ARCHIVES
Original Article
Blockchain-Integrated Lightweight Cryptographic Framework for Detecting File Timestamp Manipulation in Digital Forensic Analysis
M. Mayavathi1
T. Harish2
K. Mydhili Sharan3
P. Yasvanth Raj4
1 Assistant Professor, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri, Tamil Nadu, India. 2 3 4 UG Scholars, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri, Tamil Nadu, India.
Published Online: January-April 2026
Pages: 387-391
Cite this article
No DOIReferences
1. Lukas, D., & Stojanovic, J. (2017). Anti-forensics: An Overview. International Journal of Computer Applications, 167(9), 1–8.
2. Liu, Z., & Zhang, L. (2015). Timestamp Analysis in Digital Forensics. Proceedings of the International Conference on Information and
Communications Security, 21–32.
3. Casey, E. (2004). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Elsevier Academic Press.
4. Kessler, G. C. (2001). An Overview of Computer Forensics. Proceedings of the International Workshop on Systematic Approaches to Digital
Forensic Engineering, 1–10.
5. Fitzgerald, B., & McDaniel, P. (2018). File System Analysis for Forensics: Identifying the Impact of File Timestamps. Journal of Digital
Forensics, Security and Law, 13(2), 1–18.
6. Katz, L., & Sherman, R. (2016). Blockchain Technology for Digital Forensics. International Journal of Computer Science and Information
Technology, 8(1), 34–45.
7. Baryamureeba, V., & Tushabe, F. (2004). The Forensic Analysis of Digital Evidence. Journal of Digital Forensics, 2(1), 3–18.
8. Kuhn, M., & Chia, A. (2007). A Survey of Anti-Forensics Techniques. Journal of Digital Forensics, Security and Law, 2(3), 81–92.
9. Cristea, L. M. (2020). Current Security Threats in the National and International Context. Journal of Accounting and Management
Information Systems, 19(2), 351–378.
10. Giffin, J., Greenstadt, R., Litwack, P., & Tibbetts, R. (2003). Covert Messaging through TCP Timestamps. Proceedings of the 2nd
International Workshop on Privacy Enhancing Technologies, 194–208. Springer.
11. NIST SP 800-208. (2020). Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology.
12. Grinberg, M. (2018). Flask Web Development: Developing Web Applications with Python, 2nd Edition. O'Reilly Media.
13. Lutz, M. (2013). Learning Python, 5th Edition. O'Reilly Media.
14. DuBois, P. (2014). MySQL Cookbook, 3rd Edition. O'Reilly Media
2. Liu, Z., & Zhang, L. (2015). Timestamp Analysis in Digital Forensics. Proceedings of the International Conference on Information and
Communications Security, 21–32.
3. Casey, E. (2004). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Elsevier Academic Press.
4. Kessler, G. C. (2001). An Overview of Computer Forensics. Proceedings of the International Workshop on Systematic Approaches to Digital
Forensic Engineering, 1–10.
5. Fitzgerald, B., & McDaniel, P. (2018). File System Analysis for Forensics: Identifying the Impact of File Timestamps. Journal of Digital
Forensics, Security and Law, 13(2), 1–18.
6. Katz, L., & Sherman, R. (2016). Blockchain Technology for Digital Forensics. International Journal of Computer Science and Information
Technology, 8(1), 34–45.
7. Baryamureeba, V., & Tushabe, F. (2004). The Forensic Analysis of Digital Evidence. Journal of Digital Forensics, 2(1), 3–18.
8. Kuhn, M., & Chia, A. (2007). A Survey of Anti-Forensics Techniques. Journal of Digital Forensics, Security and Law, 2(3), 81–92.
9. Cristea, L. M. (2020). Current Security Threats in the National and International Context. Journal of Accounting and Management
Information Systems, 19(2), 351–378.
10. Giffin, J., Greenstadt, R., Litwack, P., & Tibbetts, R. (2003). Covert Messaging through TCP Timestamps. Proceedings of the 2nd
International Workshop on Privacy Enhancing Technologies, 194–208. Springer.
11. NIST SP 800-208. (2020). Recommendation for Stateful Hash-Based Signature Schemes. National Institute of Standards and Technology.
12. Grinberg, M. (2018). Flask Web Development: Developing Web Applications with Python, 2nd Edition. O'Reilly Media.
13. Lutz, M. (2013). Learning Python, 5th Edition. O'Reilly Media.
14. DuBois, P. (2014). MySQL Cookbook, 3rd Edition. O'Reilly Media
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026
Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study
Share Article
Or copy link
https://test.indjcst.com/archives/blockchain-integrated-lightweight-cryptographic-framework-for-detecting-file-timestamp-manipulation-in-digital-forensic-analysis
*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.