You are on page 1of 87

-

: :
.

2016

-

__________________________

__________________________

__________________________

:____________________

, , . 15. 04. 1991 .


. ,
, , 2010 .
, , .
2014. . .
, 2014 . ,
, .
2014 .
, , ,
1. 4.
.
,
.

3

,
,

. a -,
,

.
,
, ,
.
.
, .
,

-.

: StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 Quick Stego.

.
: , ,
, -, , , StegSpy
v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5, Quick Stego.
ABSTRACT
As it is today, cybercrime phenomenon which certainly captures the rapid rise across the
world and in our country, the main challenge that arises from members of the security services is
security of data and information that is stored on an electronic medium. Today, with the help of
different digital tools antiforensics, it is possible to perform data manipulation and that
perpetrators while not being detected, big task was charged to persons engaged in maintaining
the security and integrity of computer systems.
Cybercrime, which was recognized as a phenomenon which is negative for human
society, namely most of its forms, is legally regulated in all modern countries that have
developed legislation. Which means that an equal role in its eradication have both police and
judicial authorities. One of the main problems related to this type of crime is to provide digital
evidence. To ensure this type of evidence, authorities in charge of the fight against cyber crime
are essential specific software and a good understanding of how digital forensics and digital anti-
forensics.
In this work we steganographic analysis of website and with the help of the following
tools: StegSpy v2.1, v0.4 Stegdetect, Invisble Digital Ink Toolkit v1.5 and Quick Stego. The
results of this work will certainly help digital forensics to understand the way in which criminals
are manipulating the data that can be potentially digital evidence.Keywords: cyber crime, digital
evidence, digital forensics, digital anti-forensics, steganography, steganographic analysis
StegSpy v2.1, v0.4 Stegdetect, Invisble Digital Ink Toolkit v1.5, Quick Stego.

........................................................................................................... 3
................................................................................................................................... 4
................................................................................................................................. 7
.................................................................................................... 8
: ........................................................................................................................ 8
: ............................................................................................................. 8
: ............................................................................................................................... 9
........................................................................................................................... 9
: .............................................................................................................. 10
: ...................................................................... 10
................................................................................................................................... 10
1. ........................................................................................................................................ 10
1.1 ........................................................................................................... 12
1.2 ....................................................................................................................... 14
2. ................................................................................................ 15
2.1 .................................................................................................... 16
2.2 ......................................................................................... 17
2.3 .............................................................................................. 19
2.4 ................................................................................................. 22
3. - ................................................................................. 28
3.1 -......................................................................................... 28
3.2 - ................................................................................ 30
3.2.1 ............................................................................................................. 30
3.2.1.1 (Data hiding) ................................................................................. 32
3.2.1.1.1 ( )..................................................................... 35
3.2.1.1.2 ................................................................. 36
3.2.1.1.3 .............................................................................................................. 37
3.2.1.2 (Artifact wiping)...................................... 39
3.2.1.2.1 .................................................................. 39
3.2.1.2.2 .................................................. 47

5
3.2.1.3 . (Trail obfuscation) ....................................................... 48
3.2.1.4 / (Attacks against the CF
process/tools) .................................................................................................................................. 50
3.2.2 - ( Hiding Disk Partitions) ................... 51
3.2.3 -o ................................... 54
4. ........................................................................................................... 54
4.1 ................................................................................. 56
4.2 ....................................................................................................... 58
4.2.1 StegoMagic 1.0.................................................................................................................... 59
4.2.2 MP3Stego ............................................................................................................................ 60
4.2.3 GRL RealHidden Version 1.0.............................................................................................. 60
4.2.4 WbStego4.3 ......................................................................................................................... 60
4.3 ....................................................................................... 61
4.3.1 Gargoyle ............................................................................................................................. 62
4.3.2 EnCase ................................................................................................................................ 62
4.3.3 Stegdetect ............................................................................................................................ 62
4.3.4 Softver StegAlyzerSS ........................................................................................................... 63
5. ...................................................................................... 64
5.1 ................................................................................................................... 64
5.2 ......................................................... 64
5.2.1 StegSpy ................................................................................................................................ 65
5.2.2 Stegdetect ............................................................................................................................ 66
5.2.3 Digital Invisible InkToolkit ................................................................................................. 67
5.2.4 QuickStego .......................................................................................................................... 70
5.2.4.1 Quick Stego
72
5.3 GetLeft v1.2 ................................................................................................................................. 78
5.4 ................................. 79
( StegSpy2.1, Stegdetect v0.4, Digital invisible Ink Toolkit 1.5, QuickStego)......................................... 79
................................................................................................................................ 84
................................................................................................................................ 85

