nur munirah binti zahari

47
IMAGE SHREDDER TOOL NUR MUNIRAH BINTI ZAHARI BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY) WITH HONOURS UNIVERSITI SULTAN ZAINAL ABIDIN 2021

Upload: others

Post on 01-Oct-2021

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NUR MUNIRAH BINTI ZAHARI

IMAGE SHREDDER TOOL

NUR MUNIRAH BINTI ZAHARI

BACHELOR OF COMPUTER SCIENCE (COMPUTER

NETWORK SECURITY) WITH HONOURS

UNIVERSITI SULTAN ZAINAL ABIDIN

2021

Page 2: NUR MUNIRAH BINTI ZAHARI

IMAGE SHREDDER TOOL

NUR MUNIRAH BINTI ZAHARI

BACHELOR OF COMPUTER SCIENCE (COMPUTER

NETWORK SECURITY) WITH HONOURS

Universiti Sultan Zainal Abidin

2021

Page 3: NUR MUNIRAH BINTI ZAHARI

i

DECLARATION

I hereby declare that this report is based on my original work except for quotations and

citations, which have been duly acknowledged. I also declare that this work has not

been previously or concurrently submitted for any other degree at Universiti Sultan

Zainal Abidin or other institutions.

___________________________

Name: Nur Munirah Binti Zahari

Date:

Page 4: NUR MUNIRAH BINTI ZAHARI

ii

CONFIRMATION

This is to confirm that:

The research conducted and the writing of this report was under my supervision.

__________________________________

Name: Dr. Muhammad Danial bin Zakaria

Date:

Page 5: NUR MUNIRAH BINTI ZAHARI

iii

DEDICATION

Alhamdulillah, first and foremost, I am particularly grateful to Allah S.W.T., for giving

me blessing, strength, chance, and endurance to complete this project. Secondly, I

would like to express my love and gratefulness to my family especially my parents, and

siblings for always giving me unstoppable motivation, love, and support in financially,

morally, and spiritually.

Furthermore, I would like to acknowledge and express my sincere gratitude to my

beloved supervisor Dr Muhammad Danial bin Zakaria, who had monitored the project’s

throughout the whole progress. His constructive comments, advice, and suggestions had

guided my project towards its success.

Last but not least, I would like to extend my deepest appreciation to all my friends who

contributed a lot and assisted me in completing this final year project with flying

colours.

Once again, thank you.

Page 6: NUR MUNIRAH BINTI ZAHARI

iv

ABSTRACT

An image shredder is a tool designed to overwrite image file metadata so that the image

file will be permanently shredded image just as a conventional shredder makes a

physical piece of paper unreadable. In most operating systems, when a user deletes a

file, it still exists on the hard drive but is made inaccessible through normal means.

What is actually deleted is the operating system’s pointer to the file, so it is invisible to

the user but still exists in storage. The storage space for the file is considered available

and that may cause the data to be overwritten, although it is not possible to know that it

has been. In some company, ensuring that the sensitive information in deleted files

cannot be recovered is essential to information security, compliance, and data

governance. Unfortunately, it is possible to recover the original data unless overwriting

has taken place hundreds of times. Deleted files can be recovered through readily

available freeware programs such as Recuva and Puran File Recovery as well as

professional software such as EnCase which data recovery and law enforcement

commonly use. Image shredders are similar to hard drive overwrites except that they

work with individual image files, rather than effectively obliterating the entire drive.

The programs overwrite the content in an image file multiple times with zeroes, ones,

and random bits to ensure that the data is unrecoverable other than through more

complicated efforts. In realizing this solution, write zero data sanitization method and

shredding technique will be used to overwrite data on a storage device to prevent all

software based file recovery methods from recovering information from the drive.

