AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 5
Abstract
Mobile phones technology has become one of the most common and important technologies that started as a communication tool and then evolved into key reservoirs of personal information and smart applications. With this increased level of complications, increased dangers and increased levels of countermeasures and opposing countermeasures have emerged, such as Mobile Forensics and anti-forensics. One of these anti-forensics tools is steganography, which introduced higher levels of complexity and security against hackers’ attacks but simultaneously create obstacles to forensic investigations. In this paper we proposed a new data hiding approach, the AES Inspired Steganography (AIS), which utilizes some AES data encryption concepts while hiding the data using the concept of hex symbols steganography. As the approach is based on the use of multiple encryption steps, the resulting carrier files would be unfathomable without the use of the cipher key agreed upon by the communicating parties. These carrier files can be exchanged amongst android devices and/or computers. Assessments of the proposed approach have proven it to be advantageous over the currently existing steganography approaches in terms of character frequency, security, robustness, length of key, and Compatibility.
Authors and Affiliations
Somyia Asbeh, Sarah Hammoudeh, Arab Hammoudeh
Role Based Multi-Agent System for E-Learning (MASeL)
Software agents are autonomous entities that can interact intelligently with other agents as well as their environment in order to carry out a specific task. We have proposed a role-based multi-agent system for e-learnin...
A Comparative Study of the Decisional Needs Engineering Approaches
Requirements Engineering (RE) is an important phase in a project of systems development. It helps design-analysts to design and to model the expression of the end-user needs, and their expectations vis-a-vis their future...
Evaluating Cancer Treatment Alternatives using Fuzzy PROMETHEE Method
The aim of this study is to apply the principle of multi-criteria decision making theories on various types of cancer treatment techniques. Cancer is an abnormal cell that divides in an uncontrolled manner, it is a growt...
Classified Arabic Documents Using Semi-Supervised Technique
In this work, we test the performance of the Naïve Bayes classifier in the categorization of Arabic text. Arabic is rich and unique in its own way and has its own distinct features. The issues and characteristics of Arab...
LINK-BUDGET DESIGN AND ANALYSIS SHOWING IMPULSE-BASED UWB PERFORMANCE TRADE-OFF FLEXIBILITY AS INTEGRATOR SOLUTION FOR DIFFERENT WIRELESS SHORT-RANGE INFRASTRUCTURES
Future wireless indoor scenarios are expected to be complex requiring wireless nodes to adaptive responding to dynamic changes according to channel conditions. Interacting with neighboring nodes to achieve optimized perf...