Forensic Analysis of Android Steganography Apps

dc.contributor.author Chen, Wenhao
dc.contributor.author Wang, Yangxiao
dc.contributor.author Guan, Yong
dc.contributor.author Newman, Jennifer
dc.contributor.author Lin, Li
dc.contributor.author Reinder, Stephanie
dc.contributor.department Center for Statistics and Applications in Forensic Evidence
dc.date 2020-04-10T01:12:30.000
dc.date.accessioned 2020-06-30T01:58:18Z
dc.date.available 2020-06-30T01:58:18Z
dc.date.copyright Mon Jan 01 00:00:00 UTC 2018
dc.date.issued 2018-08-30
dc.description.abstract <p><p id="x-x-Par1">The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. <p id="x-x-Par2">This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.</p>
dc.description.comments <p>This is an accepted manuscript of a chapter published as Chen, Wenhao, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, and Stephanie Reinders. "Forensic analysis of android steganography apps." In <em>IFIP International Conference on Digital Forensics</em>, pp. 293-312. Springer, Cham, 2018. Posted with permission of CSAFE.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/csafe_pubs/38/
dc.identifier.articleid 1021
dc.identifier.contextkey 17324704
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath csafe_pubs/38
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/20386
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/csafe_pubs/38/Chen__2018__IEEE__Manuscript.pdf|||Fri Jan 14 23:52:43 UTC 2022
dc.source.uri 10.1007/978-3-319-99277-8_16
dc.subject.disciplines Forensic Science and Technology
dc.subject.keywords image forensics
dc.subject.keywords steganography
dc.subject.keywords steganalysis
dc.subject.keywords android apps
dc.title Forensic Analysis of Android Steganography Apps
dc.type article
dc.type.genre book_chapter
dspace.entity.type Publication
relation.isOrgUnitOfPublication d8a3c72b-850f-40f6-87c4-8812547080c7
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Chen__2018__IEEE__Manuscript.pdf
Size:
1.11 MB
Format:
Adobe Portable Document Format
Description:
Collections