Blockchain-Enhanced Chain of Custody with Deep Learning Tampering Detection for Digital Forensics
Main Article Content
Abstract
The preservation of digital evidence integrity currently faces critical challenges, notably manual chain-of-custody errors ranging from 15-20%, the proliferation of sophisticated tampering techniques, and inherent scalability limitations. To address these issues, this paper presents an integrated framework that synergistically combines blockchain-based immutable custody chains, dual-branch convolutional neural networks for tampering detection, and hybrid consensus mechanisms. Through systematic ablation studies, we demonstrate that the proposed smart contract automation effectively mitigates manual custody errors, ensuring a tamper-evident and immutable custody record. Furthermore, our dual-branch architecture, enhanced with adaptive fusion (α =0.6), attains a 98.5% tampering detection accuracy—representing a 5.3% improvement over single-branch baselines. Additionally, the hybrid Proof-of-Authority and Byzantine Fault Tolerant consensus mechanism delivers a throughput of 10,000 transactions per second, marking a 1,429-fold improvement over traditional blockchain implementations. A comprehensive evaluation on the NIST CFReDS, supported by statistical validation (p < 0.001), demonstrates the superiority of our approach over six baseline methods. We further provide a detailed failure analysis, a computational cost breakdown, and validation through simulated forensic scenarios, alongside proposed integration pathways for commercial forensic tools such as EnCase and FTK to facilitate practical adoption.
Keywords
Blockchain, Chain of custody, Digital forensics, Smart contracts, Tampering detection.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
[2] E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 2011.
[3] N. Tyagi and R. Jain, Dual-Branch Convolutional Framework for Spatial and Frequency-Based Image Forgery Detection, 2025. https://doi.org/10.48550/arXiv.2509.05281
[4] M. AlKhanafseh and O. Surakhi, Evidence Preservation in Digital Forensics: An Approach Using Blockchain and LSTM-Based Steganography, Electronics, vol. 13, no. 18, pp. 3729, 2024. https://doi.org/10.3390/electronics13183729
[5] A. H. Lone and R. N. Mir, A Novel Blockchain-Based Digital Forensics Framework for Preserving Evidence and Enabling Investigation in Industrial Internet of Things, Alexandria Engineering Journal, vol. 86, pp. 631–643, 2024. https://doi.org/10.1016/j.aej.2023.12.021
[6] M. Imrankhan, M. Viji, S. Rajamani, T. Gnanaprakash, R. Roshan, and G. Saravanan, Blockchain based digital forensic data for unbreakable trust and security, Proc. 2024 Int. Conf. on System, Computation, Automation and Networking (ICSCAN), pp. 1–6, 2024. https://doi.org/10.1109/ICSCAN62807.2024.10894341
[7] X. Guo, X. Liu, Z. Ren, S. Grosz, K. R. Mopuri, and H. Yin, Hierarchical fine-grained image forgery detection and localization, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3151–3166, 2023. https://doi.org/10.48550/arXiv.2303.17111
[8] C. Feng, D. Wu, T. Wu, and G. Pan, An MSDCNN-LSTM framework for video frame deletion forensics, Multimedia Tools and Applications, vol. 83, pp. 72745–72764, 2024. https://doi.org/10.1007/s11042-024-18324-7
[9] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. [Online] https://bitcoin.org/bitcoin.pdf
[10] National Institute of Standards and Technology, Computer Forensic Reference Data Sets (CFReDS). [Online] https://cfreds-archive.nist.gov/
[11] K. I. Ponte Cuevas and A. A. Huaman Aguirre, Blockchain as a tool to improve chain of custody procedures in digital forensics: A systematic review, Proc. 23rd LACCEI Int. Multi-Conf. Eng., Educ., Technol. 2025. https://doi.org/10.18687/LACCEI2025.1.1.321
[12] T. X. Hung, L. T. Dung, and T. A. Tu, A Blockchainbased chain of custody for digital evidence: Design and evaluation, Journal of Science and Technology on Information Security, vol. 3, no. 26, pp. 25–38, 2025. https://isj.vn/index.php/journal_STIS/article/view/1167
[13] O. S. Igonor, M. B. Amin, and S. Garg, The application of blockchain technology in the field of digital forensics: A literature review, Blockchains, vol. 3, no. 1, pp. 5, 2025. https://doi.org/10.3390/blockchains3010005
[14] T. Nargis, A. C. Thomas, R. R. Rao, R. Dsouza, R. Dsouza, and S. S M, Cyber forensic evidence protection system using blockchain technology, pp. 614–619, 2025. https://doi.org/10.1109/ICOEI65986.2025.11013602
[15] R. El-Kady, Leveraging AI and machine learning for digital forensics, Quantum AI and its Applications in Blockchain Technology, pp. 215–250, 2024. https://doi.org/10.4018/979-8-3373-1657-4.ch011
[16] S. Darwish, M. Abu-Deif, and S. Elkaffas, Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function, PLOS ONE, vol. 19, no. 10, pp. e0312345, 2024. https://doi.org/10.1371/journal.pone.0308451