Steganography and Data Hiding Presented for CRIME by Steven Russelle Detective (retired) Forensic Computer Analysis Police Bureau Portland, OR Box 277.

Slides:



Advertisements
Similar presentations
General Information Software Robot Benri. Characteristics 1. Connect up to 16 cameras. 2. Do six different type of detections. 3. Define sub-areas where.
Advertisements

The INTERNET.
Grades Standards: A2,10,B9 – Grade 5 Operating System Name files appropriately Network Resources Save files to the U drive and Work folder Open.
Searching & Saving Web Resources ADE100- Computer Literacy Lecture 23.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
S OFTWARE AND M ULTIMEDIA Chapter 6 Created by S. Cox.
What Is A Web Page? An Introduction to the Internet.
Software and Multimedia
Capturing Computer Evidence Extracting Information.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
LayoutLayout Manage your blog! Baharstudio.blogspot.com Baharstudio.50webs.com.
Section 2.1 Compare the Internet and the Web Identify Web browser components Compare Web sites and Web pages Describe types of Web sites Section 2.2 Identify.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 5: Multimedia on the Web.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Web Design Unit Assignment #2: Job Skills Favorite Links Page You will create a HTML web page with links to informational websites about a variety of job.
Improving the Visibility and Marketability of Your Web Site Giovanna Genard, marketing.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
3.07 Develop Content to Generate Interest. Terms Blind Carbon Copy (BCC): keeps recipients from seeing who else is receiving the same ; used in.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
Creating webpages in Google Sites. 1- Create a Gmail account.
Introducing the Internet and The Web Computer Concepts Unit A What Is Internet.
Search. Search issues How do we say what we want? –I want a story about pigs –I want a picture of a rooster –How many televisions were sold in Vietnam.
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
Acrobat X Instructor: Tom Vorves. Morning Topics Morning Topics Introduction to PDF files Navigate in PDF files Use Acrobat Reader to view, print, copy.
Chapter 2 Designing Web Pages With HTML JavaMethods An Introduction to Object-Oriented Programming Maria Litvin Gary Litvin Copyright © 2003 by Maria Litvin,
Authoring and Multimedia Data. Data Sources Data Types Data Compression Techniques Data Security.
Exploring Microsoft Office Welcome to Cyberspace: The Internet and World Wide Web1 Exploring the Internet Chapter 1 Welcome to Cyberspace: The.
PREZI PRESENTATION Adding files (images, videos, sounds)
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Chapter 8 Adding Multimedia Content to Web Pages HTML5 & CSS 7 th Edition.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Anti-Forensics Hidden Evidence. Road Map Steganography Encryption Data Wiping Metadata spoilage Alternative data streams Index.DAT Thumbs.DB Death of.
 Internet Hardware connected together Creates a massive worldwide network  Hardware Computers Communication lines  Interlinked collection of smaller.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
TechKnowlogy Conference August 2, 2011 Using GoogleDocs for Collaboration.
Digital Steganography
Introduction to Steganography
Welcome
IS 360 Web Promotion.
Digital Forensics 2 Lecture 2B: Steg Tools Presented by : J.Silaa
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Steganography.
Exploring the Internet Welcome to Cyberspace:
Application Software Productivity Tools for Educators
Software and Multimedia
Internet.
Software and Multimedia
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Application Software Productivity Tools for Educators
How did the internet develop?
File Extension Mini-Lesson
Using Today’s Technologies to Enhance Documentation of a Project
Lesson 5: Multimedia on the Web
Digital Literacy 1.00 Computer Basics
Computer Terms 1 Terms Internet Terms 1 Internet Terms 2 Computer
An Introduction to the Internet
Presentation transcript:

Steganography and Data Hiding Presented for CRIME by Steven Russelle Detective (retired) Forensic Computer Analysis Police Bureau Portland, OR Box 277 Gaston, OR RUSSELLE HEVANET.COM

Steganography is data hiding Don’t think it’s just for hiding stuff in pictures Steg has dozens of “commercial” uses: –Watermarking of: photographs chemical structure sets GIS data sets printed documents audio and video files/streams television (authorized viewer) firmware

–Data Protection in pictures can be used to add labels, GPS coordinates, inset magnification, and set resolution, all independently according to clearance level of the viewer Tamper-proofing of texts

Unlimited “non-commercial” uses: –Hidden messages or data in files pictures –bitwise –transform movies sound –echo –spread spectrum –codec Acrobat (.pdf) fake spam mail text document files HTML Most any file by appending (PGEnvelope) or DOS MP3 - just type data in

–Hiding data in “structures” other than files Fonts TCP/IP headers flash memory Hard Drives/Floppies/media –Steg FS –unused or ignored areas Other Covert Channels

Detecting Steganography –Know the available applications and their hiding methods –File name and Hash value database of known Steg applications,.dll’s, and associated files but study reverse engineering/software hacking sites –.EXE encryptors/compressors –patchers, etc. –disassemblers/debuggers

–Steg detection software There are some commercial applications –KNOW its limitations and capabilities, and –LEARN data hiding techniques –else you’re toast

–Steg detection by other means recognition of known steg “signature” –e.g. F5’s header or the color palette or color space characteristics caused by some of the other tools statistical analysis look for appended data –know your file headers and structure –search tools Network data analysis –TCP headers, etc.

Hardware/Software dependencies Data Streams (Keep your eyes peeled HERE) Examples of actual use, and who’s talking about steg? University of Michigan Studies –Study 1 - ebay –Study 2 - usenet

Links to info: –Steg generally: raphy4.php php?id=552 –Steg tools archives and info: This is Neil Johnson’s page This is Ross Anderson’s page

–Univ. of Michigan tech reports including searching the internet for steganography (Niels Provos - Outguess): reports/ hp –Reverse engineering and Hacking: Search internet for: [“sudden discharge” tutorials] and for “YOU have found mammon” -UNICODE