Page 7: NUR MUNIRAH BINTI ZAHARI

v

ABSTRAK

Penghancur gambar (Image Shredder), adalah program yang direka untuk menulis

semula metadata fail gambar sehingga fail gambar dihancurkan secara kekal sama

seperti penghancur konvensional menjadikan sehelai kertas fizikal tidak dapat

digunakan. Dalam kebanyakan sistem operasi, apabila pengguna memadam fail, fail

tersebut masih ada di dalam simpanan cakera keras tetapi tidak dapat diakses melalui

cara biasa. Yang benar-benar dihapus adalah penunjuk sistem operasi ke fail, jadi tidak

dapat dilihat oleh pengguna tetapi masih ada dalam simpanan. Ruang penyimpanan

untuk fail dianggap tersedia dan itu dapat menyebabkan data ditulis semula, walaupun

tidak mustahil fail itu telah dirosakkan. Dalam perusahaan, memastikan bahawa

maklumat sensitif dalam fail yang dihapus tidak dapat dipulihkan adalah penting untuk

keselamatan maklumat, pematuhan dan tata kelola data. Malangnya, fail itu mungkin

dapat dipulihkan kecuali proses menulis semula dilakukan berkali-kali. Fail yang

dipadam dapat dipulihkan melalui program perisian percuma yang tersedia seperti

Recuva dan Puran File Recovery serta perisian profesional seperti EnCase yang

digunakan oleh pakar pemulihan data dan pegawai penguatkuasa undang-undang.

Namun begitu, penghancur gambar (image shredder) serupa dengan penulis simpanan

cakera keras tetapi hanya boleh digunakan dengan fail gambar individu, dan bukannya

menghilangkan keseluruhan pemacu secara sekaligus. Program melakukan proses

menulis semula kandungan dalam fail gambar berkali-kali dengan angka sifar, bit dan

simbol rawak untuk memastikan bahawa data tidak dapat dipulihkan. Dalam

merealisasikan penyelesaian ini, tulis kaedah pembersihan data sifar dan teknik

mencincang akan digunakan untuk menulis semula data pada peranti penyimpanan

seperti cakera keras untuk mengelakkan semua kaedah pemulihan fail berasaskan

perisian daripada mengangkat maklumat dari pemacu.

Page 8: NUR MUNIRAH BINTI ZAHARI

vi

TABLE OF CONTENTS

PAGE

DECLARATION ........................................................................................................... i

CONFIRMATION ....................................................................................................... ii

DEDICATION ............................................................................................................. iii

ABSTRACT ................................................................................................................. iv

ABSTRAK ...................................................................................................................... v

TABLE OF CONTENTS ........................................................................................... vi

LIST OF TABLES .................................................................................................... viii

LIST OF FIGURES .................................................................................................... ix

LIST OF ABBREVIATIONS/ TERMS/ SYMBOLS ............................................... x

LIST OF APPENDENCIES ....................................................................................... xi

CHAPTER 1 ................................................................................................................. 1

INTRODUCTION ........................................................................................................ 1

1.1 PROJECT BACKGROUND ........................................................................ 1

1.2 PROBLEM STATEMENT ........................................................................... 3

1.3 OBJECTIVE .................................................................................................. 4

1.4 SCOPE ............................................................................................................ 4

1.5 LIMITATION OF WORK ........................................................................... 5

1.6 EXPECTED RESULT .................................................................................. 5

1.7 SUMMARY .................................................................................................... 6

CHAPTER 2 ................................................................................................................. 7

LITERATURE REVIEW ........................................................................................... 7

2.1 INTRODUCTION ......................................................................................... 7

2.2 DATA SANITIZATION ............................................................................... 7

2.3 IMPORTANCE OF IMAGE SHREDDING .............................................. 8

2.4 PREVIOUS RESEARCH ............................................................................. 9

2.5 COMPARISON BETWEEN EXISTING SOFTWARE PROGRAM ... 11

2.6 TECHNIQUE USED TO DISTORT AN IMAGE MEDIA .................... 12

2.6.1 Steganography ...................................................................................... 12

2.6.2 Write Zero ............................................................................................ 13

2.6.3 DoD 5220.22-M ..................................................................................... 14

2.6.4 Gutmann method ................................................................................. 15

Page 9: NUR MUNIRAH BINTI ZAHARI

vii

2.7 LIST CASES OF IMAGE THEFT ............................................................ 16

2.8 SUMMARY .................................................................................................. 21

CHAPTER 3 ............................................................................................................... 22

