Font Size: a A A

Digital steganography: Its impact on mobile forensics, hacking, and social media

Posted on:2016-02-05Degree:M.SType:Thesis
University:Utica CollegeCandidate:Bell, RenaldoFull Text:PDF
GTID:2478390017986581Subject:Computer Science
Abstract/Summary:
The Internet in its entirety is a play area for the advanced steganographer. Steganography has become considerably simpler to accomplish and tougher to uncover. Digital steganography makes it possible to conceal data within a digital file, or message, to hide it from view. In recent years, new data hiding and steganography software have materialized. These new apps operate on Android, iOS, and Windows mobile systems. Mobile devices, with its wide-ranging functionality, can offer the richest foundation of civil and criminal evidence for computer forensic examiners. The most eminent exploitation of steganography is concealing malware into seemingly harmless files such as images, audio and email attachments. Anti-forensics hide traces of a user's activity, making examinations more challenging and laborious.;Terrorist groups like the Islamic State of Iraq and Syria (ISIS) have employed standard tactics, like Stuxtnet worm to steal a billion dollars from numerous banks worldwide. A study has shown that teens in the United States posted messages on Facebook that seemingly looked like innocent updates, but in actuality included a hidden message. The purpose of this research was to examine how digital steganography has an impact on mobile forensics. What is digital steganography's impact on mobile forensics? What digital steganography techniques are being utilized for hacking? What significant role does digital steganography play in social media? The research concluded that rules and procedures for assessing an efficient method to steganography detection needed to be employed and enforced. Additionally, the research exposed that research could be conducted to concentrate on the development of a decision support environment to assist digital forensic examiners when working with anti-forensic techniques within mobile platforms, like Android. Keywords: Cybersecurity, Professor Christopher Riddell, Hackers, Smartphones, Cell phones, QR codes, Secretbook.
Keywords/Search Tags:Steganography, Mobile, Impact
Related items