Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of steganography
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Importance of steganography
Steganography
Intro to Computer Forensics
CINS 139
April Payton
What is Steganography?
The word steganography comes from the Greek name “steganos” which means hidden or secret, and the word graphy, which means writing or drawing. Put them together, and it literally translates to mean “hidden writing” (Richer, 2010). According to Dictionary.com, steganography is “the art of writing in cipher, or in characters, which are not intelligible except to persons who have the key; cryptography.” In the modern use of the word, steganography means the practice of hiding messages within larger messages so that others cannot detect what the message contains, or even that the message is there. It replaces redundant bits in images or other media with secret information from the hidden message. The redundant bits are used because they can be changed without making a noticeable change in the image or sound file.
Steganography is a lot like cryptography, except there are some differences. Cryptography scrambles the message so that if someone discovers it, they cannot understand the contents of the message easily. A decryption key or password is required in order for the recipient to use the information. The goal of steganography is to have the message go through without anyone other than the intended recipient even knowing it was there. When steganography is used, the message is completely hidden, or invisible, so unless you know what to look for, you wouldn’t even know the hidden message is there. When cryptography is used, and noticed, it may make people suspicious, while when the message is hidden using stenography, it is invisible so as not to arouse suspicion.
Steganography is meant to s...
... middle of paper ...
... values of two files in a program. Investigators use the program to create a 128-bit fingerprint of the file, which enables fairly reliable identification of files using their hash value (Richer, 2010).
• Stegdetect and Xsteg. These programs are freeware. Stegdetect is reliable when used to detect JPEG images that contain hidden using JSteg, JPHide and OutGuess (Richer, 2010). It can also be used to perform brute-force attacks against JSteg and JPHide.
• StegoWatch from WetStone Technologies Inc. StegoWatch is different than the other software in that it can be used as an outsourced monitoring and scanning service, or as a software package that users can use to detect steganography. It examines images and uses a mathematical model to detect the steganographic images. Organizations can use it to scan their networks routinely for suspicious activities.
Another discrepancy between actual forensics and how it is portrayed in the media is the availability of information in databases. There is only a small percentage of the entire population’s fingerprints or DNA samples stored within databases such as the Integrated Automated Fingerprint Identification System (IAFIS). This makes finding a match between a DNA sample or fingerprint difficult, as a match would only be found if the person’s information was already stored within the database. If there is no match previously stored in a database, the fingerprint or DNA sample could be potentially rendered useless within a trial. Typically, in order to perform an analysis, investigators must already have a suspect in mind and request a DNA or fingerprint sample from him or her. If the suspect does not want to provide one however, the sample collected as evidence may not count as valid. The CSI effect creates an idealized image that all crimes can be solved with a hair or drop of blood, but this is not always the case in real life.
Stenciling is an ancient craft, used since the Egyptians painted with stencils in the tombs of the pharaohs. Over the course of history, stenciling has fallen in and out of favor, and both peasants and kings have employed it to decorate walls, churches and furniture.
The first and most important step in the entire process for collecting evidence is to document the scene. It is extremely critical that an investigator capture as accurate a depiction of a crime scene as possible (Solomon, Rudolph, Tittel, Broom, & Barrett, 2011). This can be accomplished in a number of ways. These include taking a photograph of the scene to preserve the original image of the scene for a judge and jury. Investigators can also take images of a computer system. It is necessary to take hash images of volatile data first as volatile data relies on a constant flow of electricity to keep in system memory. Things that are considered volatile are registers, the system casche, routing tables, kernel statistics, memory, temporary file systems, disks and archived media (Soloman, Rudolph, Tittel, Broom, & Barrett, 2011). The first thing an investigator s...
The Sleuth Kit (TSK) is a collection of filesystem tools which was originally developed by Brian Carrier. TSK is an improved and extended development of The Coroner’s Toolkit (TCT). TCT had severe limitations, so TSK was developed to overcome these shortcomings (Altheide & Carvey, 2011).
Forensic genetics has other applications . The " fingerprint " DNA represents a valuable tool for forensic science . As is the case with an ordinary fingerprint genetic fingerprint is unique to each individual (except identical twins ) . The determination involves the observation of specific DNA sequences which can be obtained from extremely small tissue samples , hair, blood or eventually left at the scene . As Fifty microliters of blood, semen or five microliters of ten roots of hairs are enough , and nozzles secretions and cells from the fetus . In addition to its use in the capture of criminals , especially rapists , the genetic fingerprints can be used to establish family relationships . People involved in the conservation of species use them to be sure that captive breeding is among individuals who do not belong to the same family .
The first recorded use of steganography dates back to the early Greeks and the ruler, Demaratus. As king of Sparta, Demaratus ruled from 515 to 491 B.C. At this time, it was common to write on waxed tablets. To communicate a warning of an impending attack on Greece by the Persian ruler Xerxes, Demaratus scraped the wax off of a wooden tablet, inscribed a message, and then covered the tablet in wax once again. In this way, the tablets carried secret information to the intended recipient without arousing suspicion. Other times of conflict are rich with examples of steganography. The Underground Railroad used quilt patterns to direct slaves on their journey northward, cryptographic writing was used numerous times in both World War I and II, and
Law enforcement uses several methods to solve all types of crimes. Having a variety of ways to help solve an investigation gives officials an advantage. If one method fails or isn’t helpful, there are several others they can rely on. For instance, if there are no physical witnesses to a crime, the criminal may have left a fingerprint at the crime scene. An individual’s fingerprint is unique, “no two persons have exactly the same arrangement of ridge patterns” (“Fingerprint ID”). Fingerprints of criminals and of civilians are collected and stored. Also, “People who apply for government jobs, jobs that handle confidential information, banking jobs, teaching jobs, law enforcement jobs, and any job that involves security issues can be fingerprinted” (“The First ID”). Fingerprints are processed within hours and minutes through the Integrated Automated Fingerprint ID System. This system was developed in 1991, and made it easier for different law enforcement agencies to store and share fingerprints.
Image splicing forgery technique involves composition or merging of two or more images changing the original image significantly to produce a forged image. In case images with differing background are merged then it becomes very difficult to make the borders and boundaries indiscernible. Figure 2 below shows an example of image splicing where the face of two different people is combined to form a forged image.
Fingerprints are collected from the evidence, and ran through a database such as IAFIS. DNA evidence that is extracted from hair, bodily fluids and skin cells are also ran through databases that help identify the suspects. Firearms, bullets and cartridges are analyzed and can be used to trace a weapon back to its owner. All of the information gathered from collected evidence is pooled together to create a solid base for use in the conviction of suspects in a crime.
Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World Trade Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for safety reasons (USA Today). A " private key" is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
DNA fingerprinting is a way of getting a person’s identification. This is shown in Figure 3 on page 4. One can extract DNA from hair, nails, blood, skin or even saliva. It was first used to discover genetic diseases but now is also used to help catch criminals or research the dead in order to unlock the evolution of mankind.
Computers have also allowed the use of fingerprinting to expand. Agencies can now take someone’s fingerprints and send them through the computer and find out if they are linked to any other cases going on at the time, or any other cases in the past.
It is a comprehensive forensic tool kit created by Paraben Company. It is court proven tool, which offers affordable and reliable digital analysis for digital investigations. The tool is designed to handle large volumes of data in an efficient and fast manner. It is highly recommended computer forensic tool for advanced email and chat log analysis.
Since the genetic makeup of each individual is entirely different from another, it is believed that DNA can be used to prove exactly who was at a crime scene and who was not. The process to determine whose DNA has been gathered at a crime scene is known as DNA fingerprinting. In actuality, only 2% of DNA are genes; the rest is called "junk DNA" which biological purpose is unknown (Verrengia, 1997). Junk DNA is what is mainly used in DNA fingerprinting.