Download presentation
Published byMervyn Lucas Modified over 9 years ago
1
SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics
Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science and Information Technology University Putra of Malaysia Room No: 2.28 Portions of the material courtesy Nelson et. al., and EC-Council
2
Learning Objectives At the end of this chapter, you will be able to:
Describe types of graphics file formats Explain types of data compression Explain how to locate and recover graphics files Describe how to identify unknown file formats Explain copyright issues with graphics
3
Chapter 7 Outline 7. Image File Forensics 7.1. Introduction
7.2. Recognize image files 7.3. Understand data Compression 7.4. Locate and recover image files 7.5. Analyze image file header 7.6. Reconstructing file fragments
4
7.1 Introduction
5
7.1 Introduction Image file formats can be: A black and white Image
A grayscale Image A color image Indexed Color image All image formats differ between ease of use, size of the file, and the quality of reproduction
6
7.2 Recognize Image Files
7
7.2 Recognize Image Files Contains digital photographs, line art, three-dimensional images, and scanned replicas of printed pictures Pixels: All small dots used to create images Bitmap images: collection of dots A representation of a graphics image a grid-type format Vector graphics: based on mathematical instructions/equations Metafile graphics: combination of bitmap and vector images Types of programs Graphics editors Image viewers
8
7.2 Recognize Image Files (Cont.)
The circled area in this screen shot shows the resolution of the screen by pixels
9
7.2.1 Understanding Bitmap and Vector Images
Bitmap images Grids of individual pixels Bitmap images can be made in the following applications: Photoshop MS Paint Image Ready Paintshop Pro Continuous tone photos Raster images Pixels are stored in rows Better for printing
10
7.2.1 Understanding Bitmap and Vector Images (Cont.)
Uses geometric equations Higher quality image than a bitmap Useful for rendering types and shapes Characteristics Lines instead of dots Store only the calculations for drawing lines and shapes Smaller size Preserve quality when image is enlarged CorelDraw, Adobe Illustrator Image quality Screen resolution Software Number of color bits used per pixel
11
7.2.2 Understanding Metafile Graphics
Metafiles combine raster and vector graphics. Metafiles have similar features of both bitmap and vector images. When metafiles are enlarged it results in a loss of resolution giving the image a shady appearance. Example Scanned photo (bitmap) with text (vector) Share advantages and disadvantages of both types When enlarged, bitmap part loses quality
12
7.2.3 Understanding Image File Formats
Standard bitmap file formats Graphic Interchange Format (.gif) Joint Photographic Experts Group (.jpeg, .jpg) Tagged Image File Format (.tiff, .tif) Window Bitmap (.bmp) JPEG 2000 (.jp2) Portable Network Graphics (.png) Standard vector file formats Hewlett Packard Graphics Language (.hpgl) Autocad (.dxf)
13
7.2.3 Understanding Image File Formats (Cont.)
Nonstandard graphics file formats Targa (.tga) Raster Transfer Language (.rtl) Adobe Photoshop (.psd) and Illustrator (.ai) Freehand (.fh9) Scalable Vector Graphics (.svg) Paintbrush (.pcx) Search the Web for software to manipulate unknown image formats
14
7.2.4 Understanding Digital Camera File Formats
Witnesses or suspects can create their own digital photos Examining the raw file format Raw file format Referred to as a digital negative Typically found on many higher-end digital cameras Sensors in the digital camera simply record pixels on the camera’s memory card Raw format maintains the best picture quality
15
7.2.4 Understanding Digital Camera File Formats (Cont.)
Examining the raw file format (continued) The biggest disadvantage is that it’s proprietary And not all image viewers can display these formats The process of converting raw picture data to another format is referred to as demosaicing Examining the Exchangeable Image File format Exchangeable Image File (EXIF) format Commonly used to store digital pictures Developed by JEIDA as a standard for storing metadata in JPEG and TIFF files
16
7.2.4 Understanding Digital Camera File Formats (Cont.)
Examining the Exchangeable Image File format (continued) EXIF format collects metadata Investigators can learn more about the type of digital camera and the environment in which pictures were taken EXIF file stores metadata at the beginning of the file With tools such as ProDiscover and Exif Reader You can extract metadata as evidence for your case
