Analysis of Steganography Detection Tools-Maikol Silva (1)
docx
School
Palm Beach State College *
*We aren’t endorsed by this school
Course
4323
Subject
Industrial Engineering
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by DeaconStingrayMaster676
1
Analysis of Steganography Detection Tools
Maikol Silva
Palm Beach State College
ISM4324
Professor Ross
February 13th, 2024
2
Analysis of Steganography Detection Tools
As a cybersecurity investigator at DigiFirm Investigation Agency, I am tasked with investigating a crime linked to defrauding a nationwide financial. The use of steganography detectors, including OutGuess, StegExpose, and OpenStego, is quite essential in the investigation
process. Research reveals that OutGuess is a steganalysis tool that detects simple LSB steganography (Michaylov & Sarmah 2024). It is simple and fast for a primary examination, making it efficient. However, it is weaker against advanced steganographic methods for these reasons. The other significant tool is StegExpose, which analyzes images to determine any potential hidden data. It plays a significant role in identifying the statistical irregularities that suggest the presence of steganography (Islam et al., 2020). It is identified to offer high accuracy in detecting steganographic content. However, it is resource intensive and produces false positives, making it inefficiency.
Moreover, OpenStego is a tool that offers a holistic approach to steganalysis by supporting different file formats and embedding techniques. Its advantage lies in its community support and flexibility, enabling continuous updates and improvements. However, its complexity
may pose a challenge for less experienced investigators
(Bhuva et al., 2021). I would recommend
OpenStego since it is based on the thorough appraisal of the investigation nature and the trade-
off between precision and speed. Despite its complexity, the tool is relevant to the changing nature of steganographic methods. Moreover, it provides the best solution to finding hidden data from suspects' seized devices, bringing to account the tech-savvy criminals.
3
References
Bhuva, B. D., Zavarsky, P., & Butakov, S. (2021). An Analysis of Effectiveness of StegoAppDB
and Data Hiding Efficiency of StegHide Image Steganography Tools. In
2021, the 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC)
(pp. 208-211). IEEE: https://ieeexplore.ieee.org/abstract/document/9478123/
Islam, M. A., Riad, M. A. A. K., & Pias, T. S. (2020). Performance analysis of steganography tools. In
2020, the 2nd International Conference on Advanced Information and Communication Technology (ICAICT)
(pp. 428-433). IEEE: https://ieeexplore.ieee.org/abstract/document/9333473/
Michaylov, K. D., & Sarmah, D. K. (2024). Steganography and steganalysis for digital image-
enhanced Forensic analysis and recommendations. Journal of Cyber Security Technology
, 1-27: https://www.tandfonline.com/doi/abs/10.1080/23742917.2024.2304441
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help