IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Baseic Steganalysis for the Digital Media Forensics Examiner

Baseic Steganalysis for the Digital Media Forensics Examiner
View Sample PDF
Author(s): Sos S. Agaian (University of Texas, USA)and Benjamin M. Rodriguez (Air Force Institute of Technology, USA)
Copyright: 2006
Pages: 42
Source title: Digital Crime and Forensic Science in Cyberspace
Source Author(s)/Editor(s): Panagiotis Kanellis (Information Society S.A., Greece), Evangelos Kiountouzis (Athens University, Greece), Nicholas Kolokotronis (Universitiy of Peloponnese, Greece)and Drakoulis Martakos (National and Kapodistrian University of Athens, Greece)
DOI: 10.4018/978-1-59140-872-7.ch009

Purchase

View Baseic Steganalysis for the Digital Media Forensics Examiner on the publisher's website for pricing and purchasing information.

Abstract

This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample pair” steganalysis techniques—the key concept in cyber crime—for the digital media forensics examiner, specializing in the analysis, identification, and interpretation of concealed digital evidence. Success and proper implementation of a digital forensic steganalysis system is dependent of several necessary steps. The basic steps are to describe and implement a new generation of steganalysis systems applicable for various embedding methods in order to allow efficient, accurate, low-cost, and fast digital forensic analysis; and to make these methods applicable for automatic detection of steganographic information within noisy network environments while striving to provide a satisfactory performance in comparison with present technology. All efforts will allow the final goal to be reached which is the development of a digital forensic steganalysis system to aid law enforcement agencies involved in the field of cyber crime investigation. The presented techniques will be based on the statistics of sample pairs (the basic unit), rather than individual samples, which are very sensitive to least significant bit embedding. Particularly, in this chapter we discuss the process and necessary considerations inherent in the development of steganalysis methods applied for problems of reliable detection, estimation length, and localization of hidden data within various forms/models of digital images.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom