Study Document
… distinct files with identical hash values, the likelihood of wrong classifications may be deemed to be negligible (nearly 0). All hash algorithms that Biometrics and Digital investigators employ are mathematically accounted for, for demonstrating the reason for zero or negligible misclassification risks.
Conclusion
Integrity verification entails checking … verification entails checking that content or copies of the content received have incurred no defects in the course of transfer from or to Biometrics and Digital analysts, and in the course of the investigation itself. An identical check is, if possible, carried out at the time of ……
References
Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.
Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.
Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.
Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.
Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.
We have over 150,000+ study documents to help you.
Sign Up for FREE