Privacy-Preserving and Scalable Digital Evidence Management: A Hyperledger Fabric Architecture with Growth Projections for Law Enforcement
Presentation / Conference Contribution
Onyeashie, B. I., Abubakar, M., Leimich, P., McKeown, S., & Russell, G. (2025, April)
Privacy-Preserving and Scalable Digital Evidence Management: A Hyperledger Fabric Architecture with Growth Projections for Law Enforcement. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan
Managing digital evidence presents challenges in scalability, security, and workflow separation. This paper presents a novel architecture using Hyperledger Fabric that separat...
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach
Journal Article
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2025)
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach. Electronics, 14(9), Article 1800. https://doi.org/10.3390/electronics14091800
This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure s...
Exploring Dataset Diversity For GenAI Image Inpainting Localisation In Digital Forensics
Presentation / Conference Contribution
Thomson, M., McKeown, S., Macfarlane, R., & Leimich, P. (2025, April)
Exploring Dataset Diversity For GenAI Image Inpainting Localisation In Digital Forensics. Presented at The Digital Forensics Research Conference Europe (DFRWS EU 2025) Digital Forensics Doctoral Symposium (DFDS), Brno, Czech Republic
Generative Artificial Intelligence (GenAI) has significantly increased the sophistication and ease of image tampering techniques, posing challenges for digital forensics in id...
A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification
Presentation / Conference Contribution
Abubakar, M. A., Onyeashie, B. I., Wadhaj, I., Leimich, P., Ali, H., & Buchanan, W. J. (2024, November)
A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. Presented at 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, UAE
This study provides a comprehensive overview of blockchain technology, discusses its characteristics, and explains the hierarchical structure of the blockchain. Additionally, ...
An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case
Conference Proceeding
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2024)
An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. In Big Data Technologies and Applications (156-167). https://doi.org/10.1007/978-3-031-52265-9_11
This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The ...
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2024)
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. In Big Data Technologies and Applications. BDTA 2023. https://doi.org/10.1007/978-3-031-52265-9_8
The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and...
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems
Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020)
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3),
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and check...
A Forensic Audit of the Tor Browser Bundle
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019)
A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protoc...
Sub-file Hashing Strategies for Fast Contraband Detection
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited ...