SlideShare a Scribd company logo
1 of 28
What is Computer Forensics?
 Uses of Computer Forensics.
 Forensic Processes.
 What is Steganography?
 Examples of Steganography in history.
 Classification of Steganography Techniques.
 Application of Steganography in Computer
Forensics.
 Steganography Tools.

Use of Scientific knowledge for collecting,
analyzing and presenting evidence to the
court.
 Forensics means “to bring to the court”

Helps to ensure overall integrity and
survivability of network infrastructure.
 Defence-in-depth.
 Bad practices of computer forensics may
result in destroying of vital evidences.

Computer forensics has been used since
mid 1980s as evidence in the court
BTK Killer
 Joseph E. Duncan III
 Sharon Lopatka

Cross-drive analysis
 Live analysis
 Deleted Files
 Steganography



Art of Covered or hidden writing.
Steganography (greek word)
στεγανός

γραφία

covered

writing


Invisible ink (1st century AD - WW II)



Tatoo message on head



Overwrite select characters in printed type in
pencil
› look for the gloss



Pin punctures in type



Microdots (WW II)



Newspaper clippings, knitting instructions, XOXO
signatures, report cards, …


Steganography received little attention in
computing



Renewed interest because of industry desire to
protect copyrighted digital work
›
›
›
›

audio
images
video
Text



Detect counterfeiter, unauthorized
presentation, embed key, embed author ID



Steganography ≠ Copy protection
Hide message among irrelevant data
 Confuse the cryptoanalyst

Hide message among irrelevant data
 Confuse the cryptoanalyst


Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Hide message among irrelevant data
 Confuse the cryptoanalyst


Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.

Bring two cases of beer.



Separate good messages from the bad ones
Stream of unencoded messages with signatures
› Some signatures are bogus
› Alice key to test
Need

M3

M2

M1

Bob

M0

M3

M3

M2

M1

M0

?

?

?

?

M1

M0

×

Irene

M2
OK

×

×
Spatial domain watermarking
› bit flipping
› color separation
 Frequency domain watermarking
› embed signal in select frequency bands (e.g.


high frequency areas)
› apply FFT/DCT transform first

› e.g. Digimarc
› watermark should alter the least perceptible bits
 these are the same bits targeted by lossy image
compression software




Today, it often exists within digital formats
It makes use of seemingly innocent cover files such
as text, audio, and image files
The embedded message may be anything that can
be encoded in binary
Perceptual coding
› inject signal into areas that will not be detected by

humans
› may be obliterated by compression

Hardware with copy-protection
› not true watermarking - metadata present on media

› DAT
› minidisc
› presence of copy protection mechanisms often failed to

give the media wide-spread acceptance


Coding still frames - spatial or frequency



data encoded during refresh
› closed captioning



visible watermarking
› used by most networks (logo at bottom-

right)
Digital images are made up of pixels
 The arrangement of pixels make up the image’s
“raster data”
 8-bit and 24-bit images are common
 The larger the image size, the more information you
can hide. However, larger images may require
compression to avoid detection

Least Significant Bit Insertion
 Masking and Filtering

Replaces least significant bits with the
message to be encoded
 Most popular technique when dealing
with images
 Simple, but susceptible to lossy
compression and image manipulation

A sample raster data for 3 pixels (9 bytes)
may be:

00100111 11101001 11001000
00100111 11001000 11101001
11001000 00100111 11101011
00100111 11101000 11001000
00100110 11001000 11101000
11001001 00100111 11101011

Inserting
the binary
value for
A
(10000001)
changes
4 bits
Masks secret data over the original data
by changing the luminance of particular
areas
 During masking, it embed the message
within significant bits of the cover image
 Not susceptible to lossy techniques
because image manipulation does not
affect the secret message



Digital Watermarking – provides
identification pertaining to the owner;
i.e. license or copyright information
- Invisible vs Visible



Fingerprinting – provides identification of
the user; used to identify and track illegal
use of content
Software
BMPSecrets

DarkCryptTC

MP3Stego

OpenPuff

PHP-Class
StreamSteganography

Supporting Files

Notes

BMP, JPG, TIFF, GIF

Allows to replace upto 5060% of picture with
information

BMP, JPG, TIFF, PNG,
PSD, TGA, MNG, WAV,
TXT, HTML, XML, EXE,
DLL
MP3
BMP, JPEG, PNG,TGA,
MP3, WAV, 3fp, MP4,
MPEG-2, FLV, VOB, Pdf

RSD mode(RNG-based
random data distribution)

Source code provided
256-bit multi-encryption,
carrier chains, Multi-layered
obfuscation

PNG

-

Steganography Studio

BMP, PNG, GIF

Different hiding methods
included (LSC, LSC
matching, SLSB, ….)

