Authors :
Eman Daraghmi; Ahmed Hamoudi
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/23uzxtpc
Scribd :
https://tinyurl.com/497589kz
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP937
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Steganography is a method used to conceal
information, while steganalysis focuses on detecting
hidden data. In today's digital landscape, steganography
is often used across open communication channels,
embedding files, videos, messages, and images within
other files to obscure their content from unintended
viewers. However, cybercriminals exploit these
techniques to covertly transmit data to various devices.
Traditional endpoint antimalware tools are not typically
designed to search for hidden data, making the detection
of steganographic content challenging. The ease with
which cybercriminals can transmit data using this
method highlights its potential threat. This paper reviews
various steganalysis tools and explores the integration of
antivirus programs for real-time detection to enhance
data confidentiality. A proof-of-concept for one of the
steganalysis tools is also provided.
Keywords :
Steganographyt; Cryptography; Cryptanalysis; Forensics.
References :
- Z. Alsaed et al., “Role of Blockchain Technology in Combating COVID-19 Crisis,” Appl. Sci., vol. 11, no. 24, p. 12063, Dec. 2021, doi: 10.3390/app112412063.
- E. Daraghmi, Z. Qaroush, M. Hamdi, and O. Cheikhrouhou, “Forensic Operations for Recognizing SQLite Content (FORC): An Automated Forensic Tool for Efficient SQLite Evidence Extraction on Android Devices,” Appl. Sci., vol. 13, no. 19, p. 10736, Sep. 2023, doi: 10.3390/app131910736.
- E. Y. Daraghmi, C. H. Hsiao, and S. M. Yuan, “A New Cloud Storage Support and Facebook Enabled Moodle Module,” in 2014 7th International Conference on Ubi-Media Computing and Workshops, Ulaanbaatar, Mongolia: IEEE, Jul. 2014, pp. 78–83. doi: 10.1109/u-media.2014.12.
- E. Y. Daraghmi and Y. S. Ming, “Using graph theory to re-verify the small world theory in an online social network word,” in Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali Indonesia: ACM, Dec. 2012, pp. 407–410. doi: 10.1145/2428736.2428811.
- E. Daraghmi, C.-P. Zhang, and S.-M. Yuan, “Enhancing Saga Pattern for Distributed Transactions within a Microservices Architecture,” Appl. Sci., vol. 12, no. 12, p. 6242, Jun. 2022, doi: 10.3390/app12126242.
- E.-Y. Daraghmi, M.-C. Wu, and S.-M. Yuan, “A Multilayer Data Processing and Aggregating Fog-Based Framework for Latency-Sensitive IoT Services,” Appl. Sci., vol. 11, no. 4, p. 1374, Feb. 2021, doi: 10.3390/app11041374.
- Y. Salem and E. Daraghmi, “GDPR-BLOCKCHAIN COMPLIANCE FOR PERSONAL DATA,” J. Theor. Appl. Inf. Technol., vol. 99, no. 24, pp. 5867–5877, 2021.
- Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” IJCSMS Int. J. Comput. Sci. Manag. Stud., vol. 11, no. 03, pp. 2231–5268, 2011.
- R. Gupta, “Information Hiding and Attacks: Review,” Int. J. Comput. Trends Technol., vol. 10, no. 1, pp. 21–24, 2014, doi: 10.14445/22312803/ijcttv10p105.
- E. Y. Daraghmi, C.-F. Lin, and S. M. Yuan, “Mobile Phone Enabled Barcode Recognition for Preferences Monitoring,” in Advances in Computer Science and Education Applications, vol. 202, M. Zhou and H. Tan, Eds., in Communications in Computer and Information Science, vol. 202. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 297–302. doi: 10.1007/978-3-642-22456-0_43.
- T. W. Edgar and D. O. Manz, “Science and Cyber Security,” in Research Methods for Cyber Security, Elsevier, 2017, pp. 33–62. doi: 10.1016/b978-0-12-805349-2.00002-9.
