Secure user Browser Activity using Hybrid Data Hiding Techniques
Mohd Fahmi Mohamad Amran1, Yamunah Kathiravan2, Noor Afiza Mat Razali3, Raja Mohd Tariqi Raja Lope Ahmad4, Zuraidy Adnan5, Muhammad Fairuz Abd Rauf6, Mohd Afizi Mohd Shukran7

1Mohd Fahmi Mohamad Amran*, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
2Yamunah Kathiravan, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
3Noor Afiza Mat Razali, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
4Raja Mohd Tariqi Raja Lope Ahmad, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
5Zuraidy Adnan, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
6Muhammad Fairuz Abd Rauf, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.
7Mohd Afizi Mohd Shukran, Computer Science Department, Faculty of Science and Defense Technology, Universiti Pertahanan Nasional Malaysia.

Manuscript received on April 02, 2020. | Revised Manuscript received on April 15, 2020. | Manuscript published on May 30, 2020. | PP: 595-598 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2015059120/2020©BEIESP | DOI: 10.35940/ijrte.A2015.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Web browsers may delete some files but it doesn’t delete everything. The purpose of private browsing is for users to browse private mode just as a standard browsing session would, but without storing any data such as log-in credentials or browsing history upon exit. A secure framework to secure the web browser artefacts is proposed to fulfil the requirements. In order to compare and contrast the different methods of artefacts encryption, a hybrid method was introduced; Base64 + AES on the prototype. The test systems were created by utilising virtual machines. The prototype was developed using C# language in Microsoft Visual Studio application that runs on Windows. To provide countermeasures, this research proposes an implementation of a third-party privacy application, called PRINDOW, to improve security in hiding a user’s browsing activity. Every browsing session is recorded and scanned using the prototype. This method allows only the base requirements to be installed on the virtual machine for each file with the cryptographic method. This framework could theoretically enhance current practises by making slight changes to the web browser’s application structure. Keywords: Browser Artefacts, Computer Forensic, Encryption, Data Hiding.
Keywords: Browser Artefacts, Computer Forensic, Encryption, Data Hiding.
Scope of the Article: Data Hiding