scispace - formally typeset
Search or ask a question

Issues of steganography in investigations 


Best insight from top research papers

Steganography, the art of hiding information, presents challenges in investigations. It is used for undercover communication and can be applied to various mediums such as images, videos, and audio . The combination of steganography and forensics plays a significant role in information exchange, but it can also be used for unauthorized and destructive purposes . Detecting steganography in computer forensics requires the use of open source tools and analysis of steganography applications that use the same algorithms to hide information within an image . Additionally, audio steganography poses challenges to traditional digital forensic investigation, as there are numerous audio streams through which steganography activities can occur . To address these challenges, researchers have developed steganography detection tools and network stream capture tools to investigate audio streaming steganography .

Answers from top 5 papers

More filters
Papers (5)Insight
The paper discusses the challenges faced in digital forensic investigations for audio steganography, including the need for suitable detection and extraction tools.
The paper does not specifically mention the issues of steganography in investigations. The paper discusses the implementation of steganography tools for hiding sensitive information.
Book ChapterDOI
R. Parkavi, S Anitha, R Gayathri 
01 Jan 2020
The paper does not specifically mention the issues of steganography in investigations. The paper discusses the combination of steganography and forensics for information exchange and the availability of steganography software tools.
Open accessProceedings ArticleDOI
21 Jun 2017
5 Citations
The paper discusses the challenges of detecting steganography in computer forensics, specifically in image steganography. It does not explicitly mention the issues of steganography in investigations.
Open access
Sabyasachi Pramanik, S. Suresh Raja 
17 Dec 2019
2 Citations
The paper does not specifically mention the issues of steganography in investigations. The paper discusses the use of steganography for secure communication and the process of hiding messages in images.

Related Questions

What are the limitations of text steganalysis?4 answersText steganalysis has several limitations. First, the detection of timing steganography is not very robust as it only works well with text-based chat applications and is susceptible to fault detection due to variations in typing and reading speed. Second, current text steganalysis models require a sufficient amount of labeled data for training and lack generalization ability on different detection tasks. Third, existing linguistic steganalysis methods have limitations in dealing with the impact of word association and corpus, which affects their effectiveness. Lastly, traditional text steganalysis methods face the problem of domain mismatch, where the test data is not independent and identically distributed with the training data, leading to reduced detection performance.
What are the limitations of steganalysis?5 answersSteganalysis, the practice of identifying potential secret communication, has some limitations. One limitation is that existing steganalysis models lack dynamic extensibility for new steganographic algorithms, which limits their application in real-world scenarios. Another limitation is that steganalysis methods based on user behavior during chat, such as timing steganography detection, are not very robust. Factors such as typing and reading speed, as well as individual behavior during chat, can affect the accuracy of these methods. Additionally, it is inefficient and impractical for steganalysis models to completely retrain Convolutional Neural Network (CNN) models to detect both existing and new steganographic algorithms. To address these limitations, accurate parameter importance estimation (APIE)-based continual learning schemes have been proposed to update network parameters efficiently and effectively. These schemes show promising extensibility for new emerging steganographic algorithms.
Challenges of police investigators in investigating the landscape of cyber crime case?5 answersPolice investigators face numerous challenges when investigating the landscape of cyber crime cases. Traditional investigative techniques and procedures are often ineffective when applied to cybercrime and cybercriminals. The methods and processes used in traditional crimes do not necessarily apply in the cyber world, and cyber criminals are constantly adapting and developing new tools to stay ahead of law enforcement investigations. Investigators also face practical, technical, and social challenges such as systems availability, usability, and computer-supported collaborative work. Additionally, there is a need for a better understanding of the challenges faced by investigators at both technical and socio-technical levels. To address these challenges, there is a need for user-centric workflows and tools, as well as further research in the field to provide a better foundation for combating cybercrimes effectively.
What are the challenges in implementing medical image steganography?3 answersImplementing medical image steganography faces several challenges. One challenge is the need to protect the confidentiality and integrity of medical images during transmission. Another challenge is the requirement to hide sensitive patient information within the cover image while preserving the traceability of the medical records. Additionally, the steganography system should be resistant to geometric and non-geometric attacks. The use of encryption algorithms, such as the one-time pad encryption, can provide an additional layer of security but may introduce complexity to the system. Furthermore, the choice of steganography technique, whether in the spatial or frequency domain, can impact the payload capacity and the retrieved bit error rate. Overall, the challenges in implementing medical image steganography lie in achieving confidentiality, integrity, and traceability while considering the system's security, complexity, and performance.
What are the challenges faced by investigation officers in maintaining chain of custody of evidence and information management?5 answersInvestigation officers face several challenges in maintaining the chain of custody of evidence and information management. One of the main challenges is the damaging of physical evidence at the crime scene before the arrival of investigators, which disrupts the forensic examination process. In addition, there are issues with the proper preservation and transportation of physical evidence from the crime scene to the forensic lab. Lack of forensic training on crime scene investigation and untrained investigators also contribute to the challenges faced by investigation officers. Furthermore, coordination problems with other agencies, such as NADRA and KMC, hinder the smooth flow of forensic criminal investigation. In the context of digital evidence, maintaining integrity, ownership, auditability, and authenticity pose challenges. The trustworthiness of the chain of custody for digital evidence is also uncertain, and there is a need for new paradigms to overcome these challenges. Traditional database technologies are not sufficient to ensure the integrity and authenticity of digital evidence, necessitating the use of blockchain technology.
What are the main issues concerning fingerprint examination?5 answersFingerprint examination faces several main issues. Firstly, there is a lack of consistency in analyzing latent marks, both between and within experts, which can be influenced by the context of a comparison print. Secondly, there are serious questions about the accuracy and reliability of fingerprint evidence, with studies suggesting a high error rate and different results reached under different conditions. Thirdly, there is a lack of properly controlled experiments on fingerprint examiners' accuracy, leading to claims of infallibility that have been condemned as scientifically implausible. Finally, there is a need for transparency and objective measures of accuracy in fingerprint identification, as well as a reassessment of the soundness and relevance of reporting fingerprint evidence.