Statistical Pattern Recognition for Audio Forensics -- Empirical

Total Page:16

File Type:pdf, Size:1020Kb

Statistical Pattern Recognition for Audio Forensics -- Empirical Statistical Pattern Recognition for Audio Forensics { Empirical Investigations on the Application Scenarios Audio Steganalysis and Microphone Forensics Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) angenommen durch die Fakult¨atf¨urInformatik der Otto-von-Guericke-Universit¨atMagdeburg von: Dipl.-Inform. Christian Kr¨atzer geboren am 12. Dezember 1978 in Halberstadt Gutachter: Prof. Dr. Jana Dittmann, Otto-von-Guericke Universit¨atMagdeburg, Magdeburg, Germany Prof. Dr. Stefan Katzenbeisser, Technische Universit¨atDarmstadt, Darmstadt, Germany Prof. Dr. Scott A. Craver, Binghamton University, Binghamton, NY, United States of America Magdeburg, Germany 23. Mai 2013 Abstract Media forensics is a quickly growing research field struggling to gain the same acceptance as traditional forensic investigation methods. Media forensics tasks such as proving image manipulations on digital images or audio manipulations on digital sound files are as relevant today as they were for their analogue counterparts some decades ago. The difference is that tools like Photoshop now allow a large number of people to manipulate digital media objects with a processing speed far beyond anything imaginable in times when image, audio or video manipulation of analogue media was a hardware- and labour-intensive task requiring skill and experience. Currently, there exists a large number of research prototypes but only a small number of accepted tools that are capable of answering specific questions regularly arising in court cases, such as the origin (source authenticity) of an image or recording, or the integrity of a media file. The reason for this discrepancy between the number of research prototypes and the number of solutions accepted in court has to be sought in the very nature of most judicial systems: Judges have to distinguish between valid bases for evidence and expert testimonies on the one hand, and `junk science' on the other hand. In most cases, this distinction reflects a long and cumbersome process that relies on support from the respective scientific communities. Statistical pattern recognition (SPR) is a powerful methodology that has received a lot of attention in academia and industry since the 1930s. In many application fields, it makes possible efficient solutions for classification-based problems, such as the decision whether an e-mail is spam or not. Many current media forensics methods already implement SPR to solve very specific classification or decision prob- lems. This thesis introduces an SPR-based solution concept for audio signal analyses that leave the narrow tracks of such specific forensic methods. Instead, a general-purpose audio forensics concept is discussed, providing the basis for the verification of different authenticity and integrity aspects of audio signals. From the wide range of potential application scenarios that can be used to illustrate the significance of such an approach, audio steganalysis (the detection of hidden communication channels in audio data) and microphone forensics are chosen here to represent one research field focussed on integrity and one focussed on source authenticity. The introduction of such a currently unavailable generalised approach does not solve the issue of making all current SPR-based audio forensics analyses acceptable in court. This goal would be far too ambitious for a PhD project. But the author considers it to be an important step in helping the discourse between judges on the one hand and researchers working on media forensics approaches on the other hand. A positive outcome of this discourse will improve the chances of forensic science passing hurdles such as the Daubert criteria used by judges to keep `junk science' out of their courtrooms. The three research challenges for this thesis are: • Is there a generalised SPR approach (i.e. an adaptable solution concept) for media forensics that can be used for addressing multiple audio forensics investigation goals? • How can the usefulness of application scenario specific instantiations of a generalised audio foren- sics approach be measured? • Can instantiations of the generalised audio forensics approach be used to adequately implement the application scenarios of audio steganalysis and microphone forensics? In order to address these challenges, detailed methodology, concept and design considerations are made, leading to an approach that is highly flexible (i.e. considers components like classification algorithms to be exchangeable off-the-shelf products), deterministic, verifiable (integrating