METHODOLOGY .................................................................................................... 22

3.1 INTRODUCTION ....................................................................................... 22

3.2 SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC) ........................ 23

3.2.1 Phase 1: Planning ................................................................................. 23

3.2.2 Phase 2: Analyzing Information ......................................................... 24

3.2.3 Phase 3: Design ..................................................................................... 24

3.2.4 Phase 4: Implementation ..................................................................... 24

3.3 LOGICAL MODEL .................................................................................... 25

3.3.1 Framework ........................................................................................... 25

3.4 FLOWCHART ............................................................................................ 27

3.5 USE CASE DIAGRAM .............................................................................. 28

3.6 SYSTEM REQUIREMENT ....................................................................... 29

3.6.1 Software Requirement ......................................................................... 29

3.6.2 Hardware Requirement ....................................................................... 30

3.7 PROOF OF CONCEPT (POC) .................................................................. 31

3.8 SUMMARY .................................................................................................. 32

REFERENCES ........................................................................................................... 33

Page 10: NUR MUNIRAH BINTI ZAHARI

viii

LIST OF TABLES

TABLE TITLE PAGE

Table 2.4.1: Previous Research ...................................................................................... 9

Table 2.5.1: A comparison between existing software program.................................. 11

Table 2.7.1: List Cases of Image Theft ........................................................................ 16

Table 3.6.1: Software Requirement ............................................................................. 29

Table 3.6.2: Hardware Requirement ............................................................................ 30

Page 11: NUR MUNIRAH BINTI ZAHARI

ix

LIST OF FIGURES

FIGURE TITLE PAGE

Figure 3.2.1: The proposed project methodology ........................................................ 23

Figure 3.3.1: The image shredder tool framework ...................................................... 25

Figure 3.4.1: The flowchart for image shredder tool ................................................... 27

Figure 3.5.1: The use case diagram for image shredder .............................................. 28

Figure 3.7.1: The Image Shredder Tool interface ........................................................ 32

Page 12: NUR MUNIRAH BINTI ZAHARI

x

LIST OF ABBREVIATIONS/ TERMS/ SYMBOLS

JPEG Joint Photographic Expert Group

PNG Portable Graphics Formats

BMP Bitmap

Etc. Et Cetera

DFT Discrete Fourier Transform

DCT Discrete Cosine Transform

DWT Discrete Wavelet Transform

LSB Least Significant Bit substitution

SDLC Software Development Life Cycle

UML Unified Modeling Language

POC Proof Of Concept

Page 13: NUR MUNIRAH BINTI ZAHARI

xi

LIST OF APPENDENCIES

APPENDIX TITLE PAGE

Page 14: NUR MUNIRAH BINTI ZAHARI

1

CHAPTER 1

INTRODUCTION

1.1 PROJECT BACKGROUND

As vivid as it is, we are in the 21st century where technology has evolved

massively from the post-industrial era to today post-globalization [3]. Gadgets like

smartphones, tablets, and laptop is a must have gadget and considered as one of the

necessities for work, snap a picture and share to social media about life and to

communicate with each other whether you are from rural or urban areas. Therefore, the

potential of hackers to steal someone’s images becomes easier especially when they

hacked into a victim’s social platform or computer and steal their photo to blackmail

them.

Each file in computer contains some basic information about the file metadata.

Metadata is the data that is provides information about other data. There are many types

of metadata exist which may include the title, author, types, size, versions and etc.. It

will make the operating system understands how to work with the file or image in

computer. Furthermore, everyone can easily gather information from the metadata of

the file. The information can be used by operating system as well as other programs [2].

Page 15: NUR MUNIRAH BINTI ZAHARI

2

In order to prevent unauthorized person from stealing the image that has been

deleted, a tool that damage an image media is needed as it is important to ensure the

image is permanently shred. Image media distortion is a process in which the media is

damaged, so that it could not be recovered anymore [4]. The tool distorts the image by

overwriting the metadata header. Even with a single data is overwritten, the image will

be damaged.

Page 16: NUR MUNIRAH BINTI ZAHARI

3

1.2 PROBLEM STATEMENT

In this digital era, users in cyberspace did not aware about the danger of image

theft. If personal photos got stolen, the theft can do horrible things such as blackmailing

or for sexual desire.

When an image media is deleted in a device such as a laptop or a computer, even

deleted in Recycle Bin, it still can be recovered by someone who has advanced computer

knowledge and skill [8]. It is because it just marks that file space as being empty and

not permanently delete the file. Thus, the other file can take its place. Therefore, it

would be easy to recover the file or image [10].

Thus, a tool that can make the image cannot be used is very important to be

developed. This is because there are numerous risks that people might face if a personal

photo is leaked to the wrong hand. Even it can be recovered after it was deleted in

Recycle Bin, the image still cannot be view permanently because it already has been

shredded.

