EXPLORING SECURE METHODS FOR ENSURING DATA INTEGRITY: A THEORETICAL ANALYSIS OF CRYPTOGRAPHIC AND DETECTION TECHNIQUES