Adopting Hadith Verification Techniques in to Digital Evidence Authentication
نویسندگان
چکیده
Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted digital evidence and ultimately cannot be use to implicate the suspected criminal. Approach: The historical methods of verifying the authenticity of a hadith were studied. The similarities between hadith authentication and digital evidence authentication were identified. Based on the similarities of the identified processes, a new method of authenticating digital evidence were proposed, together with the trust calculation algorithm and evidence classification. Results: The new investigation processes and an algorithm to calculate the trust value of a given digital evidence was proposed. Furthermore, a simple classification of evidence, based on the calculated trust values was also proposed. Conclusion/Recommendations: We have successfully extracted the methods to authenticate hadith and mapped it into the digital evidence authentication processes. The trust values of digital evidence were able to be calculated and the evidence can be further classified based on the different level of trust values. The ability to classify evidence based on trust levels can offer great assistance to the computer forensics investigator to plan their works and focus on the evidence that would give them a better chance of catching the criminals.
منابع مشابه
Verifying Hadith Correctness in Islamic Web Pages using Information Retrieval Techniques
Certain types of web information need to be verified for correctness once being posted on the web (i. e. the information has a reference that cannot be tampered with). Such these types of information need systems in order to verify and assure their correctness. "The Hadith"; which is the sayings of Prophet Mohammad is an example of these types of information. Hadith in Islam is a very...
متن کاملHadith Web Browser Verification Extension
Internet users are more likely to ignore Internet content verification and more likely to share the content. When it comes to Islamic content, it is crucial to share and spread fake or inaccurate content. Even if the verification process of Islamic content is becoming easier every day, the Internet users generally ignore the verification step and jump into sharing the content. “How many clicks ...
متن کاملVerification Hadith Correctness in Islamic Web Pages Using Information Retrieval Techniques
Huge amount of different types of information is being posted on the web on daily basis. There are available tools to enable users to search for this vast amount of information. Figure 1 provides the different types of web information. Certain types of web information need to verify its correctness once posted on the web (i.e. the information has a reference that cannot be tampered with or chan...
متن کاملComparison of Digital Watermarking with Other Techniques of Data Hiding
Digital watermarking is not a new name in the tech neology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Stenography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need water marking for digital data security .It prov...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کامل