feature selection as a means of plausibility verification for the classification process) and easily adaptable to different applica- tion scenarios. Furthermore, the possibility of assessing the usefulness of implementations of application scenario specific instantiations of the introduced concept is discussed against the background of the Daubert criteria. iii The two instantiations of the introduced generalised approach selected as examples illustrate the in- stantiation process and the corresponding performance assessment. In the substantial empirical in- vestigations performed in audio steganalysis, detection performances similar to those presented in the state-of-the-art in specialised audio steganalysis solutions are achieved. For the microphone forensics scenario, the approach introduced here is assumed to outperform the current state-of-the-art, as it shows similar detection performances while overcoming context limitations from which most of the specific approaches suffer. Despite the progress made in both application scenarios, which illustrates the significance of the intro- duced approach, it has to be admitted that the results discussed here still fall short of the ultimate (yet for a PhD thesis unrealistic) goal of providing audio forensic solutions acceptable for court proceedings. iv Deutschsprachige Version des Abstract Medienforensik ist ein derzeit schnell wachsendes Forschungsfeld, welches anstrebt, eine ¨ahnlicheAkzep- tanz wie etablierte forensische Disziplinen zu erlangen. Aufgaben der Medienforensik, wie beispielsweise der Nachweis von Manipulationen an digitalen Bild- oder Tondaten, sind heute im selben Umfang rele- vant, wie es ¨ahnlicheTechniken f¨urFotomaterial oder analoge Tontr¨agerzuvor waren. Der Unterschied zu diesen liegt in der Verf¨ugbarkeit von Werkzeugen wie zum Beispiel Photoshop, die den Durchsatz bei Manipulationen erh¨ohen,w¨ahrend gleichzeitig das ben¨otigteKnow-how sinkt. Derzeit gibt es eine Vielzahl von prototypischen L¨osungenaus der Forschung, welche in der Lage w¨aren,spezielle Fragestellungen der Medienforensik, wie zum Beispiel den Nachweis der Herkunft (Quellenauthentizit¨at)oder der Integrit¨at,zu f¨uhren. Allerdings gibt es nur wenige solche L¨osungen, die auch vor Gericht Bestand haben. Der Grund f¨urdiese Diskrepanz liegt in der Natur der meis- ten Rechtssysteme: Richtern obliegt es, zwischen geeigneten Grundlagen f¨urdie Beweisf¨uhrungund pseudowissenschaftlichen Ramschwissenschaften zu unterscheiden. Zumeist geht der Zulassung einer wissenschaftlichen Methode im Gericht ein langwieriger Zulassungsprozess voran, bei dem die Richter auf die Zuarbeit der entsprechenden Forschungsbereiche angewiesen sind. Statistische Mustererkennung (SPR, engl.: statistical pattern recognition) ist eine sehr m¨achtigeMe- thodik, die seit den 1930er Jahren in Forschung und Industrie eine starke Akzeptanz erf¨ahrt.In vielen Bereichen erm¨oglichtsie effiziente L¨osungen f¨urklassifikationsbasierte Probleme, wie zum Beispiel die Frage, ob eine E-Mail Spam ist oder nicht. Viele aktuelle Ans¨atzeder Medienforensik nutzen diese Methodik f¨urdie L¨osungspezieller Klassifikations- oder Entscheidungsprobleme. In dieser Dissertation wird ein SPR-basiertes L¨osungskonzept vorgestellt, welches die ausgetretenen Pfade hochspezialisierter forensischer Methoden verl¨asstund ein Universalwerkzeug f¨urunterschiedliche forensische Analysen der Authentizit¨atund Integrit¨atvon Audiodaten darstellt. Aus dem umfangreichen Pool an m¨oglichen Einsatzszenarien f¨urein solches Universalwerkzeug werden hier zwei Beispiele zur Illustration der Prax- isrelevanz des vorgestellten Ansatzes vorgestellt. Dabei handelt es sich um die Audiosteganalyse (die Erkennung von verdeckten Kommunikationskan¨alenin Audiodaten) und die Mikrofonerkennung. Durch diese Auswahl wird jeweils eine L¨osungf¨urdie Verifikation der Integrit¨atvon Audiodaten und eine L¨osungf¨urdie Verifikation der Quellenauthentizit¨atbetrachtet. Die Einf¨uhrungeines solchen, derzeitig fehlenden, generalisierten Ansatzes wird nicht automatisch alle derzeitig auf statistischer Mustererkennung basierenden Verfahren der Medienforensik f¨urAudiodaten vor Gericht verwertbar machen. Dies w¨areein viel zu ambitioniertes Unterfangen f¨ureine einzelne Dis- sertation. Allerdings betrachtet der Autor die hier durchgef¨uhrtenArbeiten als einen wichtigen Schritt im Diskurs zwischen Richtern einerseits und Forschern im Bereich der Medienforensik andererseits. Ein positiver Ausgang dieses Diskurses sollte die Chancen daf¨urerh¨ohen,dass Forschungsergebnisse erfol- greich die H¨urdennehmen, welche von Richtern genutzt werden, um Pseudowissenschaften aus den Gerichtss¨alenfernzuhalten (zum Beispiel die Daubert-Kriterien der US-Rechtsprechung). Die drei wissenschaftlichen Herausforderungen, die in dieser Arbeit aufgegriffen werden, sind: • Gibt es einen generalisierbaren SPR-Ansatz (d. h. ein anpassbares L¨osungskonzept) im Bereich der Medienforensik, welcher verwendet werden kann, um
