Digital steganography and its existence in cybercrime

ავტორი: Natasha Garcia
ორგანიზაცია: Utica College, Utica, New York

კატეგორია:

საკვანძო სიტყვები: omputer steganography, cybercrime, digital forensics
აბსტრაქტი. The steganography evolution has been driven by the necessity for hiding a secret communication and eliminating its existence. The communication is conveyed between two parties. As a result, the primary objective with steganography is largely concealing the existence of said communication and protecting the embedded data against any modifications such as compression or format change that may happen during a transmission. As technology is adapting, computer users are seeking opportunities to protect the data they are sending. Digital steganography has had recent exposure due to its use for malicious activity and hiding illegal information across the Internet. The use of steganography online is a new practice and training in the law enforcement field has yet to be fully developed. This paper focuses on the specifications of digital steganography, its involvement in cybercrime, and the training opportunities for forensic examiners and law enforcement.

ბიბლიოგრაფია

Ahsan, K., & Kundur, D. (2002). Practical data hiding in TCP/IP. ACM Multimedia and Security Workshop. The Special Interest Group of Multimedia
American Psychological Association. (2013). Publication manual of the American psychological association (Sixth ed.). Washington DC: American Psychological Association
Ballard, J., Hornik, J., & McKenzie, D. (2016). Technological facilitation of terrorism. American Behavioral Scientist, 45(6), 989-1016
Bell, R. (2015). Digital steganography: Its impact on mobile forensics, hacking, and social media. ProQuest Dissertations Publishing, 25-35
Black Hat. (2007). Discover the hidden – steganography investigation training. Retrieved from https://www.blackhat.com/html/bh-usa-07/train-bh-us-07-wsstego.html
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2010, March). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727-752
Gallagher, S. (2012, May 02). Steganography: how al-Qaeda hid secret documents in a porn video. Retrieved from https://arstechnica.com/informationtechnology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-pornvideo/
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2015, September). Video steganography: a comprehensive review. Multimedia Tools and Applications, 74(17), 7063-7094
SANS Institute. (2003). Steganalysis: Detecting hidden information with computer forensic analysis. Retrieved from https://www.sans.org/readingroom/whitepapers/stenganography/steganalysis-detecting-hidden-informationcomputer-forensic-analysis-1014
Stier, C. (2010, July 02). Russian spy ring hid secret messages on the web. Retrieved from https://www.newscientist.com/article/dn19126-russian-spy-ring-hid-secretmessages-on-the-web/
Warkentin, M., Bekkering, E., & Schmidt, M. B. (2008). Steganography: Forensic, security, and legal issues. Journal of Digital Forensics, 3(2), 17-34
Wingate, J. E. (2006). Digital steganography: threat or hype? Retrieved from http://www.infosectoday.com/Articles/digitalstego.htm#author