,
,
e . ,
, , ,
, .
-, ,
, -,

. ,
.
,
, ,
,
, . .
,
, , ,
, .
, .
, ,
.

, .
: StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 Quick
Stego.

.
,
.
, . ,
, -
, .

, ,
. ,
,
. ,
, . ,

(.
, ,
, , . ). ,
,
, -
.
,

. ,
, ,
, ,
,
.
,

.
,

. ,
, ,

.
,
,
.
, ,

. , .

8
,
StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 quickStego,

.
, ,
,
,
.


,
,
.


, .

,
. ,
, ,
.
, ,

, ,
.

.

. ,
, , ,
,
.
,
.

9
:

- (
, )
- ( , ,
, )
- ( ,
, )
- ( , ,
)
- ( StegSpy v2.1,
Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 quickStego)
-
-


, ,
,
, .
,

,

. ,
,
, .


,
,
.


.
, -
.

1.

10
,
.
,
XVIII XI ,
( , ,
, ). ,
.
. ,


,
. ,
,
. , ,
, ,
.
. , ,

.
,
.
,
.
, ,

. , ,
.

, , ,
. 80 ,

, .
,
,
, .
,
. ,

. ,

, .
, 1999.
.
,
,
,

11
,

.
,
. ,
,
.
1950 ,
, 9
, Wattson & Co, , -,
250 ,

.
: , ,

.

( )
, ,
, ,
.1
,
.
,

.
: , ,
, , ,

.
, ,
, ,

. , ,
, ,
,
.

1.1

1
.: , ,
1991, . 142

12
,
, . ,
,
, .
, .

, ,
.

:


, , , ,
.

.2
,
. :

(.298.)
(.299.)
(.300.)
(.301.)
,
(.302.)
(.303.)
(.304.)
,
(.304.).3


.
,
, ,
, .
,
.
.
400 .
,
, .

2
:
, 2.
3
: , 298-304

13
e-mail , spear phishing,
,
(Adobe PDF Reader, Quick Time, Adobe Flash Microsoft Office).
. ,
,
web .

download- ,
, , ,
.
,
.

,
.
, .
, ,
,
.
web 60% ,
,
, web

.

1.2

,
,
. ,
,

.
, ,
,
. ,
, , , ,
,
0 1,
.
14
(The International
Organization on Computer Evidence, IOCE),
(National institute of standards and technology, NIST),
(US Department of Justice, USJD), 1996.
, ,
,
. ,
,
. ,
:


;
,
;
,
;
, ,
, ,
,
;

, ;


.

2.

15
2.1

1999. , -
,
,
.

,
.
,
, ,

, .
, ,
.
, , .4
,
.
, .
,
, .5
,
.
, .
( ), ,
,
( ).
, ,
. .
,
.6
, ,
,
, .
,
,
,
,
0 1 .

4
http://sr.wikipedia.org/sr/___ [01.04.2014.]
5
http://sr.wikipedia.org/wiki/Nau%C4%8Dna_metoda [01.04.2014.]
6
http://sr.wikipedia.org/wiki/ [01.04.2014.]

16
,
, , , ,
, ,
,
-
.
,
.
, , ,
,
, .
:

1. .

,
.
,
, ,

.

2.2

, .
tassein, ,

17
notos, . ,
:7

1. ,
,
. : , ,
,
,
,
.

2.
.

2. ,
: / / ;
/;
/ / ,
.

3.
.

7
.; .; .: EnCase . ,1-2, , 2009,
. 287.

18
3. /,
:
, , ,
,
(, )

, .

4.
/.


: ( HD );
( , .); (
, malware .) ()
( , .).8
, ,
CERT, :
(firewall forensics), (network forensics),
(database forensics) (mobile device forensics).9

2.3

8
, .; .: , , ,
2009, . 9.

9
http://www.cert.hr/sites/default/files/NCERT-PUBDOC-2010-05-301.pdf [18.04.2014.]

19

,
, ,
.
,
,
, .
, , ,
, .
,
.
,

.
:

1)
;
2) ,
;
3)
, ;
4) , ,
,
,
;
5)
, ;
6)

. 10

,

, ,
, IOCE
(International Organization of Computer Evidence) :

1) ,
;

10
http://www.itvestak.org.rs/ziteh_04/radovi/ziteh-19.pdf [18.03.2014.]

20
2) , ,
,
;
3)
;
4) / , ,

.11

, -
, ,
.
,
. ,
,
,
.
:

1) .

,

,
, - . ;
2) .
, ,
,
, .
, ;
3) .
(algoritam hash) .
hash ,
,
;
4) .

, ,
;
5) .
,
, ,

11
, .; .: , , ,
2009, .12.

21
, ,
;
6) .
.
,
.
, , .
7) .

, ,
.
8) .

.
,
,
.12

2.4

,
,
, ,
.
, ,
, ,
.
- , .
, ,

12
, M.: , - , , 2009, .
14.

22
. ,
:

;

;


;

;
.13

- ,

. o, ,
, , :
, , . ,

, ,
: ?, ,
, .
,
,
.
- ,

. , ,
.

(SNLFS).
, .

13
, .; , .; , .: World Wide Web-u:
, Eternal mix, , 2012, . 105-106.

23
5.

,

, .

,
, .
,
,
, -
.
-
, , ,
,
,
, . ,
,
,
.
24
,
,
- .
,
,
. ,
,
.
, ,

:

,
;
, ;
( ).

- -;
, ,
.
,
. ,
;

, ,
;
-
-.14

,
- .
- .
: , ,
.
. ,
, , ,
.
.

.

14
(SNLFS):
, , 2002, . 123.

25

.

6.

, ,
,
,
, -
- -.
,
, .
, ,

, .

, , ,
.
,
,
.

, ,

26
,
, .
,
,
, ,

.

.

.
,
:

15,5 - 32,2C;
;
;

;

; (6)
;
()
;
;

;
, , ,
, ,
(
,
).15

-
, ,
,
.
,
,

15
, .; , .; , .: :
, - , -
, , 2013, . 138-141.

27
.
, ,

,
.

3. -

3.1 -

-,
. ,
, ,
,
.

, ,
, , .
,
- . ,
-,
: -

,
,
.
. ,
- ,
,
,
- ,
.
- , ,
, ,
. ,
-, .

28
, - , -
,
, ,
,

. -
. ( 7) 16

7.

-
, , ,
.
, -
, .
,
-. ,
0 1,
, ASCII ,
. . - .

, .
-,
. ,
, , ,

16
., . -: ,
, , 2010

29
.
- :

;
;
;
;
;
;
- .

,
, .
- ,
,
- . -
, -
, .
,
. 2009 . ,
27, 299 : , , , ,
,


, , ,
, .17

3.2 -

3.2.1



. Microsoft Windows,
Macintosh , Linux-.
80 % Microsoft Windows,

17
2009 , 27, 299
30

-.
, , ,
,
. ,
-,
.
.

8.
-.

, -
Microsoft Windows.
-,
. - , ,
Windowsu
: , , , ,
. ,

. -,
, .
, ,
, - .
, ,

,
, .
-.
,
.
,
. , -
.

31
,
,
, , , , ,
, -
:

- ;
- ;
- ;
- Tampering ;
- Proxy ;
- Non-storage .

-
, .
,
-,
:

1) (Data hiding);
2) (Artifact wiping);
3) . (Trail obfuscation);
4) / (engl. Attacks
against the CF process/tools).18

3.2.1.1 (Data hiding)

Data hiding -
,
,

. ,

,
.
, ,
,

18
.,
, , , 2011, . 36

32
.
,

.
-, ,
.

, .
,
, . .
.
, ,
.
:
(R / R), , , slack ,
. ,
, Slacker.

, .
, .
,
.
, ,
.

:
1) ;
2) ;
3) () ;
4) .

,
,
, . ,
,
.

33

.
, .

.
, ,
.
, .
, ( .
pg. , exe. , iso. .),
. , ,
.
. , wma..
wma. exe.,
,
. , ,
(Signature analyse),
.
, ,
, . ,
,
.
, .

. , ,
.
,
, , .

.
,
,
. , ,
, ,
.
:
1) ;
2) ;
3) .

34
3.2.1.1.1 ( )

,
,
. ,
. ,
,
. 11. 2001. ,
. - ,
. ,
, ,
,
.
-
.
,
, ,
, , ,
,
. ,

, ,
,
.
: wma., waw., mp3., jpg., gif., bmp.,

.
,

. ,
, , .
().

. :19

= + +

19
http://www.itvestak.org.rs/ziteh_10/zbornik_radova/Djurickov%20Manja%20-%20Steganografija.pdf

35
9.


, ,
, ,
,
. ,
.

3.2.1.1.2

,
. ,
.
, .
,
.
,
(, ,
.),
.

. : ,
, .
:

;
36
.

,
, .
.
.
.
, ,
. , .
10 ,
.

10.

, ,
.
,
.

, .

3.2.1.1.3

,

.
.
,

37
. .

: (), hash , ,
.

, ,
, .
-.

, .
-.
, , ,
, , ,
,
svap .

, .


.
, ,
.
:
.
. ,
,
, ,
.

, ,
.
,
.
:
FreeOTFE, TrueCrypt, EFS, Criptainer LE,
: TrueCrypt, BitLocker FVE, FreeOTFE.
,
,
,
.
.
.
,
. :

38
- SSL (Secure Sockets Layer);
.
- TSL (Transaction Layer Security);

-.
- VPN , (Virtual Private Network); VPN


.

3.2.1.2 (Artifact wiping)

a
,
.
:

1) ;
2) .

3.2.1.2.1

,

.
.
, . ,

.
,
:

- 5 (Windows);
-
;
-
.

39
,
,
,
.
,
, .
,
. ,
,
, ,
.
,
.

. ,
, .

. : Evidence
Eliminator, R-Wipe & Clean, Eraser, Aevita Wipe & Delete Cyber Scrubs Privacy Suite.

.

.
:

(Data destruction).
,
, .
, ,
, .
.
,
, .

(File deletion). ,
,
,
. ,
, .

.
,
, Windows xplorer .

40
(Formatting).
,
,
.

.
, ,

.
,
.

. ,

.
Recovery . -

. ,
.

(Evidence eliminators).
.
, Evidence Eliminator Robbin Hood
Software Ltd, ,
.

- Windows swap (engl. Swap Files);


- Windows (engl. Windows Logs);
- Windows (engl. Temporary Files);
- (engl. Recycle Files);
- Windows (engl. Windows Registry Backup);
- (engl. Data and Web History);
- ;
- (engl. Cookies);
- (engl. Download Folder)
- (engl. Internet Favourites List)
- , ;
- ;
-
;
- , ;

41
- (engl. File Slack);
- /;
- ;
- , Plug-In ;
- Slack Windows Registry-;
- ;
- Windows Registry ;
- Common Dialog / ;
- Windows Registry (NT4/2000/XP) 20

(Defragmentation).
.
,
,
,
.
,
, .

20
., . ,
, , 2009, . 268

42
11.

.

.
. ,
, ,
.
,
.
,
, ,
.

(File Shredding). , ,
.
,
, , ,
.
.
File Shredder, .
.

12. File Shredder

43
,
,
.
,
, .
,
,
,
,
.

(Disk Wiping).
. ,
,
.
, .
.
, .
.
, ,
( ).
.

0 0 0 0 0 0 0 0 0 0


0 1 1 0 1 0 0 1 1 0

13. Single Pass

DoD (Department of Defense). - .


. ,
,
,
.
,
, (
) ,
, .