Page 17: NUR MUNIRAH BINTI ZAHARI

4

1.3 OBJECTIVE

i. To identify a suitable method to shred an image.

ii. To develop an image shredder tool by permanently shredded the image for

security reasons.

iii. To analyze the performance of the Write Zero method for the image shredder

tool.

1.4 SCOPE

This proposed project is to shred any images from being recovered by an

unauthorized person. This consists of medium users, which is the person who wants to

shred their image permanently in a reliable way. For the system scope, the tool is only

for image media. Moreover, it also can be used for various types of image media files

such as .jpeg, .png, .bmp, etc.. Furthermore, security acts as an important role that will

make the image permanently cannot be seen by any third parties.

Page 18: NUR MUNIRAH BINTI ZAHARI

5

1.5 LIMITATION OF WORK

In order to implement this project, a few constraints have been identified:

i. Only one image can be shred at one time.

ii. Image that has been shredded does not reload automatically.

1.6 EXPECTED RESULT

The expected results of this project are as follows:

i. Successful develop by using SharpDevelop.

ii. Image can be shred successfully.

iii. The image that has been shred cannot be view permanently.

Page 19: NUR MUNIRAH BINTI ZAHARI

6

1.7 SUMMARY

This chapter describes a few topics that should be included in the introduction of

the project such as project background, problem statements, objectives, the scope of the

project, limitation of work, and expected result. The purpose of this project is to

overcome the problem that occurs in our daily life. Thus, it helps to organize better

documentation of the project.

Page 20: NUR MUNIRAH BINTI ZAHARI

7

CHAPTER 2

LITERATURE REVIEW

2.1 INTRODUCTION

This chapter provides an overview on what is image distortion. The next section

discusses about the importance of image shredding, previous research, comparison

between existing software programs, and followed by a discussion on the technique

used to protect an image and their weaknesses. Lastly, it will discuss about the list cases

of image theft.

2.2 DATA SANITIZATION

According to Tim Fisher (2019), data sanitization technique is the common way

that a data destruction program or file shredder overwrites data on a hard drive or other

storage devices. Data sanitization methods are also referred to as methods used for data

erasure, methods of data wipe, wipe algorithms, and data wipe standards. Most of the

data destruction programs support numerous data sanitization methods [6].

Page 21: NUR MUNIRAH BINTI ZAHARI

8

2.3 IMPORTANCE OF IMAGE SHREDDING

In this digital era, users in cyberspace are lack of awareness about image security

(Madhu et al., 2016). Nowadays, various people utilize distinctive applications to image

data transfer [1]. Most people used their own images for various kinds of social media

platforms, such as on Instagram and Facebook. Hackers might attack on these social

media or victim’s computer by copying their victim’s image, then, hackers can extract

some important information such as an address, phone number, etc.. For better usage of

these applications, the protection against the hacking attacks on those webs are

available, and there are existing distinctive data security framework for multimedia

data. The existing security frameworks are either using encryption or steganography, or

both. The image security is necessary, so there is a diverse securable image encryption

that can be especially protect against unauthorized access. The commonly used security

mechanisms are Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT),

Discrete Wavelet Transform (DWT), etc.. The transfer of the image over the unsecured

network will pose the following attacks such as active and passive attacks. An active

attack may cause a few data stream modification or false data stream creation. While

passive attacks will use the data but may not affect the system resources.

As quoted by lifewire.com, the regular delete operation in the average operating

system simply isn't sufficient for securely erasing files, since it just marks that file space

as being empty, so that another file can take its place. No file recovery program would

have a problem resurrecting the file [10].

Page 22: NUR MUNIRAH BINTI ZAHARI

9

2.4 PREVIOUS RESEARCH

Table 2.4.1: Previous Research

Author Title Description Method/ Algorithm

Farah, Hidayah,

Kamarudin

(2018)

E-Raser: File

Shredder

Application with

Content

Replacement By

Using Random

Words Function

Generate random data

for overwriting and add

on a new method which

is replacing the original

content of the file with

new content.

Gutmann,

DoD 5220.22-M,

Etc.

Nan, Jiwu, Peng

(2011)

Cloud Shredder:

Removing the

Laptop On-Road

Data Disclosure

Threat in the

Cloud

Computing Era

Remove the threat from

the evolving state of

ubiquitous internet

connectivity and cloud

computing.

