Adopting Hadith Verification Techniques into Digital Evidence Authentication
1032
ACIT'2025 will be held in Arab Academy for Science, Technology & Maritime Transport, December 16-18, 2025 - Alexandria, Egypt
1032
Abstract
Computer forensics investigation processes are still undergoing development and improvement at different stages throughout the entire computer forensic processes. We are presenting a digital authentication technique derived from an extensive work done in another domain, namely Hadith authentication. It has been observed that there exist a number of similarities between the method to verify the authenticity of a hadith and the method to verify the validity of digital evidence. This paper is a continuation of our previous work to identify those similarities and apply them in the realm of digital forensics. The methods of authenticating the content of hadith and verification of the isnad are extracted and applied into our proposed framework for authenticating digital evidence.
Keywords: Computer forensics, Digital evidence authentication, Hadith authentication