Recommended publications
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Steganography & Steganalysis
    June 6, 2003 Steganography & Steganalysis SpyHunter www.spy-hunter.com [email protected] 1 AgendaAgenda X Steganography – What is Steganography? – History – Steganography today – Steganography tools X Steganalysis – What is Steganalysis? – Identification of Steganographic files – Cracking Steganographic files – What’s in the future? 2 Steganography 3 SteganographySteganography -- DefinitionDefinition X Steganography – from the Greek word steganos meaning “covered” – and the Greek word graphie meaning “writing” X Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination X Anyone else viewing the message will fail to know it contains hidden/encrypted data 4 SteganographySteganography -- HistoryHistory X Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank. X Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. 5 SteganographySteganography X Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated. X Invisible Ink is also a form of steganography 6 SteganographySteganography X The U.S. government is concerned about the use of Steganography. X Common uses in include the disguising of corporate espionage. X It’s possible that terrorist cells may use it to secretly communicate information X It’s also a very good Anti-forensics mechanism to mitigate the effectiveness of a forensics investigation 7 SteganographySteganography Terror groups hide behind Web encryption By Jack Kelley, USA TODAY AP WASHINGTON — Hidden in the X-rated pictures on several pornographic Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies.
    [Show full text]
  • Steganography: Forensic, Security, and Legal Issues
    Journal of Digital Forensics, Security and Law Volume 3 Number 2 Article 2 2008 Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University Ernst Bekkering Northeastern State University Mark B. Schmidt St. Cloud State University Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Warkentin, Merrill; Bekkering, Ernst; and Schmidt, Mark B. (2008) "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law: Vol. 3 : No. 2 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2008.1039 Available at: https://commons.erau.edu/jdfsl/vol3/iss2/2 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Journal of Digital Forensics, Security and Law, Vol. 3(2) Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University [email protected] Ernst Bekkering Northeastern State University [email protected] Mark B. Schmidt St. Cloud State University [email protected] ABSTRACT Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit.
    [Show full text]
  • Steganalysis Techniques and Comparison of Available Softwares
    STEGANALYSIS TECHNIQUES AND COMPARISON OF AVAILABLE SOFTWARES 1Muhammad D. Hassan, 2Murad A. Mohammed AMIN and 3Suzan T. Mahdi [email protected]; [email protected]; [email protected] 1,2 Northern technical university of Iraq, 3Northern Oil Company, Iraq Abstract. The technological advancements of the present time bring along the necessity to maintain the security of the data which are available on the digital platform. Encryption and steganography techniques include the solution techniques used to ensure this security. The robustness of these techniques are also tested by analysis techniques. In this study, the steganalysis methods which are being used are explained. The results obtained are indicated in the charts. Keywords: Image Security, Steganography, Data Security 1 Introduction Steganography can be defined as hiding data inside an object [1]. The word Steganography was derived from the words “στεγαυος” and “γραΦειν” which are in the Greek alphabet. The exact meaning for these words is “hidden text” or “covered writing” [2]. Another branch of science advancing in parallel with the development of steganography is steganalysis. The aim of steganalysis is to reveal the existence of hidden data in an image, sound or a file. Steganalysis is the complete set of methodology to differentiat between carrier, original and stego object. There has been a lot of researches in the 2000’s regarding steganalysis, especially in the steganalysis of image and sound files [3]. Various steganographic methods have been developed to hide information on image files. The methods can be classified under three headings [4]: - Adding to the least significant bit - Masking and filtering - Solutions methods and file data alterations.
