Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Computer Forensics.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Chapter 8 Recovering Graphics Files
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
COS/PSA 413 Day 18. Agenda Lab 9 write-up grades –2 A’s, 1 B, 1 D and 1 F –Answer the questions with a minimal amount of BS –I will start taking off points.
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Chapter 10 Recovering Graphics Files Guide to Computer Forensics and Investigations Third Edition.
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Guide to Computer Forensics and Investigations Third Edition
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
COS 413 Day 15. Agenda Assignment 4 corrected –2 A’s, 5 B’s, 1 C and 1 non-submit Assignment 5 Due Assignment 6 will be assigned next week Lab 4 write-up.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
SAK INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Intelligent Digital Forensics September 30, 2009.
Hands-on: Capturing an Image with AccessData FTK Imager
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Chapter 10 Recovering Graphics Files Guide to Computer Forensics and Investigations Third Edition.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Chapter 9 Digital Forensics Analysis and Validation
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
FESA (Framework for Enterprise StegAnalysis) Charles D. George, Jr. Masters Project Fall Semester 2012.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Oft Repeated Theme: If it is encrypted, you are probably not going to crack it. Look instead at the “end points” and low-hanging fruit (social engineering.
Chapter 8 Recovering Graphics Files
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
IT IS ALL ABOUT THE CRIME Unit 7 – Recovering files & Network Forensics CJ Dr. Joe Ciccone.
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
COEN 252: Computer Forensics Hard Drive Evidence.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Anti-Forensics Hidden Evidence. Road Map Steganography Encryption Data Wiping Metadata spoilage Alternative data streams Index.DAT Thumbs.DB Death of.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael JonesDigital Forensic Investigations2.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Chapter 9 Digital Forensics Analysis and Validation
Welcome
Digital Forensics 2 Lecture 2B: Steg Tools Presented by : J.Silaa
Digital Forensics 2 (DFC721S)
Steganography.
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Interpreting Binary Data
Chapter 10 Recovering Graphics Files
Understanding Forensic Images
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 8 Recovering Graphics Files.
Presentation transcript:

Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and Investigations, Fifth Edition

Objectives Hides information inside image files Forms Insertion Substitution Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Steganography hides information inside image files An ancient technique Two major forms: insertion and substitution Insertion Hidden data is not displayed when viewing host file in its associated program You need to analyze the data structure carefully Example: Web page Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Guide to Computer Forensics and Investigations, Fifth Edition

In-Class Activity Study the above webpage example and implement a similar version but with your own secret message Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Substitution Replaces bits of the host file with other bits of data Usually change the last two LSBs,undetactable by human eyes Detected with steganalysis tools (a.k.a - steg tools) e.g Steg Suit,Outguess, StegDetect, & StegBreak You should inspect all files for evidence of steganography Clues to look for: Duplicate files with different hash values Steganography programs installed on suspect’s drive Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Steganography in Graphics Files Guide to Computer Forensics and Investigations, Fifth Edition

Using Steganalysis Tools Use steg tools to detect, decode, and record hidden data Detect variations of the graphic image When applied correctly you cannot detect hidden data in most cases Check to see whether the file size, image quality, or file extensions have changed Guide to Computer Forensics and Investigations, Fifth Edition

Understanding Copyright Issues with Graphics Steganography has been used to protect copyrighted material By inserting digital watermarks into a file Digital investigators need to aware of copyright laws Copyright laws for Internet are not clear There is no international copyright law Check www.copyright.gov U.S. Copyright Office identifies what can and can’t be covered under copyright law in U.S. Guide to Computer Forensics and Investigations, Fifth Edition

Summary When examining data from files in slack or free space, you might find data that appears to be a header for a common graphic file type. If you locate an overwritten header data, reconstruct the header to make it readable again by comparing the HX values of known file format to the pattern of the file header you found Then use forensic tool to recover the fragmented file Guide to Computer Forensics and Investigations, Fifth Edition