XOR-method,

Ratio method

Fawzi, Siddeeq,

Asaad

(2006)

Destroying

Steganography

Content in Image

Files

Information is removed

partially or completely,

depending on the type

of embedding and

information contained

in the cover image.

Least Significant Bit

substitution (LSB),

Threshold-Based

Correlation,

Etc.

Page 23: NUR MUNIRAH BINTI ZAHARI

10

According to (Farah et al., 2018), data shredding is a process of irreversible data

destruction, while the file shredder is a software designed to turn computer-based files

unreadable by applying overwriting methods to permanently erase data in the contents

of a file. After the rewrite phase is done, the shredding process takes place to make the

file unrecoverable [5].

According to (Zhang et al., 2011), cloud shredder is a generic and transparent

security service that allows legitimate users access the files in exactly the same way as

they do with commodity file systems, while the attackers only get the useless junk even

though they have obtained every byte on the hard drive [15].

According to (Naima et al., 2006), computer simulations were applied to some

stego image files using a wavelet-based denoising algorithm. By applying wavelet

denoising, it will destroy the stego information as it becomes noise added to the original

picture [13].

Page 24: NUR MUNIRAH BINTI ZAHARI

11

2.5 COMPARISON BETWEEN EXISTING SOFTWARE PROGRAM

Table 2.5.1: A comparison between existing software program

Software Programs Method/Technique Advantages Disadvantages

Remo File Eraser

DoD 5220.22-M

Random Data

Etc.

Easy to use

Can remove multiple

files and folders at

once

Only can choose 3

from the free version

Can’t create more

than one schedule

BitKiller

DoD 5220.22-M

Gutmann

Random Data

Etc.

Super simple

portable file shredder

Supports specific

files

Unable to click

cancel whenever

start

Hardwipe

DoD 5220.22-M

Gutmann

Random Data

Support a variety of

data sanitization

methods

Difficult to use

Can only shred one

folder at a time

Eraser

DoD 5220.22-M

Gutmann

Supports any drive

that works with

Windows

Allow user to specify

file target

Need to pay for

premium to get the

best option

Page 25: NUR MUNIRAH BINTI ZAHARI

12

2.6 TECHNIQUE USED TO DISTORT AN IMAGE MEDIA

These methods that listed here are more to sanitize file or hard disk but still can

be implemented in image distortion tools. There are many more methods out here, but

these are the ones most likely to be used by most data shredding program available on

the internet. The method mention below is useful but there is still some weakness need

to be addressed.

2.6.1 Steganography

Steganography is the method of covering up the fact that communication

occurs by hiding information in other information. There are a lot of different

carrier data formats that can be used, but digital images are the most famous

because of their frequency on the Internet. To hide secret information in images,

there are a large variety of steganography techniques available to conceal hidden

details in images, which are more complicated than others and all have their

respective strength and weak points. Different applications have different

requirements for the steganography technique used (Morkel et al., 2006) [11].

Although the Steganography technique can distort an image media and can be

used for this project, there are still some problems regarding the technique. Even

this technique distorts an image by completely changing the image, the main

structure of the original image is still there. Plus, this technique is more complex to

be implemented than the shredding method [12].

Page 26: NUR MUNIRAH BINTI ZAHARI

13

2.6.2 Write Zero

Write Zero Data Sanitization Method does not prohibit the most advanced

hardware-based recovery methods from extracting at least some of the deleted data,

but it is possible that all software-based file recovery techniques will be prevented

from retrieving data from the drive (Fisher, 2016) [7].

The Write Zero data sanitization method is implemented throughout the

process in the following way:

Pass 1: Writes a Zero

Write Zero only use one character to overwrite data in the disk. It is enough to

sanitize the file in a disk but not really efficient because if only a single write pass

is done, and the software does not verify that every piece of data has been erased,

then the method is not going to be as effective as methods that do [7].

As quoted in an article titled What Is the Write Zero Method? by lifewire.com,

if you use Write Zero on one drive and it verifies that all the data has been

overwritten, then you can be confident that the information is less likely to be

recovered than if the same data were overwritten with the Random Data method

but did not verify that each sector was replaced with random characters [7].

Page 27: NUR MUNIRAH BINTI ZAHARI

14

2.6.3 DoD 5220.22-M

The DoD 5220.22-M is a software-data sanitization method utilized in various

file shredder and data destruction programs to overwrite current data on a hard drive

or other storage devices (Fisher,2016) [9].

