Site icon Eminence Papers

Extracting Steganographic Sequestered Data While Maintaining Data Integrity

Extracting Steganographic Sequestered Data While Maintaining Data Integrity

In the current world, new cybersecurity measures keep evolving, and this is a key motivation for cybercriminals, who try their best to ensure they come up with modern hacking techniques. One of the ways to bypass evidence retrieval is by hiding data through the processes of encryption and steganography. Steganography refers to the process of hiding information in media such as video, document, image, or audio (Karampidis, Kavallieratou, & Papadourakis, 2018). Forensic experts need to perform a process to retrieve hidden data using forensic tools and ensure that the data integrity is maintained to make it admissible in a law court (Myles, Carlisle,  & Scarr, 2019).

The process of obtaining hidden data is called steganalysis. Forensic experts should, at all costs, derive evidence from any possible source. Extracting a steganographic sequester requires a forensic expert to use forensic tools for imaging and analysis of an image (Karampidis, Kavallieratou, & Papadourakis, 2018). The first process is acquiring media, video, or audio with hidden information. The next process is making an image of the media and analyzing it using forensic tools. Some of the tools used in the above two methods include the FTK imager tool and hex dump (Karampidis, Kavallieratou, & Papadourakis, 2018). The extracted files containing the steganographic sequestered data are in the form of a text file referred to as stegotext.

To ensure that the extracted steganographic data is admissible evidence in a court of law, data integrity is maintained. The process involves hashing where the hash value of the original media is compared to that of the image to avoid modification. A hashing algorithm produces the hash values like MD5 or SHA1 (Pu,  Zhang,  & Wang, 2018). The hash value of the imaging evidence should be the same as that of the original evidence to declare it as authentic and have integrity.

References

Karampidis, K., Kavallieratou, E., & Papadourakis, G. (2018). A review of image steganalysis techniques for digital forensics. Journal of information security and applications40, 217-235.

Pu, Y. F., Zhang, N., & Wang, H. (2018). Fractional-order spatial steganography and blind steganalysis for printed matter: Anti-counterfeiting for external product packing in Internet-of-Things. IEEE Internet of Things Journal6(4), 6368-6383.

Myles, P. S., Carlisle, J. B., & Scarr, B. (2019). Evidence for compromised data integrity in studies of liberal peri‐operative inspired oxygen. Anaesthesia74(5), 573-584.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Extracting Steganographic

write one page that discusses the topic below.
Explain how to extract steganographic sequestered data from an identified image files while conserving their integrity.

Exit mobile version