From Cryptography to Steganography: Detecting Hidden Data in the Digital World


Authors : Eman Daraghmi; Ahmed Hamoudi

Volume/Issue : Volume 9 - 2024, Issue 9 - September


Google Scholar : https://tinyurl.com/23uzxtpc

Scribd : https://tinyurl.com/497589kz

DOI : https://doi.org/10.38124/ijisrt/IJISRT24SEP937

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Steganography is a method used to conceal information, while steganalysis focuses on detecting hidden data. In today's digital landscape, steganography is often used across open communication channels, embedding files, videos, messages, and images within other files to obscure their content from unintended viewers. However, cybercriminals exploit these techniques to covertly transmit data to various devices. Traditional endpoint antimalware tools are not typically designed to search for hidden data, making the detection of steganographic content challenging. The ease with which cybercriminals can transmit data using this method highlights its potential threat. This paper reviews various steganalysis tools and explores the integration of antivirus programs for real-time detection to enhance data confidentiality. A proof-of-concept for one of the steganalysis tools is also provided.

Keywords : Steganographyt; Cryptography; Cryptanalysis; Forensics.

References :

  1. Z. Alsaed et al., “Role of Blockchain Technology in Combating COVID-19 Crisis,” Appl. Sci., vol. 11, no. 24, p. 12063, Dec. 2021, doi: 10.3390/app112412063.
  2. E. Daraghmi, Z. Qaroush, M. Hamdi, and O. Cheikhrouhou, “Forensic Operations for Recognizing SQLite Content (FORC): An Automated Forensic Tool for Efficient SQLite Evidence Extraction on Android Devices,” Appl. Sci., vol. 13, no. 19, p. 10736, Sep. 2023, doi: 10.3390/app131910736.
  3. E. Y. Daraghmi, C. H. Hsiao, and S. M. Yuan, “A New Cloud Storage Support and Facebook Enabled Moodle Module,” in 2014 7th International Conference on Ubi-Media Computing and Workshops, Ulaanbaatar, Mongolia: IEEE, Jul. 2014, pp. 78–83. doi: 10.1109/u-media.2014.12.
  4. E. Y. Daraghmi and Y. S. Ming, “Using graph theory to re-verify the small world theory in an online social network word,” in Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali Indonesia: ACM, Dec. 2012, pp. 407–410. doi: 10.1145/2428736.2428811.
  5. E. Daraghmi, C.-P. Zhang, and S.-M. Yuan, “Enhancing Saga Pattern for Distributed Transactions within a Microservices Architecture,” Appl. Sci., vol. 12, no. 12, p. 6242, Jun. 2022, doi: 10.3390/app12126242.
  6. E.-Y. Daraghmi, M.-C. Wu, and S.-M. Yuan, “A Multilayer Data Processing and Aggregating Fog-Based Framework for Latency-Sensitive IoT Services,” Appl. Sci., vol. 11, no. 4, p. 1374, Feb. 2021, doi: 10.3390/app11041374.
  7. Y. Salem and E. Daraghmi, “GDPR-BLOCKCHAIN COMPLIANCE FOR PERSONAL DATA,” J. Theor. Appl. Inf. Technol., vol. 99, no. 24, pp. 5867–5877, 2021.
  8. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” IJCSMS Int. J. Comput. Sci. Manag. Stud., vol. 11, no. 03, pp. 2231–5268, 2011.
  9. R. Gupta, “Information Hiding and Attacks: Review,” Int. J. Comput. Trends Technol., vol. 10, no. 1, pp. 21–24, 2014, doi: 10.14445/22312803/ijcttv10p105.
  10. E. Y. Daraghmi, C.-F. Lin, and S. M. Yuan, “Mobile Phone Enabled Barcode Recognition for Preferences Monitoring,” in Advances in Computer Science and Education Applications, vol. 202, M. Zhou and H. Tan, Eds., in Communications in Computer and Information Science, vol. 202. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 297–302. doi: 10.1007/978-3-642-22456-0_43.
  11. T. W. Edgar and D. O. Manz, “Science and Cyber Security,” in Research Methods for Cyber Security, Elsevier, 2017, pp. 33–62. doi: 10.1016/b978-0-12-805349-2.00002-9.
