ARCHIVES

Original Article

Blockchain-Integrated Lightweight Cryptographic Framework for Detecting File Timestamp Manipulation in Digital Forensic Analysis

M. Mayavathi1 T. Harish2 K. Mydhili Sharan3 P. Yasvanth Raj4
1 Assistant Professor, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri, Tamil Nadu, India. 2 3 4 UG Scholars, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri, Tamil Nadu, India.

Published Online: January-April 2026

Pages: 387-391

Cite this article

No DOI

References

1. Lukas, D., & Stojanovic, J. (2017). Anti-forensics: An Overview. International Journal of Computer Applications, 167(9), 1–8.
2. Liu, Z., & Zhang, L. (2015). Timestamp Analysis in Digital Forensics. Proceedings of the International Conference on Information and
Communications Security, 21–32.
3. Casey, E. (2004). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Elsevier Academic Press.
4. Kessler, G. C. (2001). An Overview of Computer Forensics. Proceedings of the International Workshop on Systematic Approaches to Digital
Forensic Engineering, 1–10.
5. Fitzgerald, B., & McDaniel, P. (2018). File System Analysis for Forensics: Identifying the Impact of File Timestamps. Journal of Digital
Forensics, Security and Law, 13(2), 1–18.
6. Katz, L., & Sherman, R. (2016). Blockchain Technology for Digital Forensics. International Journal of Computer Science and Information
Technology, 8(1), 34–45.
7. Baryamureeba, V., & Tushabe, F. (2004). The Forensic Analysis of Digital Evidence. Journal of Digital Forensics, 2(1), 3–18.
8. Kuhn, M., & Chia, A. (2007). A Survey of Anti-Forensics Techniques. Journal of Digital Forensics, Security and Law, 2(3), 81–92.
9. Cristea, L. M. (2020). Current Security Threats in the National and International Context. Journal of Accounting and Management
Information Systems, 19(2), 351–378.
10. Giffin, J., Greenstadt, R., Litwack, P., & Tibbetts, R. (2003). Covert Messaging through TCP Timestamps. Proceedings of the 2nd
International Workshop on Privacy Enhancing Technologies, 194–208. Springer.
11. NIST SP 800-208. (2020). Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology.
12. Grinberg, M. (2018). Flask Web Development: Developing Web Applications with Python, 2nd Edition. O'Reilly Media.
13. Lutz, M. (2013). Learning Python, 5th Edition. O'Reilly Media.
14. DuBois, P. (2014). MySQL Cookbook, 3rd Edition. O'Reilly Media

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/blockchain-integrated-lightweight-cryptographic-framework-for-detecting-file-timestamp-manipulation-in-digital-forensic-analysis

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.