0 0 1 0 1 1 0 1 0 1

44


1 1 1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0 0 0

1 0 0 1 1 0 1 0 1 0

14. DoD

PRNG (Pseudo Random Number Generator).



. .
,
.

Guttman .
. , 1996 .
. 35
,
. 35
, ,
.

21
:





1

DoD 3 3 DoD 5220

21
Encachare An Anti-Forensics tool to Encryp, Camuflag, Change File Properties and Rename Files,
Faculty of The Department of Computing Sciences, Texas, USA, 2011

45

PRGN - 8


Guttman 35

15.

,
. ,
,
. , ,
,
,
. ,
, ,
. ,
. ,
, ,
. ,
.

,
Eraser. :

46
16. Eraser


,

.

3.2.1.2.2


,
, .
, ,

,
.
:

- ( );
- ( );
- ( );
- ( ).22

22
http://www.datasolutions.rs/srp/kompjuterska-forenzika/kompjuterska-forenzika-unistavanje.html

47

( 1) ( 2).

(1) (2)

17.

,

. ,
, 0 1,
.
, ,
. ,
, .

3.2.1.3 . (Trail obfuscation)

.
( ),
, (IP
, MAC )
,
.

( , .),
, ,
, :

48
- IP Spoofing ( IP );
- MAC Spoffing ( MAC );
- VPN ( );
- Proxy ( , Portable
browser);
- Non-storage (Live CD/DVD OS, )
- .



.
. ,
, , -mail
SMTP (Simple Mail Transfer Protocol) SSH Tunneling (
Secure Shell), ,

.
Timestomp ,

, , .
, ,
, ,
.
Transmogrify,
,
. , *.wav
*.jpg, .
,
:

(Log Cleaners) .
,
.

. ,
;

(Spoofing) . . IP
, ,
;

49
(Zombie Accounts) .

.

(Trojan Commands).
.

3.2.1.4
/ (Attacks against the CF process/tools)

-
,

.23

,
.
, -
.
,
.
, ,
.
. , hash
, .
,
. :

. .
.
- ,
.
.
. ,
.

23
http://igneous.scis.ecu.edu.au/proceedings/2007/forensics/01_Kessler_Anti-Forensics.pdf

50
.
. , .
,
.
. ,
.
,
,
,
.
.
. , ,
, -
,
.

3.2.2 - ( Hiding Disk


Partitions)


, .
, ,

, .
, ,
(Search),
.
,
. ,
.

. ( 18)

51
18.

, Windows
(Command Prompt) , DISKPART, list
volume,
. ( 19)

19.

52
, select
volume 1, remove letter , .
( 20).

20.

, ,
This PC, Windows 10, . ( 21).

21. This PC,


53
,
, , ,
. ,
, .
, select volume 1,
assign letter .

3.2.3 -o

-
, ,
.
,
,
, ,

. . ,
( ),
. -,
.
,
,
,
,
.
. , (
) ,
,
, .

4.

-,
.
steganas graphein
. ,
. ,

54
, ,
,
. , -,
,
2001. - , . ,
,
.
, ,
, , .
.

.
, , .
, TCP/IP
., ,
,
,
-. ,
,
,

.
, .wav, .mp3,
.img , .bmp .
. ,
,
, .
,
.
, -
.
-, , -,
,
, . ,
,
. ,
,
,
-. -,
30 .
.
.
,
, .
-.

55
4.1

. ,
,
,
.
.
,
.
.
. ,
,
, .
, . ,

, . ,
.

,
, .
,
. ,
.
,

.
, .
, , .
,
,
.
, . DCT . DCT
,
.
,
, , ,
. .

.
. ,
LSB,
. , ,
, .
, . ,
56
.

,
, . ,
, . ,
,
.
.

.
.
.
, , ,
.
, .

. ,
. ,
.
LSB (Least Significant Byte LSB),
, . ,
, , .
24- BMP
. ,
. ,
, ,
. 24- BMP,
, .
. 8 , 24 ,
, , 3 ,
24 , .
, ,
8- BMP-,
, . GIF- .