    [Show full text]
  • Crime-Scene-Technician-Curriculum-Guide
    © A Curriculum Guide for Contextualized Instruction in Workforce Readiness Crime Scene Technician The Literacy Institute at Virginia Commonwealth University Virginia Adult Learning Resource Center 3600 W Broad St. Ste 112 Richmond, VA 23230 www.valrc.org Southwest Virginia Community College 724 Community College Road Cedar Bluff, VA 24609 1 www.pluggedinva.com This work by Virginia Commonwealth University is licensed under the Creative Commons Attribution 4.0 International License. PluggedInVA© is a project of the Virginia Adult Learning Resource Center at Virginia Commonwealth University. PluggedInVA© has received funds from the Governor's Productivity Investment Fund, The Chancellor's Elearning Enhancement & Development Grant, the Virginia Department of Education Office of Adult Education & Literacy, the Virginia Community College System, the Virginia Employment Commission, and the Department of Labor. This curriculum guide was developed as part of a Department of Labor Trade Adjustment Assistance Community College and Career Training grant to Southwest Virginia Community College. 2 October, 2013 Table of Contents I. PluggedInVA Introduction and Project Rationale II. PluggedInVA Curriculum Framework III. Instructional Schedules Monthly Objectives Weekly Instructional Template IV. Capstone Project Project Description Project Planning Template V. Instructional Approaches and Strategies VI. Materials and Resources Appendices i. Sample Instructional Activities ii. College Survival Resources iii. Online Collaboration Tool Example v. Phlebotomy Classroom Activities and Resources A. Career Assessment B. Ethics and Justice C. Mythbusting in Forensic Science D. What is Leadership? And What is Its Value? Information about the PluggedInVA project, including resources for planning and implementation, are available on the PluggedInVA website. 3 I. Introduction PluggedInVA is a career pathways program that prepares adult learners with the knowledge and skills they need to succeed in postsecondary education, training, and high-demand, high-wage careers in the 21st century.
    [Show full text]
  • Government Response to the Consultation on New Statutory Powers for the Forensic Science Regulator
    Government response to the consultation on new statutory powers for the Forensic Science Regulator JULY 2015 Contents 1. Introduction 1 2. Summary of responses 2 2.1 Question 15a – Respondents 2 2.2 Question 15b – Forensic Service Providers 3 2.3 Question 1 – Stages of regulation 4 2.4 Question 2 – Forensic Science Disciplines 6 2.5 Question 3 – Role of the Regulator: Further Comments 8 2.6 Question 4 – Statutory Code of Practice 9 2.7 Question 5 – Compliance with the Code 11 2.8 Question 6 – Making the Code of Practice Statutory 13 2.9 Question 7 – Making the Code of Practice Statutory: Further Comments 14 2.10 Question 8 – Powers of the Forensic Science Regulator 15 2.11 Question 9 – Sanctions for Non-Compliance with the Code 16 2.12 Question 10 – Access to UKAS Records 18 2.13 Question 11 – Statutory Powers of Investigation 19 2.14 Question 12 – Making the Code of Practice Statutory: Further Comments 20 2.15 Question 13 – Regulation of Standards: Further Comments 21 2.16 Question 14 – Cost/Benefit Analysis 22 3. List of respondents 23 1. Introduction 1.1 The post of Forensic Science Regulator was established in 2008 and was held by Andrew Rennison until August 2014. The current Regulator is Dr Gillian Tully. 1.2 Although sponsored by the Home Office, the Regulator is a public appointee and operates independently of the Home Office, on behalf of the criminal justice system as a whole. The Regulator has jurisdiction throughout England and Wales. The Scottish and Northern Irish authorities follow the Regulator’s standards on a voluntary basis.
    [Show full text]
  • Forensic Audio Analysis 612-637 Forensic Video Analysis 638-651 Imaging 652-687 Digital Evidence 688-743
    17th Interpol International Forensic Science Managers Symposium, Lyon 8th -10th October 2013 Review Papers Edited by Prof. Niamh Nic Daéid Centre for Forensic Science, University of Strathclyde, Glasgow, UK TABLE OF CONTENTS PREFACE 3 Mr Nelson Santos, Chairman of the Organising Committee CRIMINALISTICS 5 Technical co-ordinator :- Prof. Kimmo Himberg Examination of Firearms 6-43 Examination of Firearms – Gun Shot Residue 44-66 Forensic Examination of Marks 67-128 Examination of Paint 129-174 Forensic Examination of Fibres and Textiles 175-205 Forensic Geology 206-229 FORENSIC CHEMISTRY 230 Technical co-ordinator :- Prof Niamh NicDaeid Fire Cause Investigation and Fire Debris Analysis 231-279 Analysis and Detection of Explosives 280-435 Drug Evidence 436-524 Toxicology 526-610 MEDIA EVIDENCE 611 Technical co-ordinator :- Dr. Peter Pfefferli, Forensic Audio Analysis 612-637 Forensic Video Analysis 638-651 Imaging 652-687 Digital Evidence 688-743 INDENTIFICATION SCIENCES 744 Technical co-ordinator :- Dr. Kevin Sullivan Fingermarks and other Impressions 745-820 Body Fluid Identification and DNA Typing 821-853 Questioned Documents 854-897 Forensic Science Management 898-923 Forensic Audio Analysis Review: 2010–2013 Catalin Grigoras, Ph.D.1 Jeff M. Smith, M.Sc.1 Geoffrey Stewart Morrison, Ph.D.2 Ewald Enzinger, M.Phil. 2 1 National Center for Media Forensics, University of Colorado Denver 2 Forensic Voice Comparison Laboratory, School of Electrical Engineering and Telecommunications, University of New South Wales TABLE OF CONTENTS 1 Introduction
    [Show full text]
  • Forensic Science 1 Forensic Science
    Forensic science 1 Forensic science "Forensics" redirects here. For other uses, see Forensics (disambiguation). Forensic science Physiological sciences • Forensic anthropology • Forensic archaeology • Forensic odontology • Forensic entomology • Forensic pathology • Forensic botany • Forensic biology • DNA profiling • Bloodstain pattern analysis • Forensic chemistry • Forensic osteology Social sciences • Forensic psychology • Forensic psychiatry Forensic criminalistics • Ballistics • Ballistic fingerprinting • Body identification • Fingerprint analysis • Forensic accounting • Forensic arts • Forensic footwear evidence • Forensic toxicology • Gloveprint analysis • Palmprint analysis • Questioned document examination • Vein matching Digital forensics • Computer forensics • Forensic data analysis • Database forensics • Mobile device forensics • Network forensics • Forensic video • Forensic audio Related disciplines • Fire investigation Forensic science 2 • Fire accelerant detection • Forensic engineering • Forensic linguistics • Forensic materials engineering • Forensic polymer engineering • Forensic statistics • Forensic taphonomy • Vehicular accident reconstruction People • William M. Bass • George W. Gill • Richard Jantz • Edmond Locard • Douglas W. Owsley • Werner Spitz • Auguste Ambroise Tardieu • Juan Vucetich Related articles • Crime scene • CSI effect • Perry Mason syndrome • Pollen calendar • Skid mark • Trace evidence • Use of DNA in forensic entomology • v • t [1] • e Forensic science is the scientific method of gathering and examining
    [Show full text]
  • A Short Note on Forensic Science
    A SHORT NOTE ON FORENSIC SCIENCE - Yash Vardhan Singh Definition of Forensic Science Forensic science is the application of natural sciences to matters of the law. In practice, forensic science draws upon physics, chemistry, biology, and other scientific principles and methods. Forensic science is concerned with the recognition, identification, individualization, and evaluation of physical evidence. Forensic scientists present their findings as expert witnesses in the court of law. The word “forensic” means “pertaining to the law”; forensic science resolves legal issues by applying scientific principles to them. Forensic Science is the application of the methods and techniques of the basic sciences to legal issues. As you can imagine Forensic Science is a very broad field of study. Crime Laboratory Scientists, sometimes called Forensic Scientists or, more properly, Criminalists, work with physical evidence collected at scenes of crimes. Forensic science is the scientific analysis and documentation of evidence suitable for legal proceedings. Many people have heard the term “forensics” used to describe school debate clubs. There is a similarity between these two forms of the word. In academic forensics, political or other issues are debated between two teams using a logical approach, and likewise in forensic science the debate (or comparison) is between the physical evidence and the known or suspected circumstances about an event. The word forensic comes from the Latin adjective forensis, meaning "of or before the forum." In Roman times, a criminal charge meant presenting the case before a group of public individuals in the forum. Both the person accused of the crime and the accuser would give speeches based on their side of the story.
