InclusiSight: More Than Meets the Eye
First-Cut Project Proposal
Project Title
InclusiSight: A Secure and Forensically-Verifiable Color Accessibility Framework.
Problem Statement
Standard accessibility tools often require invasive permissions (a security risk), while forensic dashboards lack color-blind modes, causing investigators to potentially misinterpret critical visual evidence.
Objectives
- 1. Create a real-time color adaptation engine for Protanopia, Deuteranopia, and Tritanopia.
- 2. Implement an integrated logging system that uses SHA-256 hashing to verify visual transformations for forensic reproducibility.
- 3. Minimize attack surfaces by developing the tool as a sandboxed, offline Chrome extension.
Proposed Approach
A privacy-first Chrome extension using CSS/SVG matrices for color shifting and local storage for tamper-proof activity logging.
Expected Outcome
A secure tool that makes digital content accessible to color-blind users while providing a verifiable 'visual audit trail' for forensic investigations.
Anatomy of a Dissertation
Introduction
Overview of research and objectives.
Literature Review
Summarizing previous work and identifying gaps.
Methodology
Detailed research methods and approaches.
Results
Presentation of findings.
Discussion
Interpretation of results and implications.
Conclusion
Summing up contributions and future work.
References
Citing relevant academic work.
Reflection
The process of early project planning for InclusiSight has highlighted the critical importance of "Privacy-by-Design." By identifying the intersection between accessibility needs and cybersecurity risks at the proposal stage, I have been able to architect a solution that balances user inclusion with rigorous data integrity.
Formulating the objectives for InclusiSight early on ensured that forensic reproducibility remained a core feature rather than a secondary consideration. Integrating SHA-256 hashing and Manifest V3 standards from the outset provides a clear roadmap for developing a tool that is both ethically sound and technically resilient for digital investigations.
Ultimately, this planning phase serves as the foundation for the upcoming dissertation chapters, ensuring that the transition from methodology to implementation is guided by a well-defined security framework.