The DoD 5220.22-M data sanitization method is typically implemented in the

following way:

Pass 1: Writes zero and verifies the write.

Pass 2: Writes one and verifies the write.

Pass 3: Writes a random character and then verifies the write.

DoD 5220.22-M is an efficient way to sanitize data but there is too much phase

in overwriting data. This method might take some time to finish the process for a

single file if the file size is big [9].

As quoted by lifewire.com in an article titled DoD 5220.22-M Data Wipe

Method [US DOD Wipe Standard], if you have a really large hard drive, Write Zero

will take much less time to finish than DoD 5220.22-M, which can be much quicker

than one like Gutmann which could run through over 30 passes [9].

Page 28: NUR MUNIRAH BINTI ZAHARI

15

2.6.4 Gutmann method

In 1996, Peter Gutmann developed The Gutmann method. It is one of the

sanitization methods to shred files and destruct datas. This method also overwrites

the existing data on a hard disk or any other storage device (Fisher, 2016) [10].

The Gutmann data sanitization method is often implemented in the following way:

Pass 1-35: Writes a random character. But then uses a complex pattern of

overwriting from Pass 5 to 31.

Gutmann method was developed in the late 1900s which made this method

would not be compatible with the latest hard drives or in other words as this method

is outdated [10].

As quoted by lifewire.com, the hard drives that was used at that time use

different encoding methods than the one that we use today, so most of the passes

the Gutmann method performs are completely useless for modern hard drives. This

method has been acknowledged by Gutmann himself to be overkill on modern

drives since hard drive technology has changed too much since it was originally

developed [10].

Page 29: NUR MUNIRAH BINTI ZAHARI

16

2.7 LIST CASES OF IMAGE THEFT

Table 2.7.1: List Cases of Image Theft

HEADLINE DATE DESCRIPTION BREACHING METHOD LINKS

NBN tradie caught

stealing naked photos

from clients phones

January 15,

2018

A Sydney technician who stole

pornographic images from

several women's phones while

linking their homes to the NBN

has been spared time behind

bars. He 25-year-old sent

himself more than 80 images -

some naked, some topless, and

others with lingerie - and a

video of a sexual act from four

women's phones while working

as an NBN subcontractor in

2017.

Stole pornographic images from

several women's phones when

linking their homes to the NBN.

The technician is stealing

intimate images from several

women’s phones when linking

their homes to the NBN network.

https://www.smh.com.au/

national/nsw/nbn-tradie-

caught-stealing-naked-

photos-from-clients-

phones-20180115-

h0iht3.html

Page 30: NUR MUNIRAH BINTI ZAHARI

17

Cable Guy Accused of

Stealing Woman's

Photos During Work

Detail

July 27,

2018

A man identified by the

authorities as a cable TV

technician is facing 10 counts of

having committed a computer

crime for allegedly finding and

sending images to a woman

while working in depth. Obed

Siawor, 27, from East Hartford,

was also convicted with second-

degree robbery, according to

court documents.

The offender sneaking into the

victim’s computer, getting past

the victim’s password, and opens

a file containing images of the

victim, some partially revealing.

https://patch.com/connect

icut/manchester/cable-

guy-accused-stealing-

womans-photos-during-

work-detail

Two men jailed for

hacking girls’ iCloud

accounts, stealing

nude pictures

August 8,

2018

‘More than 30,000 photos and

videos are categorised by name

and town, with links to the

victims’ social media accounts,’

RTL said at the time. ‘In a

The hackers hacking victims’

websites and stealing photos and

videos. The offender also

blackmails their victims.

https://www.dutchnews.n

l/news/2018/08/two-

men-jailed-for-hacking-

girls-icloud-accounts-

stealing-nude-pics/

Page 31: NUR MUNIRAH BINTI ZAHARI

18

chatroom, naked photos of

women that are called “wins”

by the boys are named and

exchanged like a huge

collection of Pokémon cards.

On request, girls are hacked to

steal explicit photos and

videos.’ The two men sentenced

on Wednesday, 32 years old

Djuri V from Culemborg and

36-year-old Gary de V from

Groningen had hacked

hundreds of iCloud accounts by

guessing passwords and finding

out answers to security

questions, the court was told.

