2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2017
DOI: 10.1109/ithings-greencom-cpscom-smartdata.2017.60
|View full text |Cite
|
Sign up to set email alerts
|

An Overview and Computer Forensic Challenges in Image Steganography

Abstract: Abstract-The development of powerful imaging tools, editing images for changing their data content is becoming a mark to undertake. Tempering image contents by adding, removing, or copying/moving without leaving a trace or unable to be discovered by the investigation is an issue in the computer forensic world. The protection of information shared on the Internet like images and any other confidential information is very significant. Nowadays, forensic image investigation tools and techniques objective is to re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Table I shows the results of proposed algorithm and other tools which are used by other previous study. Tkinter framework [14] 70 % Openstego [1] 0 % Stegspy [13] 0 % Stegovirtas IV. CONCLUSIONS Steganography of information is the techniques and methods used to hide the effects of hacking or cyber-attack.…”
Section: Research Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Table I shows the results of proposed algorithm and other tools which are used by other previous study. Tkinter framework [14] 70 % Openstego [1] 0 % Stegspy [13] 0 % Stegovirtas IV. CONCLUSIONS Steganography of information is the techniques and methods used to hide the effects of hacking or cyber-attack.…”
Section: Research Results and Discussionmentioning
confidence: 99%
“…The results indicate that these tools use a different approach to choose the Least Significant Bit in the substitution method, perhaps random, the last two numbers, or just the last number. OpenStego, which used the same procedure, was unable to recover the embedded image, traces of corruption were challenging to identify, and the method of concealment was unknown [14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Steganography encompasses methods used to conceal confidential information within other digital media, essentially hiding it in plain sight. Some definitions characterize it as the practice of embedding one piece of information within another in a way that makes detection challenging, akin to a form of camouflage that remains unseen by unintended recipients or intruders [26]. Within the realm of information hiding techniques, steganography is regarded alongside methods like watermarks and cryptography [27].…”
Section: Stenography Techniquementioning
confidence: 99%
“…Further research was carried out by [27]. This research discusses the importance of computer forensic examiners in knowing the types of steganography tools that can be applied to the victim's computer.…”
Section: Introductionmentioning
confidence: 99%