, hand-c...
Convolutional Neural Network Copy Detection with Neural Network Perceptual Hashing
Convolutional Neural Network Copy Detection with Neural Network Perceptual Hashing
In recent years, many model intellectual property (IP) proof methods
for IP protection have been proposed, such as model watermarking and model
fingerprinting. However, as an impor...
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
<p>This paper has been accepted by ACM TOMM. https://dl.acm.org/doi/pdf/10.1145/3572777</p>
<p><br></p>
<p>In recent years, many model intellect...
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
<p>This paper has been accepted by ACM TOMM. https://dl.acm.org/doi/pdf/10.1145/3572777</p>
<p><br></p>
<p>In recent years, many model intellect...

