Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
Mobile phones technology has become one of the most common and important technologies that started as a communication tool and then evolved into key reservoirs of personal information and smart applications. With this increased level of complications, increased dangers and increased levels of countermeasures and opposing countermeasures have emerged, such as Mobile Forensics and anti-forensics. One of these anti-forensics tools is steganography, which introduced higher levels of complexity and security against hackers’ attacks but simultaneously create obstacles to forensic investigations. A new anti-forensics approach for embedding data in the steganography field is proposed in this paper. It is based on hiding secret data in hex symbols carrier files rather than the usually used file multimedia carrier including videos, image and sound files. Furthermore, this approach utilizes hexadecimal codes to embed the secret data on the contrary to the conventional steganography approaches which apply changes to binary codes. Accordingly, the resulting data in the carrier files will be unfathomable without the use of special keys yielding a high level of attacking and deciphering difficulty. Besides, embedding the secret data in the form of hex symbols, the agreed upon procedure between communicating parties follows a random embedding manner formulated using WinHex software. Files can be exchanged amongst android devices and/or computers. Experiments were conducted for applying the proposed algorithm on rooted android devices, which also are connected to computers. The proposed methods showed advantages over the currently existing steganography approaches, in terms of character frequency, capacity, security, and robustness.
Authors and Affiliations
Somyia Asbeh, Sarah Hammoudeh, Hamza Al-Sewadi, Arab Hammoudeh
Use of Blockchain in Healthcare: A Systematic Literature Review
Blockchain is an emerging field which works on the concept of a digitally distributed ledger and consensus algorithm removing all the threats of intermediaries. Its early applications were related to the finance sector b...
Interactive Mobile Health Monitoring System
Health monitoring system is an active application in pervasive and ubiquitous computing. It is an application of mobile computing technology for enhancing communication among health care workers, physicians and patients...
Classifying Personalization Constraints in Digital Business Environments through Case Study Research
To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of...
Stabilizing Average Queue Length in Active Queue Management Method
This paper proposes the Stabilized (DGRED) method for congestion detection at the router buffer. This method aims to stabilize the average queue length between allocated minthre_shold and doublemaxthre_shold positions to...
A Study of Multi-Signal Monitoring System Establishment for Hemodynamic Energy Detection
Deaths due to cardiovascular diseases are increasing worldwide, and multi-signal monitoring systems to diagnose such diseases are under development. However, only a few researches are underway for devices that monitor he...