Computer Forensics: Steganography 4.2.2019

Computer Forensics: Steganography 4.2.2019

Steganography 4.2.2019. ● cryptography • exchanging messages – everybody can see that communication is going on • through open channels ● even capture the message • even if someone can – but cannot understand the message ▪ intercept messages and change them ● steganography • "The Prisoners Problem" by Simmons, 1983 – is hiding the fact that there is a communication ● nobody can see the message ● it is hidden steganos = protected gráfo = to write http://docsdrive.com/images/academicjournals/rjit/2013/fig3-2k13-53-66.jpg 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 2 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 3 1 2 3 4 • invisible (secret) ink • digital messages • 1499. g. „Steganographia” by Johannes Trithemus ▪ needs chemicals or heat to become visible ▪ first recorded use of the term „steganography” • digital text ▪ a book on cryptography ◦ lemon juice–heat • network steganography and steganography • knitting in clothes • ▪ Cyber-physical Systems (Internet of Things) disguised as a book on magic ! • microdots • 440 BC - Herodot records use • printed content ▪ shaving slaves head • typefaces in printed text ▪ „Is every car electrical?” ▪ using wooden surface of wax tablets . • media files • Cardan Grille ▪ positions in text 2/4/2019 4 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 5 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 6 4 5 6 2015-2017 (c) P.Pale: Computer forensics 1 Steganography 4.2.2019. • hiding content in office files • also „Social steganography” • using color to disguise text ▪ text and background of same color • using space in last block after the end-of-file • all sorts of messages • overlapping elements • hidden partitions ▪ web pages, blogs, comments, shares, likes ▪ picture overlapping text People can’t see messages but programs can detect them • … • methods • coding ▪ mixing ASCII and Unicode characters ▪ timing, order, mistakes, …. ▪ nonprinting Unicode characters ▪ types of media files, size, metadata …. • deliberate errors ▪ using jargon ▪ spelling ◦ professional, slang, emoticons, pictograms, … ▪ formatting • using control elements in HTML ▪ embedding in JavaScript 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 7 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 8 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 9 7 8 9 • uses communication protocols' control elements ▪ typically in headers • Some countries (e.g. China, Iran…) • They use technology ▪ or special packets ▪ block access to VPNs, Tor network etc. ▪ that makes “illegal” traffic (e.g. Tor traffic) ▪ or pattern of packet exchange • single protocol ▪ on a network level ▪ look like “legal” traffic (e.g. Skype video call traffic) ▪ within packets ▪ timing of packets • multiple protocols ▪ inter protocol steganography • To circumvent this • Doing this • steganophony ▪ citizens use (network) steganography ▪ makes it hard to block “illegal” traffic ▪ Voice-over-IP ◦ LACK (Lost Audio Packets Steganography) ▪ without also blocking “legal” traffic ▫ delayed or corrupted packets ▪ WLAN Steganography ▪ because it is hard to distinguish between them ◦ HICCUPS (Hidden Communication System for Corrupted Networks) ▫ intentionally wrong checksums 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 10 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 11 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 12 10 11 12 2015-2017 (c) P.Pale: Computer forensics 2 Steganography 4.2.2019. • The programs for hiding Tor network traffic • Format-Transforming Encryption (FTE) • SkypeMorph/CTT ▪ are called Pluggable Transports (PT) ▪ makes data (e.g. “illegal” Tor/VPN traffic) ▪ disguises Tor traffic • There are many ingenious PT designs ▪ look like arbitrary application-layer traffic (e.g. HTTP) ▪ as Skype video call traffic ▪ more info: https://www.torproject.org/docs/pluggable-transports.html.en • From a steganography point of view, ▪ some interesting PTs are: ◦ Format-Transforming Encryption (FTE) ◦ SkypeMorph / Code-Talker-Tunnel ◦ meek http://cacr.uwaterloo.ca/techre ports/2012/cacr2012-08.pdf https://fteproxy.org/about.html 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 13 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 14 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 15 13 14 15 • meek uses domain fronting: • This works with some CDN services e.g.: • Physical systems controlled by computers ▪ it uses different domain names ▪ Amazon CloudFront ▪ at different layers of communication ▪ Microsoft Azure • the state of multiple devices • one domain ▪ appears on the “outside” of an HTTPS request • the timing/order of their operation: on/off ◦ in the DNS request • the manipulation of their measurements and ◦ and TLS Server Name Indication reports • while another domain ▪ appears on the “inside” • … ◦ in the HTTP Host header • more info: https://www.bamsoftware.com/papers/fronting/ https://fteproxy.org/about.html 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 16 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 17 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 18 16 17 18 2015-2017 (c) P.Pale: Computer forensics 3 Steganography 4.2.2019. • Machine Identification Code (MIC) ▪ „yellow dots, tracking dots, secret dots” • audio, video, photos, drawings ▪ laser printers and photo-copiers • ▪ watermarking every page techniques ▪ serial number, timestamp ▪ insertion • countermeasures ▪ to enhance privacy ▪ modifying least significant bits ▪ • the letter size, spacing, typeface, … distortions ▪ FontCode ▪ creating carrier ◦ http://www.cs.columbia.edu/cg/fontcode/ ◦ modifying specific parameters of letters ▫ to carry information ◦ undetectable to humans ◦ machine readable to computers ◦ message is preserved ▫ in copying/scanning/resizing/rotating 2/4/2019 21 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 19 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 20 19 20 21 22 23 24 • hiding image or audio (and decoding) • free coding and decoding of any file type • hiding and decoding images, audio, video ▪ any format by Andy Brown • uses LSB (Least significant bits algorithm) • can use multiple carriers (carrier chain) • in image or audio by Michal Wegrzyn by Cosimo Oliboni WIndows only • simple GUI for various techniques ▪ JPG, PNG, MP3, MP4, WAV,... ▪ WAV, BMP, GIF • 3 layers of hidden data obfuscation • also offers encryption ▪ cryptography, whitening and encoding ▪ IDEA, DES, MDC • deniable steganography 2/4/2019 22 2/4/2019 23 2/4/2019 24 22 23 24 2015-2017 (c) P.Pale: Computer forensics 4 Steganography 4.2.2019. 25 26 • creating carrier • hiding any type of file Software Carrier RAM Encryption Steganography usage algorithm • also editing image • by Kent Briggs in audio or image S-Tools BMP, GIF 1.6 MB IDEA, DES, LSB ▪ resizing, cropping, rotating … ▪ JPG, GIF, BMP or MP3, WAV T-DES, MDC • VSL Any 43.8 MB - LSB, encrypting • can also encrypt Karhunen-Loeve, ▪ 256-bit AES F5 algorithm ▪ Blowfish, AES, T-DES OpenPuff BMP, JPG, PCX, PNG, 36.0 MB AES, Anubis, LSB TGA Camelia, proprietary CryptaPix BAY, BMP, CRW, CR2, CUR, 6.3 MB AES 3 bit segments DCR, DCX, DIB, EMF, FAX,GIF, G3F, G3N, ICB, ICO, JIF, JPC, JPE, JPG, JP2, J2C, J2K, MRW, NEF… Quick Crypto JPG, GIF, BMP 4.7 MB Blowfish, AES, LSB T-DES 2/4/2019 25 2/4/2019 26 2015-2017 (c) P.Pale: Computer forensics: Steganography 4.2.2019. 27 25 26 27 28 29 • Measures ▪ PSNR – Peak Signal to Noise Ratio ◦ better measure 1 2 ◦ the greater the value the better image Image S-Tools VSL OpenPuff CryptaPix Quick ▪ SSIM – Structural Similarity Index Crypto P 3 66.32 57.09 56.76 56.34 65.02 ◦ similar to human perception S ◦ values 0 to 1; 1 = totally equal N 4 67.02 58.76 57.26 57.26 66.01 R • Message 5 67.1 57.95 57.03 57.03 66.25 • Carriers PSNR vrijednosti Image S-Tools VSL OpenPuff CryptaPix Quick S Crypto S 3 0.9999 0.9988 0.9989 0.9988 0.9998 I 4 0.9998 0.9987 0.9981 0.9981 0.9998 M 5 1.0 0.9997 0.9997 0.9997 1.0 SSIM vrijednosti 2/4/2019 30 467.6 KB 399x399 24 bit BMP Slika500.2 2 KB 413x413 24 bit BMP 557.0 KB 436x436 24 bit BMP 2/4/2019 28 2/4/2019 29 28 29 30 2015-2017 (c) P.Pale: Computer forensics 5 Steganography 4.2.2019. 31 32 • the science of discovering messages • Prema poznatim informacijama ▪ hidden by steganographic methods • Metoda vizualnog pregleda • analytical „attacks” attempt to • Audio‐reproduktivna metoda ▪ detect the presence of a hidden message ▪ or even its meaning/content • Softverska metoda 2/4/2019 31 2/4/2019 32 31 32 33 2015-2017 (c) P.Pale: Computer forensics 6.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us