A New Approach of Computer Forensics Based on Steganalysis

Article Preview

Abstract:

Criminals often destructed or hided evidence after making crime by computer, they hindered computer forensics by anti-forensics technology. A new approach of computer forensics based on steganalysis is proposed. The common anti-forensics technologies, such as steganography, data encryption delete evidence and make forensics invalid. In order to enhance the evidence efficiency, steganalysis is applied in the computer forensics to collect and transfer evidence. Simulation results show that steganography based on least significant bit (LSB) by java program embeds the text files into the BMP image files, which sizes are nearly invariable. Steganalysis restores the hidden information and provides convenient method for computer forensics.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 631-632)

Pages:

1385-1389

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V.M. Luoma. Computer forensics and electronic discovery: The new management challenge. computers & security, 25(2006), pp.91-96.

DOI: 10.1016/j.cose.2006.01.002

Google Scholar

[2] M. Kharrazi, H.T. Sencar and N. Memon, Image steganography: Concepts and practice, WSPC, May (2004).

Google Scholar

[3] M. Kharrazi, H. T. Sencar and N. Memon, Benchmarking steganographic and steganalysis techniques, SPIE, EI, Security and Watermarking of Multimedia Content, San Jose, CA, (2005).

DOI: 10.1117/12.587375

Google Scholar

[4] A. Nissar, A.H. Mir. Classification of steganalysis techniques: A study. Digital Signal Processing. 20(2010), pp.1758-1770.

DOI: 10.1016/j.dsp.2010.02.003

Google Scholar

[5] V.M. Potdar, M.A. Khan. e-Forensics steganography system for secret information retrieval. Advanced Engineering Informatics. 19(2005), pp.235-241.

DOI: 10.1016/j.aei.2005.04.003

Google Scholar

[6] I. Avcibas, M. Nasir, and B. Sankur, Steganalysis using image quality metrics, SPIE, EI, Security and Watermarking of Multimedia Content, San Jose, CA, February 2001; IEEE Trans. on Image Processing 12, 2(2003), pp.221-229.

DOI: 10.1109/tip.2002.807363

Google Scholar

[7] R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, IEEE ICIP 2001, Thessaloniki, Greece, 10(2001), pp.7-10.

DOI: 10.1109/icip.2001.958299

Google Scholar

[8] T. Zhang, X.J. Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing. 83(2003), p.2085- (2093).

DOI: 10.1016/s0165-1684(03)00169-5

Google Scholar