Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Security, Privacy and Steganographic Analysis of FaceApp and TikTok
Ashar Neyaz, Avinash Kumar, Sundar Krishnan, Jessica Placker, Qingzhong Liu
Pages - 38 - 59 | Revised - 30-04-2020 | Published - 01-06-2020
MORE INFORMATION
KEYWORDS
Mobile Forensics, Smartphone Forensics, TikTok, FaceApp, Steganography, Privacy, Security, Cybersecurity.
ABSTRACT
Smartphone applications (Apps) can be addictive for users due to their uniqueness, ease-of-use, trendiness, and growing popularity. The addition of Artificial Intelligence (AI) into their functionality has rapidly gained popularity with smartphone users. Over the years, very few smartphone Apps have quickly gained immense popularity like FaceApp and TikTok. FaceApp boasts of using AI to transform photos of human faces using its powerful facial recognition capabilities. FaceApp has been the target of ensuing backlash against it driving the market for a number of other similar yet lesser-known clones into the top ranks of the App stores. TikTok offers video editing and sharing of short video clips whereby making them charming, funny, cringe-inducing, and addictive to the younger generation. FaceApp and TikTok have been the targets of the media, privacy watchdogs, and governments over worries of privacy, ethnicity filters, data misuse, anti-forensics, and security. In this paper, the authors forensically review FaceApp and TikTok Apps from the Android Play Store, for their data ownership, data management, privacy concerns, steganographic use, and overall security posture.
Aboshady A. (2019, July 14). The New "FaceApp" Trend: a Universal Trap or Just an Entertaining Program?. Retrieved from https://identity-mag.com/the-new-faceapp-trend-just- for-fun-or-something-more/. | |
Allevato T. (2013). Structure of an Android Application. Retrieved from http://sofia.cs.vt.edu/sofia-2114/book/chapter2.html. | |
ANNUAL SURVEY HIGHLIGHTS - CTIA (2019, June 20). Retrieved from https://api.ctia.org/wp-content/uploads/2019/06/2019-Annual-Survey-Highlights-FINAL.pdf. | |
Apkpure (2019). FaceApp for Android APK Download. Retrieved from https://apkpure.com/faceapp/io.faceapp. | |
Apkpure (2019). TikTok Download. Retrieved from https://apkpure.com/tiktok- musically/com.zhiliaoapp.musically. | |
Arthur C. (2015, June 15). Artificial intelligence: don't fear AI. It's already on your phone - and useful. Retrieved from https://www.theguardian.com/technology/2015/jun/15/artificial- intelligence-ai-smartphones-machine-learning. | |
Balebako, R., Marsh, A., Lin, J., Hong, J. I., & Cranor, L. F. (2014). The privacy and security behaviors of smartphone app developers. | |
BBC News (2019, July 18). FaceApp: Chuck Schumer asks for FBI investigation. Retrieved from https://www.bbc.com/news/world-us-canada-49027155. | |
Burrows, C., & Zadeh, P. B. (2016, June). A mobile forensic investigation into steganography. In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) (pp. 1-2). IEEE. | |
Cellan-Jones R. (2014. December 2). Stephen Hawking warns artificial intelligence could end mankind. Retrieved from https://www.bbc.com/news/technology-30290540. | |
Demographics of Mobile Device Ownership and Adoption in the United States (2019, June 12). Retrieved from https://www.pewresearch.org/internet/fact-sheet/mobile/. | |
Desnos A., Gueguen G., Bachmann S. (2018). Introduction Androgruard 3.4 Documentation. Retrieved from https://androguard.readthedocs.io/en/latest/intro/. | |
Download Ubuntu Desktop (2020). Retrieved from https://ubuntu.com/download/desktop. | |
Easy Tech Trick (2018, July 21). Top15 Artificial Intelligence Apps For Android And iOS. Retrieved from https://www.easytechtrick.org/artificial-intelligence-apps/. | |
FaceApp (2019, December 3). Privacy Policy. Retrieved from https://www.faceapp.com/privacy-en.html. | |
FaceApp (n.d.) Retrieved from https://faceapp:com/app. | |
Gonzalez, H., Kadir, A. A., Stakhanova, N., Alzahrani, A. J., & Ghorbani, A. A. (2015, April). Exploring reverse engineering symptoms in Android apps. In Proceedings of the Eighth European Workshop on System Security (pp. 1-7). | |
Goodison, S. E, Davis R. C. and Jackson B. A. (2015). Digital Evidence and the U.S. Criminal Justice System. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/248770.pdf. | |