Page 32: NUR MUNIRAH BINTI ZAHARI

19

Yahoo worker hacked

user accounts to steal

photos of ‘younger

woman’

October 1,

2019

A former Yahoo software

engineer on Monday pleaded

guilty to hacking the accounts

of thousands of Yahoo users in

search of pornographic photos

and video recordings of young

women and co-workers, the

federal authorities said. Reyes

Daniel Ruiz, 34, of Tracy,

California, lodged a data

hacking complaint for using his

job to hack the passwords about

6,000 Yahoo accounts, mainly

younger women, according to

the U.S. Attorney’s office in the

Northern District of California.

Hacking into the account

thousands of Yahoo! users.

https://nypost`.com/2019/

10/01/former-yahoo-

worker-hacked-user-

accounts-to-steal-sexual-

photos/

Page 33: NUR MUNIRAH BINTI ZAHARI

20

Ruiz, who also threatened his

friends and colleagues, made

backups of personal photos and

videos, then saved the content

on his home computer.

Page 34: NUR MUNIRAH BINTI ZAHARI

21

2.8 SUMMARY

This chapter describes a few topics that should be included in the literature review

of the project such as introduction, what is image shredding, importance of image

shredding, previous research, comparison between existing software program,

technique used to distort an image media, and list of cases. The existing techniques or

approach that has been used by other researcher to perform the shredder project has

been analyzed. Besides that, ideas from the previous research can used to support the

proposed approach.

Page 35: NUR MUNIRAH BINTI ZAHARI

22

CHAPTER 3

METHODOLOGY

3.1 INTRODUCTION

The methodology is a set of activities that are carried out on the basis of specific

principles, rules, disciplines, or procedures to complete the project. This is an important

phase in project development. The approach used to organise, schedule and monitor the

process of creating an information system is used in the implementation of projects.

There are various model methodologies that can be used in developing the system or

project such as framework, use-case diagram, and flowchart as a logical model. Each

model has its own advantages and disadvantages. So, in the development methodology

of this project, it discusses the approach used to design the tools, including the

development stages, the reason for the choice of methodology, and system requirements

in terms of software and hardware. The approach must be chosen wisely so that it can

help in the development of the project. It is an important step of development since it

will guide other researchers through the project development. By implementing the

methodology, it can ensure an exact process and increases the probability of achieving

the desirable final product.

Page 36: NUR MUNIRAH BINTI ZAHARI

23

Figure 3.2.1: The proposed project methodology

3.2 SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)

The figure below shows the Software Development Life Cycle (SDLC) model

that has been chosen to develop the project. There are four phases in this methodology

to meet the project objectives and requirements. The proposed project method should

be the guideline to ensure the project are successful. Figure 3.2.1 shows the proposed

method for this project proposal.

3.2.1 Phase 1: Planning

The planning phase is the first phase in this method that needs to be identified

in terms of knowledge related to computer science. In this phase, determining the

problem statement of this project will discover the solution to overcome those

problems. Furthermore, discussing a suitable title and writing down all the

descriptions and new ideas about the project with the supervisor. After the

discussion, a suitable project and title finally has been decided. Image Shredder

Tool has become the suitable project that will cover all the problem statement that

are related.

PlanningAnalyzing

InformationDesign Implementation

Page 37: NUR MUNIRAH BINTI ZAHARI

24

3.2.2 Phase 2: Analyzing Information

In this phase, related data and information is gathered from multiple sources

such as research paper, article, and etc.. Moreover, objectives and scope is decided

based on the problem statement mention earlier. Based on the information gathered

in the Literature Review, and the suitable method is chosen.

3.2.3 Phase 3: Design

The information gained during the previous stage is analyzed and an effective

implementation is formulated. Designing phase is a phase where the process of

planning and problem solving through software solution. In this phase, the image

shredder is divided into a flowchart, use case diagram, and interface of the image

shredder tool.

3.2.4 Phase 4: Implementation

After the design phase is done, then the implementation phase will be carried

out. The implementation phase will mainly involve in coding. In this project,

SharpDevelop software is used to write down all the code in C#. This software will

carry out the result of shredding images by implementing the write zero methods.

Page 38: NUR MUNIRAH BINTI ZAHARI

25

3.3 LOGICAL MODEL

Usually, this logical model will be used in the planning, analysis, and design

phases. The logical model is also illustrated in image-based to represent somethings

from input and output. The process of shredding images will help the user to analyze

the performance and effectiveness of the Write Zero method.