  12. A. Salem, M. Sabbih, H. Al-tamimi, and A. Ahmed, “Secure Image Steganography Through Multilevel Security,” Int. J. Comput. Sci. Inf. Secur., vol. 11, no. 1, pp. 80–103, 2020.
  13. Y. Zheng, F. Liu, X. Luo, and C. Yang, “A Method Based on Feature Matching to Identify Steganography Software,” in 2012 4th International Conference on Multimedia and Security (MINES 2012), 2012, pp. 989–994. doi: 10.1109/MINES.2012.26.
  14. Merriam-Webster, “Definition of steganography.” 2020. [Online]. Available: https://www.merriam-webster.com/dictionary/steganography
  15. E.-Y. Daraghmi and A. Hamoudi, “THE DEVELOPMENT OF A BLOCKCHAIN-BASED SYSTEM FOR ELECTRONIC VOTING,” . Vol., no. 17.
  16. Y. Castelan and B. Khodja, “MP3 Steganography Techniques,” in Proceedings of the 4th Annual ACM Conference on Research in Information Technology (RIIT 2015), 2015, pp. 51–54. doi: 10.1145/2808062.2808074.
  17. A. El-Sayed, G. Attiya, and A. Fkirin, “Steganography Literature Survey, Classification and Comparative Study,” Commun. Appl. Electron., vol. 5, no. 10, pp. 13–22, 2016, doi: 10.5120/cae2016652384.
  18. E. Daraghmi, “Augmented Reality Based Mobile App for a University Campus,” 2017, doi: 10.13140/RG.2.2.36356.24962.
  19. K. Karampidis, E. Kavallieratou, and G. Papadourakis, “A Review of Image Steganalysis Techniques for Digital Forensics,” J. Inf. Secur. Appl., vol. 40, pp. 217–235, 2018, doi: 10.1016/j.jisa.2018.04.005.
  20. M. Kaur and G. Kaur, “Review of Various Steganalysis Techniques,” Int. J. Comput. Appl., vol. 5, no. 2, pp. 1744–1747, 2014.
  21. J. Makwana and S. G. Chudasama, “Dual Steganography: A New Hiding,” Int. J. Adv. Res. Electr. Electron. Instrum. Eng., vol. 5, no. 4, pp. 3184–3188, 2016, doi: 10.15662/IJAREEIE.2016.0504109.
  22. P. Hayati, V. Potdar, and E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator,” in Proceedings of the Workshop of Information Hiding and Digital Watermarking in Conjunction with IFIPTM, New Brunswick, Canada, 2007.
  23. Shawahniibrahim, “Directory-watcher.” 2020. [Online]. Available: https://github.com/shawahniibrahim/Directory-watcher
  24. DominicBreuker, “Steganography Toolkit.” 2020. [Online]. Available: https://github.com/DominicBreuker/stego-toolkit
  25. Bannsec, “StegoVeritas.” 2020. [Online]. Available: https://github.com/bannsec/stegoVeritas
  26. A. Latham, “Steganography.” 1999. [Online]. Available: http://linux01.gwdg.de/ alatham/stego.html
  27. S. A. Laskar and K. Hemachandran, “A Review on Image Steganalysis Techniques for Attacking Steganography,” Int. J. Eng. Res. Technol., vol. 3, no. 1, pp. 3400–3410, 2014.

Steganography is a method used to conceal information, while steganalysis focuses on detecting hidden data. In today's digital landscape, steganography is often used across open communication channels, embedding files, videos, messages, and images within other files to obscure their content from unintended viewers. However, cybercriminals exploit these techniques to covertly transmit data to various devices. Traditional endpoint antimalware tools are not typically designed to search for hidden data, making the detection of steganographic content challenging. The ease with which cybercriminals can transmit data using this method highlights its potential threat. This paper reviews various steganalysis tools and explores the integration of antivirus programs for real-time detection to enhance data confidentiality. A proof-of-concept for one of the steganalysis tools is also provided.

Keywords : Steganographyt; Cryptography; Cryptanalysis; Forensics.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe