Abstract

Steganography is one of the anti-forensic techniques used by criminals to hide information in other messages which can cause problems in the investigation process and difficulties in obtaining original information evidence on the digital crime. Digital forensic analysts are required ability to find and extract the messages that have been inserted by using proper tools. The purpose of this research is to analyze the hidden digital evidence using steganography techniques. This research uses the static forensics method by applying five stages in the Generic Forensics Investigation Model framework, namely pre-process, acquisition & preservation, analysis, presentation, and post-process as well as extracting files that have been infiltrated based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results on the steganographic file insertion experiment of 20 files indicate that StegSpy and Hiderman are effective on the steganographic analysis of digital evidence. StegSpy can detect the presence of secret messages with 85% success rate. The extraction process using Hiderman for 18 files with containing steganographic messages had 100% successful.

Highlights

  • Various kinds of crimes and criminal acts currently involve information and communication technology [1] [2]

  • Confidentiality, security, or integrity of the information to be conveyed are the main factors in steganography [8] [9]

  • Computer crimes related to the misuse of steganographic techniques have been reported through the mass media, including a report from Trend Micro November 2017 with the title “REDBALDKNIGHT’s Daserf Backdoor Using Steganography”

Read more

Summary

Introduction

Various kinds of crimes and criminal acts currently involve information and communication technology [1] [2]. Perpetrators of crimes can be subject to punishment based on the evidence [4]. Digital criminals usually use anti-forensic techniques causing difficulties to find the digital evidence [5]. One of the anti-forensic techniques is steganography [6]. Confidentiality, security, or integrity of the information to be conveyed are the main factors in steganography [8] [9]. This technique allows the perpetrator to hide information by inserting the information into other messages in the form of digital media such as text, images, audio or video without arousing suspicion. It has been reported that the Bronze Butler or Corresponding Author

Objectives
Methods
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.