17
7.2.4 Understanding Digital Camera File Formats (Cont.)
18
7.2.4 Understanding Digital Camera File Formats (Cont.)
19
7.2.4 Understanding Digital Camera File Formats (Cont.)
20
7.2.4 Understanding Digital Camera File Formats (Cont.)
21
7.2.5 File Types Different types of files
Graphics file format – .gif/.jpg/.jpeg/.jfif Text file format – .txt/.htm/.html Audio file format – .au/.uLaw/.MuLaw/.aiff – .mp3/.ra/.wav/.wma Video file format – .avi/.mov/.movie/.mpg/.mpeg/.qt/.ram Document file format – .doc/.pdf/.ps Compress file format – .z/.zip/.sit/.gzip/.gz Data compression: is done by using a complex algorithm used to reduce the size of a file Vector quantization: A form of vector image that uses an algorithm similar to rounding up decimal values to eliminate unnecessary data
22
7.3 Understand Data Compression
23
7.3 Understand Data Compression
Some image formats compress their data GIF, JPEG, PNG Others, like BMP, do not compress their data Use data compression tools for those formats Data compression Coding of data from a larger to a smaller form Types Lossless compression and lossy compression
24
7.3.1 Understanding Lossless and Lossy Compression
GIF and PNG image file formats reduce the file size by using lossless compression Lossless compression Reduces file size without removing data Based on Huffman or Lempel-Ziv-Welch coding For redundant bits of data Utilities: WinZip, PKZip, StuffIt, and FreeZip Lossy compression Permanently discards bits of information Vector quantization (VQ) Determines what data to discard based on vectors in the graphics file Utility: Lzip
25
7.4 Locate and Recover Images Files
26
7.4 Locate and Recover Image Files
Operating system tools Time consuming Results are difficult to verify Computer forensics tools Image headers Compare them with good header samples Use header information to create a baseline analysis Reconstruct fragmented image files Identify data patterns and modified headers
27
7.4.1 Identifying Graphics File Fragments
Carving or salvaging Recovering all file fragments Carving: The process of removing an item from a group of items Salvaging: Another term for carving. It is the process of removing an item from a group of them Computer forensics tools Carve from slack and free space Help identify image files fragments and put them together
28
7.4.1 Identifying Graphics File Fragments (Cont.)
The screenshot above shows the location of the clusters where the data has been found and the data found with the matching search.
29
7.4.2 Repairing Damaged Headers
Use good header samples Each image file has a unique file header JPEG: FF D8 FF E Most JPEG files also include JFIF string Exercise: Investigate a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS)
30
7.4.3 Searching for and Carving Data from Unallocated Space
31
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
32
7.4.3 Searching for and Carving Data from Unallocated Space(Cont.)
Steps Planning your examination Searching for and recovering digital photograph evidence Use ProDiscover to search for and extract (recover) possible evidence of JPEG files False hits are referred to as false positives
33
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
34
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
35
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
36
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
37
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
38
7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)
39
7.4.4 Rebuilding File Headers (Cont.)
Try to open the file first and follow steps if you can’t see its content Steps Recover more pieces of file if needed Examine file header Compare with a good header sample Manually insert correct hexadecimal values Test corrected file
40
7.4.4 Rebuilding File Headers (Cont.)
41
7.4.4 Rebuilding File Headers (Cont.)
42
7.4.4 Rebuilding File Headers (Cont.)
43
7.4.4 Rebuilding File Headers (Cont.)
44
7.4.4 Rebuilding File Headers (Cont.)
45
7.4.4 Rebuilding File Headers (Cont.)
46
7.5 Analyze Image Files Headers
47
7.5 Analyze Image File Headers
Necessary when you find files your tools do not recognize Use hex editor such as Hex Workshop Record hexadecimal values on header Use good header samples
48
7.5 Analyze Image File Headers (Cont.)
49
7.5 Analyze Image File Headers (Cont.)
50
7.6 Reconstructing File Fragments
51
7.6 Reconstructing File Fragments
Locate the starting and ending clusters For each fragmented group of clusters in the file Steps Locate and export all clusters of the fragmented file Determine the starting and ending cluster numbers for each fragmented group of clusters Copy each fragmented group of clusters in their proper sequence to a recovery file Rebuild the corrupted file’s header to make it readable in a graphics viewer
