FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS

被引:1
|
作者
Chen, Wenhao [1 ]
Wang, Yangxiao
Guan, Yong [2 ]
Newman, Jennifer [3 ]
Lin, Li [4 ]
Reinders, Stephanie [4 ]
机构
[1] Iowa State Univ, Comp Engn, Ames, IA 50011 USA
[2] Iowa State Univ, Elect & Comp Engn, Ames, IA USA
[3] Iowa State Univ, Math, Ames, IA USA
[4] Iowa State Univ, Appl Math, Ames, IA USA
来源
关键词
Image forensics; steganography; steganalysis; Android apps; STEGANALYSIS;
D O I
10.1007/978-3-319-99277-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.
引用
收藏
页码:293 / 312
页数:20
相关论文
共 50 条
  • [11] Empirical Analysis of Android Apps Permissions
    Abu Bakar, Normi Sham Awang
    Mahmud, Iqram
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 406 - 411
  • [12] Artifacts for Dynamic Analysis of Android Apps
    Cai, Haipeng
    Ryder, Barbara G.
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 659 - 659
  • [13] Forensic analysis of video steganography tools
    Sloan, Thomas
    Hernandez-Castro, Julio
    PEERJ COMPUTER SCIENCE, 2015, 2015 (05)
  • [14] Analysis of Malicious Behavior of Android Apps
    Singh, Pooja
    Tiwari, Pankaj
    Singh, Santosh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 215 - 220
  • [15] Towards Mutation Analysis of Android Apps
    Deng, Lin
    Mirzaei, Nariman
    Ammann, Paul
    Offutt, Jeff
    2015 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2015,
  • [16] Accelerating Symbolic Analysis for Android Apps
    Yang, Mingyue
    Lie, David
    Papernot, Nicolas
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 47 - 52
  • [17] Forensic Analysis of Mobile Banking Apps
    Osho, Oluwafemi
    Mohammed, Uthman L.
    Nimzing, Nanfa N.
    Uduimoh, Andrew A.
    Misra, Sanjay
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2019, PT V: 19TH INTERNATIONAL CONFERENCE, SAINT PETERSBURG, RUSSIA, JULY 14, 2019, PROCEEDINGS, PART V, 2019, 11623 : 613 - 626
  • [18] Kunai: A static analysis framework for Android apps
    Blazquez, Eduardo
    Tapiador, Juan
    SOFTWAREX, 2023, 22
  • [19] AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices
    Abu Asbeh, Somyia M.
    Hammoudeh, Sarah M.
    Hammoudeh, Arab M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (05) : 319 - 327
  • [20] Is Mutation Analysis Effective at Testing Android Apps?
    Deng, Lin
    Offutt, Jeff
    Samudio, David
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 86 - 93