Steganalysis in Computer Forensics

نویسنده

  • Ahmed Ibrahim
چکیده

Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of computer forensics has somewhat fallen behind. This paper will discuss on how steganography is used for information hiding and its implications on computer forensics. While this paper is not about recovering hidden information, tools that are used for both steganography and steganalysis is evaluated and identifies the shortcomings that the forensic analysts would face. In doing so this paper urges on what the stakeholders in the field of computer forensics needs to do to keep ahead of criminals who are using such techniques to their advantage and obscure their criminal activities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015)

| Introduction | Null Ciphers| Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio

متن کامل

Steganography for the Computer Forensics Examiner

| Introduction | Null Ciphers | Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio

متن کامل

Computer Forensic Investigation

This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the...

متن کامل

Countering Counter-Forensics: The Case of JPEG Compression

This paper summarizes several iterations in the cat-andmouse game between digital image forensics and counter-forensics related to an image’s JPEG compression history. Building on the counterforensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct a targeted detector against it, and present an improved...

متن کامل

Classifiers and machine learning techniques for image processing and computer vision

We propose the use of classifiers and machine learning techniques to extract useful information from data sets (e.g., images) to solve important problems in Image Processing and Computer Vision. We are interested in: two and multiclass image categorization, hidden messages detection, discrimination among natural and forged images, authentication, and multi-classification. Keywords-Machine Learn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007