Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices

Abstract

Mobile phones technology has become one of the most common and important technologies that started as a communication tool and then evolved into key reservoirs of personal information and smart applications. With this increased level of complications, increased dangers and increased levels of countermeasures and opposing countermeasures have emerged, such as Mobile Forensics and anti-forensics. One of these anti-forensics tools is steganography, which introduced higher levels of complexity and security against hackers’ attacks but simultaneously create obstacles to forensic investigations. A new anti-forensics approach for embedding data in the steganography field is proposed in this paper. It is based on hiding secret data in hex symbols carrier files rather than the usually used file multimedia carrier including videos, image and sound files. Furthermore, this approach utilizes hexadecimal codes to embed the secret data on the contrary to the conventional steganography approaches which apply changes to binary codes. Accordingly, the resulting data in the carrier files will be unfathomable without the use of special keys yielding a high level of attacking and deciphering difficulty. Besides, embedding the secret data in the form of hex symbols, the agreed upon procedure between communicating parties follows a random embedding manner formulated using WinHex software. Files can be exchanged amongst android devices and/or computers. Experiments were conducted for applying the proposed algorithm on rooted android devices, which also are connected to computers. The proposed methods showed advantages over the currently existing steganography approaches, in terms of character frequency, capacity, security, and robustness.

Authors and Affiliations

Somyia Asbeh, Sarah Hammoudeh, Hamza Al-Sewadi, Arab Hammoudeh

Keywords

Related Articles

Gatekeepers Practices in Knowledge Diffusion within Saudi Organizations: KFMC Case Study

Gatekeepers in organizations play a critical role in terms of disseminating and transferring outside knowledge into their groups. This research contributes in identifying the gatekeepers' practices in terms of gathering,...

High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduou...

ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses...

Multi-Stage Algorithms for Solving a Generalized Capacitated P-median Location Problem

The capacitated p-median location problem is one of the famous problems widely discussed in the literature, but its generalization to a multi-capacity case has not. This generalization, called multi-capacitated location...

Medicloud: Hybrid Cloud Computing Framework to Optimize E-Health Activities

Cloud computing is emerging technology and its usage in health sector is marvelous. It enhances the patient treatment process and allows the physicians to get remotely access to patient medical record anywhere and anytim...

Download PDF file
  • EP ID EP128282
  • DOI 10.14569/IJACSA.2016.070427
  • Views 98
  • Downloads 0

How To Cite

Somyia Asbeh, Sarah Hammoudeh, Hamza Al-Sewadi, Arab Hammoudeh (2016). Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices. International Journal of Advanced Computer Science & Applications, 7(4), 220-226. https://europub.co.uk/articles/-A-128282