Abstract

The essential task in tracing the source of the theft is to secure the digital proof from the location where the data was misused. But, more significantly, the data evidence must be sent to the main server without being intercepted by a Man-in-the-Middle assault. Diffie-Hellman Key Exchange Algorithm is used to securely exchange cryptographic keys from the admin and investigator. Here different layers of security have been identified. The proposed method uses message digest, encryption and steganography to implement secure transfer of digital evidence from the crime scene.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call