Skip to Main content Skip to Navigation
Conference papers

Forensic Analysis of Android Steganography Apps

Abstract : The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs.This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.
Document type :
Conference papers
Complete list of metadata

Cited literature [29 references]  Display  Hide  Download

https://hal.inria.fr/hal-01988836
Contributor : Hal Ifip <>
Submitted on : Tuesday, January 22, 2019 - 9:44:27 AM
Last modification on : Thursday, February 7, 2019 - 3:40:57 PM
Long-term archiving on: : Tuesday, April 23, 2019 - 1:50:53 PM

File

472401_1_En_16_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, et al.. Forensic Analysis of Android Steganography Apps. 14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.293-312, ⟨10.1007/978-3-319-99277-8_16⟩. ⟨hal-01988836⟩

Share

Metrics

Record views

215

Files downloads

54