FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS

被引:1
|
作者
Chen, Wenhao [1 ]
Wang, Yangxiao
Guan, Yong [2 ]
Newman, Jennifer [3 ]
Lin, Li [4 ]
Reinders, Stephanie [4 ]
机构
[1] Iowa State Univ, Comp Engn, Ames, IA 50011 USA
[2] Iowa State Univ, Elect & Comp Engn, Ames, IA USA
[3] Iowa State Univ, Math, Ames, IA USA
[4] Iowa State Univ, Appl Math, Ames, IA USA
来源
关键词
Image forensics; steganography; steganalysis; Android apps; STEGANALYSIS;
D O I
10.1007/978-3-319-99277-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.
引用
收藏
页码:293 / 312
页数:20
相关论文
共 50 条
  • [21] Vulnerability Analysis of Android Auto Infotainment Apps
    Mandal, Amit Kr
    Cortesi, Agostino
    Ferrara, Pietro
    Panarotto, Federica
    Spoto, Fausto
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 183 - 190
  • [22] AndroidProtect: Android Apps Security Analysis System
    Zhang, Tong
    Li, Tao
    Wang, Hao
    Xiao, Zhijie
    COLLABORATE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2016, 2017, 201 : 583 - 594
  • [23] API Change Impact Analysis for Android Apps
    Mahmud, Tarek
    Khan, Mujahid
    Rouijel, Jihan
    Che, Meiru
    Yang, Guowei
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 894 - 903
  • [24] Steganography with Cryptography in Android
    Kandul, Akshay
    More, Ashwin
    Davalbhakta, Omkar
    Artamwar, Rushikesh
    Kulkarni, Dinesh
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 57 - 64
  • [25] Forensic Analysis of Android Notifications' History
    Dragonas, Evangelos
    Lambrinoudakis, Costas
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 354 - 359
  • [26] Forensic analysis of WeChat on Android smartphones
    Wu, Songyang
    Zhang, Yong
    Wang, Xupeng
    Xiong, Xiong
    Du, Lin
    DIGITAL INVESTIGATION, 2017, 21 : 3 - 10
  • [27] Forensic analysis of hook Android malware
    Schmutz, Dominic
    Rapp, Robin
    Fehrensen, Benjamin
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 49
  • [28] Forensic Analysis of Android Mobile Devices
    Rao, V. Venkateswara
    Chakravarthy, A. S. N.
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [29] Forensic Collection and Analysis of Thumbnails in Android
    Di Leom, Ming
    D'Orazio, Christian Javier
    Deegan, Gaye
    Choo, Kim-Kwang Raymond
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1059 - 1066
  • [30] Forensic Analysis of Fitness Applications on Android
    Sinha, Rahul
    Sihag, Vikas
    Choudhary, Gaurav
    Vardhan, Manu
    Singh, Pradeep
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 222 - 235