Influencer Marketing (2019, April 14). 37 TikTok Statistics That Will Blow Your Mind. Retrieved from https://influencermarketinghub.com/tiktok-statistics/. | |
Internet Matter (2019). How safe is TikTok app?. Retrieved from https://www.internetmatters.org/hub/esafety-news/tik-tok-app-safety-what-parents-need-to- know/. | |
Kelly C. (2019, July 28). Aging app FaceApp is giving people a warped idea of what getting older truly feels like. Retrieved from https://www.nbcnews.com/think/opinion/aging-app- faceapp-giving-people-warped-idea-what-getting-older-ncna1034796. | |
Krishnan, S., & Chen, L. (2019). Legal Concerns and Challenges in Cloud Computing. arXiv preprint arXiv:1905.10868. | |
Lim, K., Jeong, Y., Cho, S. J., Park, M., & Han, S. (2016). An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. JoWUA, 7(3), 40-52. | |
O'Dea S. (2020, February 27). Global market share held by the leading smartphone operating systems in sales to end users from 1st quarter 2009 to 2nd quarter 2018. Retrieved from https://www.statista.com/statistics/266136/global-market-share-held- by- smartphone-operating-systems/. | |
Protect Young Eyes (2018, August 2). What is the TikTok app?. Retrieved from https://protectyoungeyes.com/apps/tiktok-parental-controls/. | |
Rastogi, S., Bhushan, K., & Gupta, B. B. (2016). Android applications repackaging detection techniques for smartphone devices. Procedia Computer Science, 78(C), 26-32. | |
Richter F. (2019, July 23). FaceApp Craze Reaches New Heights. Retrieved from https://www.statista.com/chart/18769/estimated-worldwide-faceapp-downloads-by-platform/. | |
Smartphone Market Share (2020). Retrieved from https://www.idc.com/promo/smartphone- market-share/os. | |
Solanas A. and Mart´?nez-Ballest´e A. (2009, August). Advances in Artificial Intelligence for Privacy Protection and Security. Retrieved from https://www.worldscientific.com/worldscibooks/10.1142/6707. | |
Sporea, I., Aziz, B., & McIntyre, Z. (2012). On the availability of anti-forensic tools for smartphones. International Journal of Security, 6(4), 58-64. | |
Stefanko L. (2019, July 19). With FaceApp in the spotlight, new scams emerge https://www.welivesecurity.com/2019/07/19/faceapp-spotlight-scams-emerge/. | |
Sturmer J. and Ockenden W. (2017, April 27). FaceApp: Experts have privacy concerns about popular face transformation app. Retrieved from https://www.abc.net.au/news/2017- 04-27/should-you-worry-about-privacy-when-using-faceapp/8476666. | |
Sun, H. M., Weng, C. Y., Lee, C. F., & Yang, C. H. (2011). Anti-forensics with steganographic data embedding in digital images. IEEE Journal on selected areas in Communications, 29(7), 1392-1403. | |
TikTok (2019, February). Privacy Policy. Retrieved from https://www.tiktok.com/legal/privacy-policy-row?lang=en. | |
TikTok (2020, January). Privacy Policy for Younger Users. Retrieved from https://www.tiktok.com/legal/privacy-policy-for-younger-users?lang=en. | |
TikTok (n.d.) Retrieved from https://www.tiktok.com/en/. | |
Xiao E. (2017, December 5). China's most addictive news app Toutiao eyes world domination with AI feeds. Retrieved from https://www:techinasia:com/bytedanceoverseas- expansion-strategy- break-down. | |
Zhang K. (2018, May 19). I risked my life, please like!' Mobile app Tik Tok has Hong Kong children craving acceptance - and some are going to dangerous extremes. Retrieved from https://www.scmp.com/news/hong-kong/community/article/2146904/i- risked-my-life-please- mobile-app-tik-tok-has-hong-kong. | |
Zhou, W., Zhou, Y., Jiang, X., & Ning, P. (2012, February). Detecting repackaged smartphone applications in third-party android marketplaces. In Proceedings of the second ACM conference on Data and Application Security and Privacy (pp. 317-326). | |
Mr. Ashar Neyaz
Department of Computer Science,
Sam Houston State University,
Huntsville - United States of America
ashar.neyaz@shsu.edu
Mr. Avinash Kumar
Department of Computer Science, Sam Houston State University, Huntsville - United States of America
Mr. Sundar Krishnan
Department of Computer Science,
Sam Houston State University,
Huntsville - United States of America
Miss Jessica Placker
Department of Computer Science, Sam Houston State University, Huntsville - United States of America
Dr. Qingzhong Liu
Department of Computer Science,
Sam Houston State University,
Huntsville - United States of America
|
|
|
|
View all special issues >> | |
|
|