CFP last date
20 January 2025
Reseach Article

Self Alteration Detectable Image Log File for Web Forensics

by Vimal Kumar, Akhilendra Pratap Singh, Anjani K. Rai, Manoj Wairiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 5
Year of Publication: 2011
Authors: Vimal Kumar, Akhilendra Pratap Singh, Anjani K. Rai, Manoj Wairiya
10.5120/2284-2960

Vimal Kumar, Akhilendra Pratap Singh, Anjani K. Rai, Manoj Wairiya . Self Alteration Detectable Image Log File for Web Forensics. International Journal of Computer Applications. 18, 5 ( March 2011), 1-5. DOI=10.5120/2284-2960

@article{ 10.5120/2284-2960,
author = { Vimal Kumar, Akhilendra Pratap Singh, Anjani K. Rai, Manoj Wairiya },
title = { Self Alteration Detectable Image Log File for Web Forensics },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 5 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number5/2284-2960/ },
doi = { 10.5120/2284-2960 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:28.509245+05:30
%A Vimal Kumar
%A Akhilendra Pratap Singh
%A Anjani K. Rai
%A Manoj Wairiya
%T Self Alteration Detectable Image Log File for Web Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 5
%P 1-5
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays log file plays vital role in web forensic as digital evidence. Hence security of log file is a major topic of apprehension. In this paper a model of image logging server having alteration detectable capability, is proposed. According to this approach we first convert a text log file into image log file with the help of bit encoding technique and tamper detection capability is achieved by self embedding fragile watermark scheme. If any alteration is done on image log file then due to nature of fragile watermark, one can easily locate that tampered region. Proposed model is also able to ensure all security requirements like Authenticity, Integrity and confidentiality.

References
  1. Sandeep Sharma, Swapnil Gupta,” Implementation of Image Logging System for Digital Evidense in Web Forensic and Law Enforcement,” School of Computer Science & IT Devi Ahiliya Visghwavidyalaya(DAVV) Indore(MP) 2008-2010.
  2. Brian Carrier,” Open Source Digital Forensics Tools,” take Research Report, October, 2002. Modeling and Simulation Design. AK Peters Ltd.
  3. Seunghee Yoo, Yilhyeong Mun, Dongsub Cho, “Implementation of Image Loging Server for Web Forensic,” 978-1-424426249/08, IEEE, 2008.
  4. US-CERAT,”Computer Forensics,” a government organization, 2008.
  5. Web Forensics, Jess García, http://www.jessland.net.
  6. Indian Computer Emergency Response Team, “Web Server Security Guideline,” CERT-IN, August, 17, 2004.
  7. Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine, “Threat to privacy in the Forensics Analysis of Database Systems,” SIGMOD’07, Beijing, China, June 12–14, 2007.
  8. Kapil Kumar Gupta, Baikunth Nath, Ramamohanarao Kotagiri,” Layered Approach using Conditional Random Fields for Intrusion Detection,” IEEE Transaction on Dependable and Secure Computing Vol 7, NO 1,January-March 2010.
  9. Spector, A. Z. F89. Maheshkumar Sabhnani, Gursel Serpen,” Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R attacks in SolarisTM Operating System Environment,” EECS Dept, University of Toledo, Toledo, Ohio 43606, USA.
  10. Jianhui LIN1, “A Web Forensic System Based On Semantic Checking,,” International Symposium on Computational Intelligence and Design, 2008.
  11. Liu Jiqiang Han Zhen Lan Zengwei,” Secure Audit Logs Server to Support Computer Forensics in Criminal Investigations,” Proceedings of IEEE, TENCOW02.
  12. Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine, “Threat to privacy in the Forensics Analysis of Database Systems,” SIGMOD’07, Beijing, China, June 12–14, 2007.
  13. Mohd Helmy Abd Wahab, Mohd Norzali Haji Mohd , Hafizul Fahri Hanafi, Mohamad Farhan,Mohamad Mohsin,” Data Pre-processing on Web Servers Logs for Generalized Association Rule Mining,” World Academy of Science, Engineering and Technology 48 2008.
  14. Pengfei Wang, Yewang Chen, “A Fragile Watermarking Algorithm Based on Logistic System and JPEG,” 978-1-4244-5555-3/10 IEEE, 2010.
  15. ShuiHua, Han and Chao-Hsien Chu,” Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking,” IEEE International Conference on RFID The Venetian, Las Vegas, Nevada, USAApril 16-17, IEEE,2008.
  16. Xianzhong Long, Hong Peng, Changle Zhang, Zheng Pan, Ying Wu,” A FragileWatermarking Scheme for Tamper-Proof of Web Pages, ” WASE International Conference on Information Engineering,IEEE,2009.
  17. Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan,” A Fragile Document Watermarking Technique Based on Wet Paper code,” ,” International Conference on Intelligent Information Hiding Multimedia Signal Processing IEEE 2008.
  18. Hongxia Wang, Changxing Liao,” Compressed-Domain Fragile Watermarking Scheme for Distinguishing Tampers on Image Content or Watermark,” 978-1-4244-4888-3/09, IEEE,2009.
  19. Hongbin Kong, Zhengquan Zeng, Chunjie Zhang, Cheng Lu, ShaowenYao,” A Fragile Watermarking Scheme for OWL-Based ontology,integrity,protection”.
Index Terms

Computer Science
Information Sciences

Keywords

Web forensic Cyber forensic fragile watermark self embedding Log file Image logging server