THE CATHOLIC UNIVERSITY OF AMERICA School of Engineering / Department of Electrical Engineering and Computer Science A Non-Algorithmic File-Type Independent.

Slides:



Advertisements
Similar presentations
PhishZoo: Detecting Phishing Websites By Looking at Them
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
Tools for Text Review. Algorithms The heart of computer science Definition: A finite sequence of instructions with the properties that –Each instruction.
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
Guide to Computer Forensics and Investigations Fourth Edition
Overview of Digital Stenography
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
UC Santa Cruz Providing High Reliability in a Minimum Redundancy Archival Storage System Deepavali Bhagwat Kristal Pollack Darrell D. E. Long Ethan L.
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Digital Crime Scene Investigative Process
Digital Steganography
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates Li Lei School of Information Science and Technology Sun Yat-Sen University.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
Cryptographic Anonymity Project Alan Le
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
2014 Digital Forensics Conference. 2 Conference 3  Post-Proceedings will be published by Springer as an LNCS volume  March 14, 2014 / Aug 24, 2014.
T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Plagiarism Detection tools
Digital Steganography
Introduction to Steganography
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Welcome
Good Morning  Please be sure to take care of your belongings.
STEGANOGRAPHY.
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Steganography.
Information Security at Florida State University
Information Security at Florida State University
Visit for more Learning Resources
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Securing & Sharing a Presentation
Information Security at Florida State University
Information Security at Florida State University
RFID Object Localization
Threats to Privacy in the Forensic Analysis of Database Systems
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Good Morning  Please be sure to take care of your belongings.
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

THE CATHOLIC UNIVERSITY OF AMERICA School of Engineering / Department of Electrical Engineering and Computer Science A Non-Algorithmic File-Type Independent Method for Hiding Persistent Data in Files Maha Sabir, M.Sc. Dr. Jim Jones, Ph.D. Dr. Hang Liu, Ph.D. April 20, 2017

Outline Background Motivation Statement of the problem Objectives Related Work Methodology Results & Discussion Conclusion & Future work References

Anti-forensics Techniques Background Anti-forensics Techniques Data Hiding Trail Obfuscation Data Destruction

Non-Algorithmic File Data Hiding Background Data Hiding Non-Algorithmic File Data Hiding Steganography Cryptography

Definition of Terms Watermarking vs. Tagging Stealthy Non-Algorithmic File-Type Independent LSB

Motivation Protecting digital data and sensitive contents by stealthy tagging (stealthy watermarking). Trying to know where Anti-forensic techniques may try to hide data so that we know where to look.

Statement of the Problem Key Questions: Can we hide data in files that is persistent, benign, recoverable and stealthy? 1) Which tags will survive and under what conditions? 2) Are there specific locations in a file where you can store and preserve tags?

Objectives Develop a file-type independent methodology to: Identify unique file locations for hiding stealthy watermark tags that are persistent and benign. Test watermarks for persistence and document survivability. Applications: For data protectors, investigators, and forensic examiners to trace digital evidence. Foundation for techniques to find hidden data.

Related Work 1/2 1. Microsoft Word OOXML File Format The Structure of an OOXML format document The Directory Structure of a “sample.docx”

Related Work 2/2 2. Hiding Data in Files 1) Cantrell & Dampier (2004) Hiding data in files e.g. html files and early binary MS office files Any space with at least two hexadecimal zeroes Some file dead spaces are not suitable for data hiding. 2) Garfinkel and Migletz (2009) Encrypting data in content parts of the zip file archive Hiding data in XML comments. 3) Castiglione et al., (2011) Hiding data in OOXML file zip archives and evaluated steganographic methods like altering zip compression algorithm, office macros, zero dimension image, and revision identifier values.

Limitations of Prior Work Based on understanding and altering the internal structure of the files, hence each technique would only work on one file type. Based on algorithmic data hiding (e.g., LSB for steganography), which is detectable, changes the carrier file, and is file type dependent.

File Dead Space Finding File dead space, which we define as a region of a raw file that may changed without corrupting the file. Searching for a string of 16 or more consecutive 0x00 File dead space

File dead spaces(count) Dataset Description Measure File size (KB) File dead spaces(count) Maximum 9,495 153 Minimum 10 5 Average 210 8 Median 30.32 5.00 Standard Deviation 849.38 12.25 Correlation (R) 0.318

Tagging Files and Survivability Testing 16 byte string written to all the dead spaces of each file. For dead spaces > 16 bytes, tag both at the beginning and middle The first three dead spaces at: [Content_Type].xml _rel/.rels word/_rel/document.xml.rels Are stable and do not change when performing different operations

Descriptions of the Tests Test Name 1 Copy on device 2 Copy off device 3 Open/Close/No Modify/No Save 4 Open/Save/Close/No Modify 5 Open/Modify/Close/No Save 6 Open/Modify/Save/Close 7 Open/Modify/Terminate

Results & Discussion 2/2 It is possible to hide persistent data in file dead space of DOCX (OOXML) files, in the first three file dead spaces of the documents All hidden data in file dead space persists when operations like opening, closing, terminating, copying and saving Tags in zip file archive in OOXML format do not survive when documents are modified and saved. Files have several internal dead spaces.

Conclusion & Future Work It is possible to empirically find locations suitable for storing data with no clue of the files internal structure Locations can survive many but not all operations Editing a docx file proved destructive to inserted data Other operations have no effect on the tag or the document Extend to different file types video, image, pdf, ...

References Beer, R. de., Stander, A., & Belle, J. (2015). Anti-Forensics: A Practitioner Perspective. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 4(2), 390–403. Cantrell, G., & Dampier, D. D. (2004). Experiments in hiding data inside the file structure of common office documents: a stegonography application. In Proceedings of the 2004 international Symposium on information and Communication Technologies (pp. 146–151). Trinity College Dublin. Castiglione, A., D’Alessio, B., De Santis, A., & Palmieri, F. (2011). Hiding Information into OOXML Documents: New Steganographic Perspectives. Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, 2(4), 59–83. Fu, Z., Sun, X., & Xi, J. (2015). Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication. Journal of Communications and Networks, 17(5), 525–533 https://doi.org/10.1109/JCN.2015.000091 Garfinkel, S. L., & Migletz, J. J. (2009). New XML-Based Files: Implications for Forensics. IEEE Security Privacy. 7(2), 38–44. Jain, A., & Chhabra, G. S. (2014). Anti-forensics techniques: An analytical review. In 2014 Seventh International Conference on Contemporary Computing (IC3) (pp. 412–418). https://doi.org/10.1109/IC3.2014.6897209 Kessler, G. C. (2007). Anti-forensics and the digital investigator. In Proceedings of the 5th Australian Digital Forensics Conference (p. 1). Mt Lawley, Western Australia, Edith Cowan University.

Q & A