首页> 外文会议>IFIP WG 11.9 International Conference on Digital Forensics >FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS
【24h】

FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS

机译:仿生指纹技术的法医学分析

获取原文

摘要

The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. This chapter focuses on two key questions: How effectively can a steganography app be reverse engineered? How can this knowledge help improve the detection of steganographic images and other related files? Two Android steganography apps, PixelKnot and Da Vinci Secret Image, are analyzed. Experiments demonstrate that they are constructed in very different ways and provide different levels of security for hiding messages. The results of detecting steganography files, including images generated by the apps, using three software packages are presented. The results point to an urgent need for further research on reverse engineering steganography apps and detecting images produced by these apps.
机译:智能手机的处理能力支持隐写算法,对于手持设备而言,隐写算法的计算量很大。现在,移动电话上提供了几种隐写术应用程序,以支持使用数字照片进行秘密通信。本章重点讨论两个关键问题:隐写术应用程序如何有效地反向工程?这些知识如何帮助改善对隐秘图像和其他相关文件的检测?分析了两个Android隐写应用程序PixelKnot和Da Vinci Secret Image。实验表明,它们的构造方式非常不同,并且为隐藏消息提供了不同级别的安全性。展示了使用三个软件包检测隐写文件的结果,包括应用程序生成的图像。结果表明迫切需要对反向工程隐写术应用程序进行进一步研究并检测由这些应用程序生成的图像。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号