Steganographic Laboratory
(VSL)

BMP, PNG, JPG, TIFF

Open Source







Wikipedia
Exploring Steganography: Seeing the Unseen – N.
Johnson & S. Jajodia
www.jjtc.com/stegdoc/steg1995.html
Information Hiding: Techniques for Steganography
and Digital Watermarking” – S. Katzenbeisser, F.
Petitcolas
Digital Watermarking – H. Bergel,
L.
O’Gorman
Xavier Prathap. W
St. Claret College, Jalahalli

More Related Content

What's hot

What's hot (20)

Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Email investigation
Email investigationEmail investigation
Email investigation
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
FILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSFILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMS
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 

Viewers also liked

Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsNeilg42
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityIAEME Publication
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensicsalrawes
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010John Holden
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating AccessAram SE
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power PointAyee_Its_Bailey
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo SimulationAyman Hassan
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical MethodsChristian Robert
 

Viewers also liked (16)

Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo Simulation
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
 

Similar to Computer forensics and steganography

Similar to Computer forensics and steganography (20)

Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
Steganography Steganography
Steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
B03208016
B03208016B03208016
B03208016
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
Isit1
Isit1Isit1
Isit1
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Computer forensics and steganography

  • 1.
  • 2. What is Computer Forensics?  Uses of Computer Forensics.  Forensic Processes.  What is Steganography?  Examples of Steganography in history.  Classification of Steganography Techniques.  Application of Steganography in Computer Forensics.  Steganography Tools. 
  • 3. Use of Scientific knowledge for collecting, analyzing and presenting evidence to the court.  Forensics means “to bring to the court” 
  • 4. Helps to ensure overall integrity and survivability of network infrastructure.  Defence-in-depth.  Bad practices of computer forensics may result in destroying of vital evidences. 
  • 5. Computer forensics has been used since mid 1980s as evidence in the court BTK Killer  Joseph E. Duncan III  Sharon Lopatka 
  • 6. Cross-drive analysis  Live analysis  Deleted Files  Steganography 
  • 7.  Art of Covered or hidden writing. Steganography (greek word) στεγανός γραφία covered writing
  • 8.  Invisible ink (1st century AD - WW II)  Tatoo message on head  Overwrite select characters in printed type in pencil › look for the gloss  Pin punctures in type  Microdots (WW II)  Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
  • 9.  Steganography received little attention in computing  Renewed interest because of industry desire to protect copyrighted digital work › › › › audio images video Text  Detect counterfeiter, unauthorized presentation, embed key, embed author ID  Steganography ≠ Copy protection
  • 10.
  • 11. Hide message among irrelevant data  Confuse the cryptoanalyst 
  • 12. Hide message among irrelevant data  Confuse the cryptoanalyst  Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.
  • 13. Hide message among irrelevant data  Confuse the cryptoanalyst  Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer.
  • 14.   Separate good messages from the bad ones Stream of unencoded messages with signatures › Some signatures are bogus › Alice key to test Need M3 M2 M1 Bob M0 M3 M3 M2 M1 M0 ? ? ? ? M1 M0 × Irene M2 OK × ×
  • 15. Spatial domain watermarking › bit flipping › color separation  Frequency domain watermarking › embed signal in select frequency bands (e.g.  high frequency areas) › apply FFT/DCT transform first › e.g. Digimarc › watermark should alter the least perceptible bits  these are the same bits targeted by lossy image compression software
  • 16.    Today, it often exists within digital formats It makes use of seemingly innocent cover files such as text, audio, and image files The embedded message may be anything that can be encoded in binary
  • 17. Perceptual coding › inject signal into areas that will not be detected by humans › may be obliterated by compression Hardware with copy-protection › not true watermarking - metadata present on media › DAT › minidisc › presence of copy protection mechanisms often failed to give the media wide-spread acceptance
  • 18.  Coding still frames - spatial or frequency  data encoded during refresh › closed captioning  visible watermarking › used by most networks (logo at bottom- right)
  • 19. Digital images are made up of pixels  The arrangement of pixels make up the image’s “raster data”  8-bit and 24-bit images are common  The larger the image size, the more information you can hide. However, larger images may require compression to avoid detection 
  • 20. Least Significant Bit Insertion  Masking and Filtering 
  • 21. Replaces least significant bits with the message to be encoded  Most popular technique when dealing with images  Simple, but susceptible to lossy compression and image manipulation 
  • 22. A sample raster data for 3 pixels (9 bytes) may be: 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011 Inserting the binary value for A (10000001) changes 4 bits
  • 23. Masks secret data over the original data by changing the luminance of particular areas  During masking, it embed the message within significant bits of the cover image  Not susceptible to lossy techniques because image manipulation does not affect the secret message 
  • 24.  Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 25. Software BMPSecrets DarkCryptTC MP3Stego OpenPuff PHP-Class StreamSteganography Supporting Files Notes BMP, JPG, TIFF, GIF Allows to replace upto 5060% of picture with information BMP, JPG, TIFF, PNG, PSD, TGA, MNG, WAV, TXT, HTML, XML, EXE, DLL MP3 BMP, JPEG, PNG,TGA, MP3, WAV, 3fp, MP4, MPEG-2, FLV, VOB, Pdf RSD mode(RNG-based random data distribution) Source code provided 256-bit multi-encryption, carrier chains, Multi-layered obfuscation PNG - Steganography Studio BMP, PNG, GIF Different hiding methods included (LSC, LSC matching, SLSB, ….) Steganographic Laboratory (VSL) BMP, PNG, JPG, TIFF Open Source
  • 26.      Wikipedia Exploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petitcolas Digital Watermarking – H. Bergel, L. O’Gorman
  • 27.
  • 28. Xavier Prathap. W St. Claret College, Jalahalli