COMPARATIVE ANALYSIS OF THE PROBLEMS OF THE APPLICATION OF STEGANOGRAPHY METHODS IN THE IMPLEMENTATION OF ILLEGAL ACTIONS AND ITS ROLE IN DIGITAL FORENSICS
M. Y. Fedosenko, S. V. Bezzateev National Research University ITMO, St. Petersburg University of Aerospace Instrumentation
Annotation: This work contains a study of the problem of using steganographic algorithms by attackers to hide and exchange illegal data. The paper formulates the relevance of the problem by analyzing of the cases of using steganography in attacks on computer systems and based on the development trend of controlled Internet, supported by the legal framework. An analysis of methods for hiding data and their subsequent exchange on public Internet resources is presented through a review of the works of researchers in this area, the main tools used by attackers are identified and described. As an analysis of counteraction methods, a comparative description of use of the artificial intelligence technologies in the field of steganoanalysis is presented, the most promising and applicable for the tasks of automatic analysis of content posted on public Internet resources are identified. In the conclusion provisions of the work, the process of exchanging hidden data by malefactors using the model of EPC notation. The directions and tasks of steganoanalysis are highlighted, the solution of which will allow further development of a unified system for protecting public Internet resources, prospects for the use of new steganographic algorithms, such as hiding in the blockchain, source code are presented. resources and placement of content with the presence of physical attachments of information.
Keywords: steganography, steganoanalysis, hidden data exchange, intruder models, artificial intelligence in steganoanalysis, machine learning, neural networks, natural language processing, blockchain, static code analysis.