Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
Mobile phones technology has become one of the most common and important technologies that started as a communication tool and then evolved into key reservoirs of personal information and smart applications. With this increased level of complications, increased dangers and increased levels of countermeasures and opposing countermeasures have emerged, such as Mobile Forensics and anti-forensics. One of these anti-forensics tools is steganography, which introduced higher levels of complexity and security against hackers’ attacks but simultaneously create obstacles to forensic investigations. A new anti-forensics approach for embedding data in the steganography field is proposed in this paper. It is based on hiding secret data in hex symbols carrier files rather than the usually used file multimedia carrier including videos, image and sound files. Furthermore, this approach utilizes hexadecimal codes to embed the secret data on the contrary to the conventional steganography approaches which apply changes to binary codes. Accordingly, the resulting data in the carrier files will be unfathomable without the use of special keys yielding a high level of attacking and deciphering difficulty. Besides, embedding the secret data in the form of hex symbols, the agreed upon procedure between communicating parties follows a random embedding manner formulated using WinHex software. Files can be exchanged amongst android devices and/or computers. Experiments were conducted for applying the proposed algorithm on rooted android devices, which also are connected to computers. The proposed methods showed advantages over the currently existing steganography approaches, in terms of character frequency, capacity, security, and robustness.
Authors and Affiliations
Somyia Asbeh, Sarah Hammoudeh, Hamza Al-Sewadi, Arab Hammoudeh
A Simple Exercise-to-Play Proposal that would Reduce Games Addiction and Keep Players Healthy
Games players usually get addicted to video games in general and more specifically to those that are usually played over the internet. These players prefer to stay at home and play games rather than playing sports or out...
A Solution for the Uniform Integration of Field Devices in an Industrial Supervisory Control and Data Acquisition System
Supervisory Control and Data Acquisition (SCADA) systems are increasingly used solutions for monitoring and controlling various industrial processes. The existence of a large number of communication protocols helps to de...
Intelligent Educational Assistant based on Multiagent System and Context-Aware Computing
This paper provides an overview of the current stage of EducActiveCore research, an orchestrated computational model, formed by different areas of artificial intelligent, combined to support personalized assistance to st...
WHITE - DONKEY: Unmanned Aerial Vehicle for searching missing people
Searching for a missing person is not an easy task to accomplish,so over the years search methods have been developed, the problem is that the methods currently available have certain limitations and these limitations ar...
RKE-CP: Response-based Knowledge Extraction from Collaborative Platform of Text-based Communication
With the generation of massive amount of product-centric responses from existing applications on collaborative platform, it is necessary to perform a discrete analytical operation on it. As majority of such responses are...