52
7.6 Reconstructing File Fragments (Cont.)
53
7.6 Reconstructing File Fragments (Cont.)
54
7.6 Reconstructing File Fragments (Cont.)
55
7.6 Reconstructing File Fragments (Cont.)
56
7.6 Reconstructing File Fragments (Cont.)
Remember to save the updated recovered data with a .jpg extension Sometimes suspects intentionally corrupt cluster links in a disk’s FAT Bad clusters appear with a zero value on a disk editor
57
7.6 Reconstructing File Fragments (Cont.)
58
7.6 Reconstructing File Fragments (Cont.)
59
7.6.1 Identifying Unknown File Formats
The Internet is the best source Search engines like Google Find explanations and viewers Popular Web sites
60
7.6.2 Tools For Viewing Images
Use several viewers ThumbsPlus ACDSee QuickView IrfanView GUI forensics tools include image viewers ProDiscover EnCase FTK X-Ways Forensics iLook
61
7.6.3 Understanding Steganography
Steganography hides information inside image files Ancient technique Can hide only certain amount of information Insertion Hidden data is not displayed when viewing host file in its associated program You need to analyze the data structure carefully Example: Web page
62
7.6.3 Understanding Steganography (Cont.)
63
7.6.3 Understanding Steganography (Cont.)
64
7.6.3 Understanding Steganography (Cont.)
Substitution Replaces bits of the host file with bits of data Usually change the last two LSBs Detected with steganalysis tools Usually used with image files Audio and video options Hard to detect
65
7.6.3 Understanding Steganography (Cont.)
Two files need to hide a message within an image file The file containing the image into which the message is supposed to be put in The file containing the message itself There are 3 methods to hide messages in images, they include: Least Significant Bit Filtering and Masking Algorithms and Transformation aa
66
7.6.3 Understanding Steganography (Cont.)
67
7.6.3 Understanding Steganography (Cont.)
68
7.6.4 Using Steganalysis Tools
Detect variations of the graphic image When applied correctly you cannot detect hidden data in most cases Methods Compare suspect file to good or bad image versions Mathematical calculations verify size and palette color Compare hash values
69
7.6.4 Using Steganalysis Tools (Cont.)
Hex Workshop The Hex Workshop application can detect and write messages on to a file Investigators use the Hex Workshop tool to reconstruct damaged file headers
70
7.6.4 Using Steganalysis Tools (Cont.)
Hex Workshop AS-Tools can hide and detect files hidden in BMP, GIF and WAV files Investigators have the advantage of multi-threaded operation Investigators can hide/reveal operations simultaneously without fear of interference to the work environment
71
7.6.3 Identifying Copyright Issues with Graphics
Steganography originally incorporated watermarks Copyright laws for Internet are not clear There is no international copyright law Check
72
7.6.3 Identifying Copyright Issues with Graphics (Cont.)
Section 106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to authorize others to do the following: To perform the work publicly To display the copyright work publicly In the case of sound recordings, to perform the work publicly by means of a digital audio transmission To reproduce the work in copies or phonorecords – To prepare derivative works based upon the work To distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending
73
7.6.3 Identifying Copyright Issues with Graphics (Cont.)
Copyrightable works include the following: Literary works Musical works; including any accompanying words Dramatic works; including any accompanying music Pantomimes and choreographic works Pictorial, graphic, and sculptural works. Motion pictures and other audiovisual works. Sound recordings Architectural works
74
Summary Image types Bitmap Vector Metafile
Image quality depends on various factors Image formats Standard Nonstandard Digital camera photos are typically in raw and EXIF JPEG formats
75
Summary (Cont.) Some image formats compress their data
Lossless compression Lossy compression Recovering image files Carving file fragments Rebuilding image headers Software Image editors Image viewers
76
Summary (Cont.) Some image formats compress their data
Lossless compression Lossy compression Recovering image files Carving file fragments Rebuilding image headers Software Image editors Image viewers
77
Summary (Cont.) Steganography Hides information inside image files
Forms Insertion Substitution Steganalysis Finds whether image files hide information
78
End of Chapter 7
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.