scholarly journals Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM

2020 ◽  
Vol 5 (2) ◽  
pp. 96
Author(s):  
Muh Hajar Akbar ◽  
Sunardi Sunardi ◽  
Imam Riadi

Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.

Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.


2006 ◽  
Vol 115 (5-6) ◽  
pp. 193-199
Author(s):  
M. J. Williams ◽  
A. Turner ◽  
D. Blackham

CCIT Journal ◽  
2016 ◽  
Vol 9 (2) ◽  
pp. 214-224
Author(s):  
Sugeng Santoso ◽  
Arisman Arisman ◽  
Windy Sentanu

Security of distributed information is essential for maintaining the confidentiality of the information. The process of securing is done by hiding the information on other digital media that are not visible existence. This technique is called steganography, the art of hiding data into digital media with a particular method so that other people do not realize there is something in the digital media. In this paper conducted a study to hide information into digital audio file is not compressed (. Wav) as a carrier file using the Least Significant Bit Modification. Least Significant Bit Modification is a method of hiding information by modifying the last bits of carrier files with the bits of information and only cause changes in the value of a bit higher or a lower one. The system was designed with two main processes, namely phase Embedding and Extracting stage


2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


Author(s):  
M. Zelena

This article outlines current issues of research on computer traces in the investigation of crimes at the stage of pre-trial investigation related to illegal trafficking of narcotic drugs, psychotropic substances or their analogues. The main ways of conducting drug trafficking in Ukraine using modern information technologies, that is, using computer technology (mostly mobile devices, personal portable computers) and software products (programs for communicating by means of calls and messages through the Internet, Web browsers, etc.) on the World Wide Web are analyzed. Based on the analysis of research and publications of scientists as well as on the basis of empirical research during computer forensic investigations connected with investigation of illegal distribution of narcotic drugs, methods of illicit goods distribution on the Internet along with methods for investigating computer technologies, which directly relate to drug trafficking using modern information technologies, has been considered. Types of data that can be extracted using specialized software in laboratories of computer research during computer forensic investigation, and which, in turn, can function as factual data and is the evidence of commission of crimes related to drug trafficking, psychotropic substances or their analogues are considered, namely, we are talking about such data as: information from messenger programs, web browsers, text messages, as well as from user files (including graphic, audio and video files); In addition, guiding questions that can be addressed to a forensic expert while computer forensic investigation in criminal investigations related to illegal production, manufacture, purchase, storage, transportation, transfer, sale of narcotic drugs, psychotropic substances or their analogues are suggested.


2018 ◽  
Vol 14 (18) ◽  
pp. 40
Author(s):  
Iván Mesias Hidalgo Cajo ◽  
Saul Yasaca Pucuna ◽  
Byron Geovanny Hidalgo Cajo ◽  
Víctor Manuel Oquendo Coronado ◽  
Fanny Valeria Salazar Orozco

The aim of this research is to compare the different standards and methodologies of computer forensic analysis used in the examination of data in digital media. The research was developed based on the scientific method, and a standard and two analysis methodologies were specifically used, which were applied to ten researchers. The analysis variables were based on the feasibility of use and on the time of extracting information from the computer. Among the comparison results of the different methodologies analyzed, it was determined that for the Methodology UNE 71506: 2013, 60% of the researchers used it due to the feasibility of use because it is made up of a robust process (contains the most detailed steps of computer forensics). Reliable and applicable in any field necessarily supervised by specialists working in the area, compared to the National Institute of Standards and Technology that selected 30%, Integrated Digital Investigation Process 10%. Regarding the time of analysis in the examination of digital media with different methodologies (Case study: Extraction of a file of 100 Mb, of a hard disk of 20 Gb in off mode. It is revealed that in the UNE 71506: 2013 it took less than 1 hour compared to the National Institute of Standards and Technology, which took between 1 and less than 2 hours, the Integrated Digital Investigation Process, which lasted longer than 3 hours. In addition, with the use of the Methodology UNE 71506: 2013, it was possible to have greater feasibility in the examination of digital media, since it is composed of four stages such as the preservation, acquisition, analysis and presentation of information results.


Sign in / Sign up

Export Citation Format

Share Document