.
,
, , ,
. ,
, .
.
. , ,
, , .
,
,

57
. , ,
.
.
. ,
, .
. ,

. .
.
. ,
,
, .

. ,
,
. ,
,
.
,
.

,
,
, .
,
, ,
, .
, ,
,
,
.

, , 3 :

1) ;
2) ;
3) .

4.2

58
4.2.1 StegoMagic 1.0

,
wav aj, 24-i BMP i BMP sliku sa 256 boja.
,
. ,
, ,
. DES .
, 1/8 ,
.
( Enter Password I Verify Password).

22. StegMagic v1.0

59
4.2.2 MP3Stego

mp3 ,
MPEG Audio Layer III .
, , mp3 .
, mp3
.
, ,
mp3 . ,
mp3 , . Oaj o mp3 dist10 ISO
MPEG a , ISO/IEC 11172-3:199 3
3DES .

4.2.3 GRL RealHidden Version 1.0

,
, .
, . JPG, BMP, GIF, MP3, WAV, EXE ,
,
, EXE,
.
,
, .

4.2.4 WbStego4.3

,
bmp, HTML PDF. ,
, .
, ,
. wbStego4,
, ,
: Blowfish, Twofish, CAST128, Rijndael (AES).
, 2
, 256 .
,

60
SHA-1. ,
, , .

23. wbStego v4.3

4.3

61
4.3.1 Gargoyle

WetStone Technologies 2004. ,


StegoDetect. ,
.
,
. Gargoyle
, ,
,
.

4.3.2 EnCase


,
.
,
, ,
, .

4.3.3 Stegdetect


.
Niela Provos-a, OutGuess.
JPEG
.

62
24. StegDetect

4.3.4 Softver StegAlyzerSS


StegAlyzerSS. ,
, ,

.
, ,
.
, .
.

63
5.
( )

5.1


http://www.pegaz-nekretnine.com/.
2007. .
.
PDF .
, .jpg .
, 2.5
mb, 64 , .jpg ,
54. 4 .gif 8 .png .
9 PDF 13 HTML .
,
freeware,
. :
StegSpy v2.1, Stegdetect v0.4, Digital Invisible Ink v1.5 i Quick Stego,
GetLeft v1.2.
,
. .
, PDF ,
. ,
,
, ,
.

5.2

64
5.2.1 StegSpy

je Michael T. Raggo. :
Hiderman, JPHideandSeek, Masker, JPegX i Invisible Secrets.
http://www.spy-hunter.com/stegspydownload.html.
MS Visual Basic- .
. ,
Run,
( 25). ,
.
, .
http://www.pegaz-nekretnine.com/
( 26).

25. StegSpy 2.1

65




26.

5.2.2 Stegdetect

Stegdetect
. Niela
Provos-a OutGuess, .
(v0.2,v0.3, v0.4, v0.5 v0.6),
0.4, xsteg,

.
JPEG . : Jsteg, jphide, Invisible Secrets,
Outguess 0.13b, F5, appendX and Camouflage.
C . Stegdetect v0.6

,
stego . ,

66
,
.
. File,
.
http://www.pegaz-nekretnine.com/
Stegdetect v0.4 . ( 27)

27.
Stegdetect v0.4

,
,
.
,
, . ,
stego .

5.2.3 Digital Invisible InkToolkit

Digital Invisible InkToolkit


.

67

24 .
Windows Linux,
, . Digital Invisible InkToolkit
,
,
. http://www.pegaz-
nekretnine.com
.

28. Digital Invisible InkToolkit

,
Analysis,
. Pick image
, K .

.( 29
30)

68
29. Digital
Invisible InkToolkit

69
30. Digital
Invisible InkToolkit

5.2.4 QuickStego

QuickStego Windows
.
.
, BMP, JPG,
JPEG GIF
BMP.
.
.
, . ,

, upload TXT .
1.2 www.quickcrypto.com.
QuickStego v1.2,
o .

.
,
.

70
31. QuickStego
Pegaz

,

.
Open Image.
.
,
.

.
, Hide Text,
,
Get Text.

71
5.2.4.1
Quick Stego


QuickStego.
, ,
. ,
.

32.