    [Show full text]
  • A Forensics Software Toolkit for DNA Steganalysis
    University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 5-2015 A forensics software toolkit for DNA steganalysis. Marc Bjoern Beck University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Part of the Computer Engineering Commons Recommended Citation Beck, Marc Bjoern, "A forensics software toolkit for DNA steganalysis." (2015). Electronic Theses and Dissertations. Paper 2073. https://doi.org/10.18297/etd/2073 This Doctoral Dissertation is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. A FORENSICS SOFTWARE TOOLKIT FOR DNA STEGANALYSIS By Marc Bjoern Beck B.S., Computer Science, Brescia University, 2007 M.S., Industrial Technology, Morehead State University, 2009 A Dissertation Submitted to the Faculty of the J. B. Speed School of Engineering of the University of Louisville in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science and Engineering Department of Computer Engineering and Computer Science University of Louisville Louisville, Kentucky May 2015 A FORENSICS SOFTWARE TOOLKIT FOR DNA STEGANALYSIS By Marc Bjoern Beck B.S., Computer Science, Brescia University, 2007 M.S., Industrial Technology, Morehead State University, 2009 A Dissertation Approved On April 20, 2015 By the following Dissertation Committee: ___________________________________________ Roman V. Yampolskiy, Ph.D., Dissertation Director ___________________________________________ Ahmed H.
    [Show full text]
  • Forensic Analysis of Video Steganography Tools Thomas Sloan and Julio Hernandez-Castro School of Computing, University of Kent, Canterbury, Kent, United Kingdom
    Forensic analysis of video steganography tools Thomas Sloan and Julio Hernandez-Castro School of Computing, University of Kent, Canterbury, Kent, United Kingdom ABSTRACT Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, thereis increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools.
    [Show full text]
  • Cybersecurity Professional Penetration Tester
    2018 CYBERSECURITY PROFESSIONAL PENETRATION TESTER DIVERGENCE ACADEMY 11/3/2018 TABLE OF CONTENTS NETWORK EXPLOITATION AND PENTESTING ..................................................................................................... 4 WIRELESS PENTESTING AND NETWORK EXPLOITATION .................................................................................... 6 PYTHON FOR PENTESTERS .................................................................................................................................. 8 POWERSHELL FOR PENTESTERS ........................................................................................................................ 10 ETHICAL HACKING AND COUNTERMEASURES .................................................................................................. 12 PACKET ANALYSIS WITH WIRESHARK ................................................................................................................ 13 COMPETING IN CAPTURE THE FLAG EVENTS..................................................................................................... 14 Page 1 of 15 DIVERGENCE ACADEMY NICE National LEARNING IS BEST BY DOING Cybersecurity Workforce Divergence Academy educates cyber security professionals in “hands- Framework on” lab environments on topics that include computer, media and mobile device exploitation, penetration testing and vulnerability assessment, and cyber forensics. Our students train on the latest cyber security practices and methodologies, whether in a classroom, workplace or at home.
    [Show full text]