Professional Documents
Culture Documents
CHapter 7 Notes Digital Forensics Steganograpy Notes
CHapter 7 Notes Digital Forensics Steganograpy Notes
1 2
Linguistic
Technical
Digital
3 4
1
Figure 7-3: Null Cipher
Figure 7-2: Visual Semagram
5 6
Insertion
Substitution
7 8
2
Figure 7-5: Spammimic Figure 7-6: Substitution Method in Images
9 10
11 12
3
Several areas should be investigated for the
possible use of steganography:
Program files
Altered file and folder names
Browser history
Domain ownership
Multimedia content
Email attachments
Figure 7-7: Hidden Message Located in the Altered Websites and social media accounts
Image
13 14
There are numerous software programs that can There are numerous software programs that can
be used to conceal messages. These programs are be used to conceal messages. These programs are
known collectively as steganography tools: known collectively as steganography tools:
(continued)
BlindSide is a steganography program that
uses a command-line interface. It hides files Crypture is a free steganographic program
within bitmap (.bmp) files. As its name implies, used to hide a message within an image file.
the original file and the encoded file appear to
Gifshuffle is a steganography program that uses
be the same to the human eye. Therefore,
a colormap to hide messages with a .gif file.
Blindside is not susceptible to visual attacks, a
visual comparison of two similar image files. OpenPuff, as shown in Figure 7-8, can be used
to hide messages within image files. It can also
be used for watermarking.
(continued) (continued)
15 16
4
There are numerous software programs that can
be used to conceal messages. These programs are
known collectively as steganography tools:
(continued)
17 18
19 20
5
There are numerous software programs that can
be used to conceal messages. These programs are
known collectively as steganography tools:
(continued)
Outguess is a steganography application that
can be used to hide text and images within
images. It was designed to run on Linux.
However, it can be run on Windows using
Cygwin.
21 22
23 24
6
There are numerous software programs that can
be used to conceal messages. These programs are
known collectively as steganography tools:
(continued)
Steganos, as shown in Figure 7-13, offers a
suite of software that includes a steganography
tool that hides pictures and documents to help
protect them from detection in the event a
portable device is stolen.
25 26
27 28
7
There are numerous software programs that can
be used to conceal messages. These programs are
known collectively as steganography tools:
(continued)
StegoShare, as shown in Figuree 7-15, is a
steganographic tool that can hide large files
into multiple files.
29 30
31 32
8
Several methods can be used to uncover
information hidden within a file.
Comparison
Steganalysis Tools
33 34
35 36
9
CASE STUDY QUESTION
37 38
39 40
10
KEY POINTS KEY POINTS
41 42
Semagrams use symbols and signs to The two basic types of semagrams are
hide messages. visual semagrams and text semagrams.
43 44
11
KEY POINTS REVIEW QUESTIONS
45 46
2 The presence of what type of device 3 The presence of what type of device
indicates a domain structure? indicates a domain structure?
47 48
12
REVIEW QUESTIONS REVIEW QUESTIONS
4 The presence of what type of device 5 The presence of what type of device
indicates a domain structure? indicates a domain structure?
49 50
6 The presence of what type of device 7 The presence of what type of device
indicates a domain structure? indicates a domain structure?
51 52
13
REVIEW QUESTIONS REVIEW QUESTIONS
8 The presence of what type of device 9 The presence of what type of device
indicates a domain structure? indicates a domain structure?
53 54
10 The presence of what type of device 11 The presence of what type of device
indicates a domain structure? indicates a domain structure?
55 56
14
REVIEW QUESTIONS REVIEW QUESTIONS
12 The presence of what type of device 13 The presence of what type of device
indicates a domain structure? indicates a domain structure?
57 58
14 The presence of what type of device 15 The presence of what type of device
indicates a domain structure? indicates a domain structure?
59 60
15
EXAM QUESTIONS EXAM QUESTIONS
1 The presence of what type of device 2 The presence of what type of device
indicates a domain structure? indicates a domain structure?
a. Who a. Who
b. How b. How
c. When c. When
d. How d. How
61 62
3 The presence of what type of device 4 The presence of what type of device
indicates a domain structure? indicates a domain structure?
a. Who a. Who
b. How b. How
c. When c. When
d. How d. How
63 64
16
EXAM QUESTIONS EXAM QUESTIONS
5 The presence of what type of device 6 The presence of what type of device
indicates a domain structure? indicates a domain structure?
a. Who a. Who
b. How b. How
c. When c. When
d. How d. How
65 66
7 The presence of what type of device 8 The presence of what type of device
indicates a domain structure? indicates a domain structure?
a. Who a. Who
b. How b. How
c. When c. When
d. How d. How
67 68
17
EXAM QUESTIONS EXAM QUESTIONS
9 The presence of what type of device 10 The presence of what type of device
indicates a domain structure? indicates a domain structure?
a. Who a. Who
b. How b. How
c. When c. When
d. How d. How
69 70
18