The Automation of the Extraction of Evidence masked by Steganographic Techniques in WAV and MP3 Audio Files

07/14/2023
by   Mohamed C. Ghanem, et al.
0

Antiforensics techniques and particularly steganography and cryptography have become increasingly pressing issues that affect the current digital forensics practice, both techniques are widely researched and developed as considered in the heart of the modern digital era but remain double edged swords standing between the privacy conscious and the criminally malicious, dependent on the severity of the methods deployed. This paper advances the automation of hidden evidence extraction in the context of audio files enabling the correlation between unprocessed evidence artefacts and extreme Steganographic and Cryptographic techniques using the Least Significant Bits extraction method (LSB). The research generates an in-depth review of current digital forensic toolkit and systems and formally address their capabilities in handling steganography-related cases, we opted for experimental research methodology in the form of quantitative analysis of the efficiency of detecting and extraction of hidden artefacts in WAV and MP3 audio files by comparing standard industry software. This work establishes an environment for the practical implementation and testing of the proposed approach and the new toolkit for extracting evidence hidden by Cryptographic and Steganographic techniques during forensics investigations. The proposed multi-approach automation demonstrated a huge positive impact in terms of efficiency and accuracy and notably on large audio files (MP3 and WAV) which the forensics analysis is time-consuming and requires significant computational resources and memory. However, the proposed automation may occasionally produce false positives (detecting steganography where none exists) or false negatives (failing to detect steganography that is present) but overall achieve a balance between detecting hidden data accurately along with minimising the false alarms.

READ FULL TEXT

page 1

page 2

page 4

page 6

page 7

page 8

page 9

page 10

research
05/12/2022

E-Mail Assistant – Automation of E-Mail Handling and Management using Robotic Process Automation

In this paper, a workflow for designing a bot using Robotic Process Auto...
research
07/24/2020

Detecting malicious PDF using CNN

Malicious PDF files represent one of the biggest threats to computer sec...
research
05/30/2019

A Music Classification Model based on Metric Learning and Feature Extraction from MP3 Audio Files

The development of models for learning music similarity and feature extr...
research
07/14/2019

Metadata Extraction from Raw Astroparticle Data of TAIGA Experiment

Today, the operating TAIGA (Tunka Advanced Instrument for cosmic rays an...
research
03/02/2020

Detecting and Characterizing Bots that Commit Code

Background: Some developer activity traditionally performed manually, su...
research
02/18/2023

Experimental Toolkit for Manipulating Executable Packing

Be it for a malicious or legitimate purpose, packing, a transformation t...

Please sign up or login with your details

Forgot password? Click here to reset