72
33.

34.

73
35.

36.
74
37.

38.

75
39.

40.

76
41.

,
THE IMAGE DOES NOT HAVE A QUICK STEGO SECRET MESSAGE,
.

77
5.3 GetLeft v1.2

GetLeft v1.2 ,
http://www.pegaz-nekretnine.com.
,
. ,
GetLeft. .

42. Getleft v1.2

File,
.
, Start,
.
, .

78
5.4

( StegSpy2.1, Stegdetect v0.4, Digital invisible Ink Toolkit 1.5, QuickStego)


agencija1,
Quickstego. agencija1 agencija,
http://www.pegaz-nekretnine.com/ .
. ( 43)

43.


Milos Markovic 2g1/0044/14. Hide Text,
Save image .
, QuickStego
BMP, JPG, JPEG GIF-.

.
.

79
Passworda ,
.
,
. QuickStego ,
StegSpy 2.1.
: Hiderman, JPHideandSeek, Masker, JPegX i Invisible Secrets.
agencija1, ( 44):

44. agencija1.

,
.
, .
,
.

stegdetect v0.4,
, (
45):

80
45. Stegdetect v0.4

: Jsteg, jphide, Invisible Secrets, Outguess 0.13b,


F5, appendX and Camouflage. ,
,
, jphide. StegSpy

.
JPG ,
.

Digital invisible ink Toolkit v1.5, je


, .
,
( BattleSteg, Blind Hide, Filter
First,Hide Seek).
Passworda, .

, .
( 46
47):

81
46.

47.

82


.
. Decode,
,
. ,
Benchmark :
( 48 49).

48. Benchmark

49. Benchmark

83

,
, ,
.

.

. ,
. ,
.
,
.
.

, .
,
, .
.

,
, , ,
. ,
,


.
. ,
.
.

. ,
,
.

, ,
.


.
,
. ,
,
.
, ,
84


.

,
.

,
.

.
,


.
,

,
, ,
,

.

85
.: ,
, 1991, . 142.
:
, 2.
: , 298-304.
.; .; .: EnCase . ,1-2,
, 2009, . 287.
, .; .: ,
, , 2009, . 9.
, .; .: ,
, , 2009, .12.
, M.: , -
, , 2009, . 14.
, .; , .; , .: World Wide Web-u:
, Eternal mix, , 2012, . 105-106.
(SNLFS):
, , 2002, .
123.
, .; , .; , .:
: , -
, - , , 2013, . 138-141.
., . -:
, , , 2010.
.,
, , , 2011, . 36.
., . ,
, , 2009, . 268.
Encachare An Anti-Forensics tool to Encryp, Camuflag, Change File Properties and
Rename Files, Faculty of The Department of Computing Sciences, Texas, USA, 2011.
Kaur G., Kaur K. Digital Watermarking and Other Data Hiding Tehniques, IJITEE,
April 2013.
Lian S. Multimedia Content Encryption Techniques and Applications, Auerbach
Publication, New York, USA, September 2008, . 21.
Marcella A, Menedez D. Cyber Forensics, Auerbach Publication, New York, USA,
2008, . 96.
Kessler G.C. Anti- Forensics and the Digital Investigator, Champlain College
Burlington, USA, 2007

86
http://sr.wikipedia.org/sr/___ [01.04.2014.]
http://sr.wikipedia.org/wiki/Nau%C4%8Dna_metoda [01.04.2014.]
http://sr.wikipedia.org/wiki/ [01.04.2014.]
http://www.cert.hr/sites/default/files/NCERT-PUBDOC-2010-05-301.pdf [18.04.2014.]
http://www.itvestak.org.rs/ziteh_04/radovi/ziteh-19.pdf [18.03.2014.]
http://www.datasolutions.rs/srp/kompjuterska-forenzika/kompjuterska-forenzika-
unistavanje.html
http://igneous.scis.ecu.edu.au/proceedings/2007/forensics/01_Kessler_Anti-Forensics.pdf
http://www.pegaz-nekretnine.com/
http://www.spy-hunter.com/stegspydownload.html
http://www.quickcrypto.com

87

You might also like