FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS

被引:1
|
作者
Chen, Wenhao [1 ]
Wang, Yangxiao
Guan, Yong [2 ]
Newman, Jennifer [3 ]
Lin, Li [4 ]
Reinders, Stephanie [4 ]
机构
[1] Iowa State Univ, Comp Engn, Ames, IA 50011 USA
[2] Iowa State Univ, Elect & Comp Engn, Ames, IA USA
[3] Iowa State Univ, Math, Ames, IA USA
[4] Iowa State Univ, Appl Math, Ames, IA USA
来源
关键词
Image forensics; steganography; steganalysis; Android apps; STEGANALYSIS;
D O I
10.1007/978-3-319-99277-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.
引用
收藏
页码:293 / 312
页数:20
相关论文
共 50 条
  • [1] Forensic Taxonomy of Android Social Apps
    Azfar, Abdullah
    Choo, Kim-Kwang Raymond
    Liu, Lin
    JOURNAL OF FORENSIC SCIENCES, 2017, 62 (02) : 435 - 456
  • [2] Forensic taxonomy of android productivity apps
    Abdullah Azfar
    Kim-Kwang Raymond Choo
    Lin Liu
    Multimedia Tools and Applications, 2017, 76 : 3313 - 3341
  • [3] Forensic taxonomy of android productivity apps
    Azfar, Abdullah
    Choo, Kim-Kwang Raymond
    Liu, Lin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3313 - 3341
  • [4] Forensic analysis and security assessment of Android m-banking apps
    Chanajitt, Rajchada
    Viriyasitavat, Wantanee
    Choo, Kim-Kwang Raymond
    AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2018, 50 (01) : 3 - 19
  • [5] Forensic Taxonomy of Popular Android mHealth Apps
    Azfar, Abdullah
    Choo, Kim-Kwang Raymond
    Liu, Lin
    AMCIS 2015 PROCEEDINGS, 2015,
  • [6] Acquisition and Analysis of Forensic Data Artefacts of Some Popular Apps in Android Smartphone
    Konduru, Yamini
    Mishra, Nishchol
    Sharma, Sanjeev
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 86 - 93
  • [7] What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps
    Knox, Shawn
    Moghadam, Steven
    Patrick, Kenny
    Phan, Anh
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2020, 94 (94)
  • [8] Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices
    Grispos, George
    Choo, Kim-Kwang Raymond
    Glisson, William Bradley
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04): : 1282 - 1292
  • [9] An empirical analysis of android apps bug and automated testing approach for Android apps
    Bie Y.
    Bin S.
    Sun G.
    Zhou X.
    1600, Science and Engineering Research Support Society (11): : 1 - 10
  • [10] Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching
    Chen, Wenhao
    Lin, Li
    Newman, Jennifer
    Guan, Yong
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 254 - 262