Adopting Hadith Verification Techniques in to Digital Evidence Authentication

نویسندگان

  • Yunus Yusoff
  • Roslan Ismail
  • Zainuddin Hassan
چکیده

Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted digital evidence and ultimately cannot be use to implicate the suspected criminal. Approach: The historical methods of verifying the authenticity of a hadith were studied. The similarities between hadith authentication and digital evidence authentication were identified. Based on the similarities of the identified processes, a new method of authenticating digital evidence were proposed, together with the trust calculation algorithm and evidence classification. Results: The new investigation processes and an algorithm to calculate the trust value of a given digital evidence was proposed. Furthermore, a simple classification of evidence, based on the calculated trust values was also proposed. Conclusion/Recommendations: We have successfully extracted the methods to authenticate hadith and mapped it into the digital evidence authentication processes. The trust values of digital evidence were able to be calculated and the evidence can be further classified based on the different level of trust values. The ability to classify evidence based on trust levels can offer great assistance to the computer forensics investigator to plan their works and focus on the evidence that would give them a better chance of catching the criminals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifying Hadith Correctness in Islamic Web Pages using Information Retrieval Techniques

Certain types of web information need to be verified for correctness once being posted on the web (i. e. the information has a reference that cannot be tampered with). Such these types of information need systems in order to verify and assure their correctness. "The Hadith"; which is the sayings of Prophet Mohammad is an example of these types of information. Hadith in Islam is a very...

متن کامل

Hadith Web Browser Verification Extension

Internet users are more likely to ignore Internet content verification and more likely to share the content. When it comes to Islamic content, it is crucial to share and spread fake or inaccurate content. Even if the verification process of Islamic content is becoming easier every day, the Internet users generally ignore the verification step and jump into sharing the content. “How many clicks ...

متن کامل

Verification Hadith Correctness in Islamic Web Pages Using Information Retrieval Techniques

Huge amount of different types of information is being posted on the web on daily basis. There are available tools to enable users to search for this vast amount of information. Figure 1 provides the different types of web information. Certain types of web information need to verify its correctness once posted on the web (i.e. the information has a reference that cannot be tampered with or chan...

متن کامل

Comparison of Digital Watermarking with Other Techniques of Data Hiding

Digital watermarking is not a new name in the tech neology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Stenography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need water marking for digital data security .It prov...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010