Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of steganography
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Importance of steganography
Steganography
Intro to Computer Forensics
CINS 139
April Payton
What is Steganography?
The word steganography comes from the Greek name “steganos” which means hidden or secret, and the word graphy, which means writing or drawing. Put them together, and it literally translates to mean “hidden writing” (Richer, 2010). According to Dictionary.com, steganography is “the art of writing in cipher, or in characters, which are not intelligible except to persons who have the key; cryptography.” In the modern use of the word, steganography means the practice of hiding messages within larger messages so that others cannot detect what the message contains, or even that the message is there. It replaces redundant bits in images or other media with secret information from the hidden message. The redundant bits are used because they can be changed without making a noticeable change in the image or sound file.
Steganography is a lot like cryptography, except there are some differences. Cryptography scrambles the message so that if someone discovers it, they cannot understand the contents of the message easily. A decryption key or password is required in order for the recipient to use the information. The goal of steganography is to have the message go through without anyone other than the intended recipient even knowing it was there. When steganography is used, the message is completely hidden, or invisible, so unless you know what to look for, you wouldn’t even know the hidden message is there. When cryptography is used, and noticed, it may make people suspicious, while when the message is hidden using stenography, it is invisible so as not to arouse suspicion.
Steganography is meant to s...
... middle of paper ...
... values of two files in a program. Investigators use the program to create a 128-bit fingerprint of the file, which enables fairly reliable identification of files using their hash value (Richer, 2010).
• Stegdetect and Xsteg. These programs are freeware. Stegdetect is reliable when used to detect JPEG images that contain hidden using JSteg, JPHide and OutGuess (Richer, 2010). It can also be used to perform brute-force attacks against JSteg and JPHide.
• StegoWatch from WetStone Technologies Inc. StegoWatch is different than the other software in that it can be used as an outsourced monitoring and scanning service, or as a software package that users can use to detect steganography. It examines images and uses a mathematical model to detect the steganographic images. Organizations can use it to scan their networks routinely for suspicious activities.
Fingerprints are collected from the evidence, and ran through a database such as IAFIS. DNA evidence that is extracted from hair, bodily fluids and skin cells are also ran through databases that help identify the suspects. Firearms, bullets and cartridges are analyzed and can be used to trace a weapon back to its owner. All of the information gathered from collected evidence is pooled together to create a solid base for use in the conviction of suspects in a crime.
The Sleuth Kit (TSK) is a collection of filesystem tools which was originally developed by Brian Carrier. TSK is an improved and extended development of The Coroner’s Toolkit (TCT). TCT had severe limitations, so TSK was developed to overcome these shortcomings (Altheide & Carvey, 2011).
Stenciling is an ancient craft, used since the Egyptians painted with stencils in the tombs of the pharaohs. Over the course of history, stenciling has fallen in and out of favor, and both peasants and kings have employed it to decorate walls, churches and furniture.
Law enforcement uses several methods to solve all types of crimes. Having a variety of ways to help solve an investigation gives officials an advantage. If one method fails or isn’t helpful, there are several others they can rely on. For instance, if there are no physical witnesses to a crime, the criminal may have left a fingerprint at the crime scene. An individual’s fingerprint is unique, “no two persons have exactly the same arrangement of ridge patterns” (“Fingerprint ID”). Fingerprints of criminals and of civilians are collected and stored. Also, “People who apply for government jobs, jobs that handle confidential information, banking jobs, teaching jobs, law enforcement jobs, and any job that involves security issues can be fingerprinted” (“The First ID”). Fingerprints are processed within hours and minutes through the Integrated Automated Fingerprint ID System. This system was developed in 1991, and made it easier for different law enforcement agencies to store and share fingerprints.
At the first thought of steganography what is the first thing that pops into you mind? For me I would have to stay the court steganography. It is really the only way I heard steganography mention before, but after research I came to the realization that court steganography is just one part of the various types of steganography that there are. Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party (Gary). Going all the way back to the caveman error steganography exited. There form of usage were painting on the wall that they used to communicate with each other. Some were simpler than others to understand others are still being coded as I write on this
The first recorded use of steganography dates back to the early Greeks and the ruler, Demaratus. As king of Sparta, Demaratus ruled from 515 to 491 B.C. At this time, it was common to write on waxed tablets. To communicate a warning of an impending attack on Greece by the Persian ruler Xerxes, Demaratus scraped the wax off of a wooden tablet, inscribed a message, and then covered the tablet in wax once again. In this way, the tablets carried secret information to the intended recipient without arousing suspicion. Other times of conflict are rich with examples of steganography. The Underground Railroad used quilt patterns to direct slaves on their journey northward, cryptographic writing was used numerous times in both World War I and II, and
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
It is a comprehensive forensic tool kit created by Paraben Company. It is court proven tool, which offers affordable and reliable digital analysis for digital investigations. The tool is designed to handle large volumes of data in an efficient and fast manner. It is highly recommended computer forensic tool for advanced email and chat log analysis.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Computers have also allowed the use of fingerprinting to expand. Agencies can now take someone’s fingerprints and send them through the computer and find out if they are linked to any other cases going on at the time, or any other cases in the past.
Steganography is basically made from two greek words steganos and grapter.steganos means covered and grapter means writing so steganography means “covered writing”.steganography is writing the secret message.The goal of steganography is to hide the text by installed messages in objects such as digital images, audio,video or text files.The other area of steganography is a copyright marking where the message is inserted to copyright over a document. steganography and watermarking portray routines to insert data straightforwardly into a bearer signal. Data stowing away in sound signs is increasing boundless significance for secure correspondence of data, for example, clandestine front line and managing an account exchanges by means of open sound
Image splicing forgery technique involves composition or merging of two or more images changing the original image significantly to produce a forged image. In case images with differing background are merged then it becomes very difficult to make the borders and boundaries indiscernible. Figure 2 below shows an example of image splicing where the face of two different people is combined to form a forged image.
Greek words “stegos” means “cover” and “grafia ”means writing” defining it as “covered writing”. Steganography is the method through which existence of the secret message can be kept secret. This is achieved by hiding secret message behind another media such as image, audio and video. In image steganography, the message is hidden behind an image. The image into which a message is hidden is called a cover image and the result is stego-image. Two important properties that should be considered while designing a steganographic algorithm are undetectability and embedding capacity. The stego-image must be undetectable and it should embed more data. Steganography has various applications. It can be used in military, commercial and anti-criminal applications, transmission of confidential documents between international governments, e-commerce, media, database systems , digital watermarking etc.
DNA fingerprinting is a way of getting a person’s identification. This is shown in Figure 3 on page 4. One can extract DNA from hair, nails, blood, skin or even saliva. It was first used to discover genetic diseases but now is also used to help catch criminals or research the dead in order to unlock the evolution of mankind.
Since the genetic makeup of each individual is entirely different from another, it is believed that DNA can be used to prove exactly who was at a crime scene and who was not. The process to determine whose DNA has been gathered at a crime scene is known as DNA fingerprinting. In actuality, only 2% of DNA are genes; the rest is called "junk DNA" which biological purpose is unknown (Verrengia, 1997). Junk DNA is what is mainly used in DNA fingerprinting.