- A. Salem, M. Sabbih, H. Al-tamimi, and A. Ahmed, “Secure Image Steganography Through Multilevel Security,” Int. J. Comput. Sci. Inf. Secur., vol. 11, no. 1, pp. 80–103, 2020.
- Y. Zheng, F. Liu, X. Luo, and C. Yang, “A Method Based on Feature Matching to Identify Steganography Software,” in 2012 4th International Conference on Multimedia and Security (MINES 2012), 2012, pp. 989–994. doi: 10.1109/MINES.2012.26.
- Merriam-Webster, “Definition of steganography.” 2020. [Online]. Available: https://www.merriam-webster.com/dictionary/steganography
- E.-Y. Daraghmi and A. Hamoudi, “THE DEVELOPMENT OF A BLOCKCHAIN-BASED SYSTEM FOR ELECTRONIC VOTING,” . Vol., no. 17.
- Y. Castelan and B. Khodja, “MP3 Steganography Techniques,” in Proceedings of the 4th Annual ACM Conference on Research in Information Technology (RIIT 2015), 2015, pp. 51–54. doi: 10.1145/2808062.2808074.
- A. El-Sayed, G. Attiya, and A. Fkirin, “Steganography Literature Survey, Classification and Comparative Study,” Commun. Appl. Electron., vol. 5, no. 10, pp. 13–22, 2016, doi: 10.5120/cae2016652384.
- E. Daraghmi, “Augmented Reality Based Mobile App for a University Campus,” 2017, doi: 10.13140/RG.2.2.36356.24962.
- K. Karampidis, E. Kavallieratou, and G. Papadourakis, “A Review of Image Steganalysis Techniques for Digital Forensics,” J. Inf. Secur. Appl., vol. 40, pp. 217–235, 2018, doi: 10.1016/j.jisa.2018.04.005.
- M. Kaur and G. Kaur, “Review of Various Steganalysis Techniques,” Int. J. Comput. Appl., vol. 5, no. 2, pp. 1744–1747, 2014.
- J. Makwana and S. G. Chudasama, “Dual Steganography: A New Hiding,” Int. J. Adv. Res. Electr. Electron. Instrum. Eng., vol. 5, no. 4, pp. 3184–3188, 2016, doi: 10.15662/IJAREEIE.2016.0504109.
- P. Hayati, V. Potdar, and E. Chang, “A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator,” in Proceedings of the Workshop of Information Hiding and Digital Watermarking in Conjunction with IFIPTM, New Brunswick, Canada, 2007.
- Shawahniibrahim, “Directory-watcher.” 2020. [Online]. Available: https://github.com/shawahniibrahim/Directory-watcher
- DominicBreuker, “Steganography Toolkit.” 2020. [Online]. Available: https://github.com/DominicBreuker/stego-toolkit
- Bannsec, “StegoVeritas.” 2020. [Online]. Available: https://github.com/bannsec/stegoVeritas
- A. Latham, “Steganography.” 1999. [Online]. Available: http://linux01.gwdg.de/ alatham/stego.html
- S. A. Laskar and K. Hemachandran, “A Review on Image Steganalysis Techniques for Attacking Steganography,” Int. J. Eng. Res. Technol., vol. 3, no. 1, pp. 3400–3410, 2014.
Steganography is a method used to conceal
information, while steganalysis focuses on detecting
hidden data. In today's digital landscape, steganography
is often used across open communication channels,
embedding files, videos, messages, and images within
other files to obscure their content from unintended
viewers. However, cybercriminals exploit these
techniques to covertly transmit data to various devices.
Traditional endpoint antimalware tools are not typically
designed to search for hidden data, making the detection
of steganographic content challenging. The ease with
which cybercriminals can transmit data using this
method highlights its potential threat. This paper reviews
various steganalysis tools and explores the integration of
antivirus programs for real-time detection to enhance
data confidentiality. A proof-of-concept for one of the
steganalysis tools is also provided.
Keywords :
Steganographyt; Cryptography; Cryptanalysis; Forensics.