ABSTRACT Nowadays log file plays vital role in web forensic as digital evidence. Hence security of log file is a major topic of apprehension. In this paper a model of image logging server having alteration detectable capability, is proposed. According to this approach we first convert a text log file into image log file with the help of bit encoding technique and tamper detection capability is achieved by self embedding fragile watermark scheme. If any alteration is done on image log file then due to nature of fragile watermark, one can easily locate that tampered region. Proposed model is also able to ensure all security requirements like Authenticity, Integrity and confidentiality. General Terms Digital Forensics Keywords Web forensic, Cyber forensic, fragile watermark, self embedding, Log file, Image logging server. 1. INTRODUCTION We Today people absolutely rely on digital media. Since technology is advancing with burgeoning rate hence a new opportunity is opened for Business Company and legal agencies to deploy those technologies. It is very beneficial for worldwide users, but on the other hand, due to some loop holes of those technologies, malicious use for committing crime has also been increased. That‟s why it is very essential to prevent the criminals and their succession of committing crime to smooth the progress of the secure utilization of new technological services. Thus, for the analysis of law enforcement and database table storage, the transaction log, indexes, and other cyber crime, Cyber Forensic [1][2][3][4] came into picture. The primary ambition of cyber forensic examination is to recognize digital evidence for an investigation. Cyber forensic evidence must fulfill some security requirements [3] like Accuracy, Integrity, Authenticity and confidentiality. Digital evidence must be unquestionable, accurate, absolute and acceptable by juries as well as Permissible with common law and legislative rules. Cyber forensic can be widely categorized into four classes [1] viz. computer forensic, network forensic, web forensic and mobile forensic as shown in figure 1. The concept of web forensic deals with the process of monitoring access logs, detection of any alteration in log files as well as recovery of those alterations. The significance of web forensic is to investigate web attacks and prevent those in future, using analysis of log files. In order to carry out a systematic analysis of the hacking Attempt[5], it is advised that the Investigator must investigate all four type of logs namely web server logs, Any 3rd. party installed software logs, Operating system logs and client side logs[6][7]. Now we can assume the importance of log files in web forensic. There are many web attacks which are used to alter the integrity of log files like user to root (U2R) attack, in which The intruder exploits some vulnerability associated with the operating system and web server environment of the server machine under attack to perform the conversion from user to root level [8]. After getting the root privileges, the intruder has full control and access on the server machine to get backdoor entries for future misuse and change system logs[9]. Jianhui