3.3.1 Framework

FAILED

PASS

Browse

and select

image

Click start

shredding

to sanitize

the image

Overwrite the

image by using

Write Zero method

Reset

Image

Image

corrupted

Process

failed

USER

Figure 3.3.1: The image shredder tool framework

Page 39: NUR MUNIRAH BINTI ZAHARI

26

A framework is often a layered structure showing what kind of programme it

should construct and how it will interrelate. It may be a set of functions within a system

and they interrelate with each other, and much more. A framework is generally more

comprehensive than a protocol and more prescriptive than structure [14].

Based on figure 3.3.1, the flow of image shredding by overwrite the metadata

header in the image. It illustrates how the tool works by implementing the Write Zero

method to shred an image permanently. First and foremost, the user needs to click on

the browse button to view their image in the user folder and select or choose the image

that wants to be shredded by the user.

Furthermore, the user can view the image that has been chosen in the picture box.

If the image that has been chosen is wrong, then the user can click on the reset button

and pick another image by browsing through the folder again. When the user chooses

the right picture, then the user can click on the start shred button to shred their image.

After clicking on the start shred button, it will automatically overwrite the image

metadata by using the Write Zero method. Lastly, after the image has been overwrite

the metadata, the user can view the image has been corrupted at the image file location.

If the image are successful shred, then the image are permanently shredded, but if the

image are not successful, then the process is failed.

Page 40: NUR MUNIRAH BINTI ZAHARI

27

NO

YES

YES NO

YES

NO

Figure 3.4.1: The flowchart for image shredder tool

3.4 FLOWCHART

START

Browse and select the

image that want to be

shredded

Image corrupted

END

Do you want

to Reset?

Did it

work?

Process failed

Do you want

to proceed?

Start shredding

Click start

shredding

Page 41: NUR MUNIRAH BINTI ZAHARI

28

Figure 3.5.1: The use case diagram for image shredder

General User

Image Shredder Tool

3.5 USE CASE DIAGRAM

A use case diagram is a dynamic or behaviour diagram in Unified Modeling

Language (UML). Use case diagrams model the function of the software using the

actors and use cases. Use cases is a set of actions, services, and functions that the system

requires to execute. Use case diagram consists of four components includes boundary,

the actor, the use cases, and the relationship between actor and use case. Use case

diagrams are used to compile system requirements, both internal and external factors.

This specification are often requirements for design. Thus, when a system is examined

to collect its functionalities, use cases are prepared for use and actors are identified.

Browse image

Select image

Start shred

Reset image

Page 42: NUR MUNIRAH BINTI ZAHARI

29

3.6 SYSTEM REQUIREMENT

This section will show the list all software and hardware that involve in the

development process.

3.6.1 Software Requirement

Software requirement for this project are:

Table 3.6.1: Software Requirement

SOFTWARE DESCRIPTION

SharpDevelop 5.1 To write the coding

To develop the Image Shredder

Tool

To run the coding

Google chrome To search the article

To search about the project

Microsoft Word 2016 To write the report

Email To email supervisor the project

progress report

Page 43: NUR MUNIRAH BINTI ZAHARI

30

3.6.2 Hardware Requirement

Hardware requirement for this project are:

Table 3.6.2: Hardware Requirement

HARDWARE DESCRIPTION

Laptop AMD A10

RAM: 4GB

OS: Windows 10

Use to develop the project

Hard disk To back up the data of the project

Pendrive To back up the data of the project

Page 44: NUR MUNIRAH BINTI ZAHARI

31

3.7 PROOF OF CONCEPT (POC)

The figure 3.7.1 below show the interface of image shredder tool. It consists of

three button which are browse image, start shredding and reset button. Whenever user

click on the browse image, user can view the image that user wants to select. The user

can choose the image media in all folder. After the user choose an image, it will show

up in the picture box to make sure user are not selecting the wrong image. Moreover,

user can see the location of the file that user select before on the textbox below the

picture box.

Furthermore, when user click on the start shredding button, the tools will notify

the users by popup the message box displaying whether the users want to proceed

shredding the image media or not. This function is made to make sure that users will

not accidentally shred the wrong image media.

Apart from that, users also will be given the reset button. It is because if user

accidentally selected the wrong image, they can see the image at the picture box. So, if

there is some mistake, user can just simply select on the reset button. Other than that,

user also can click on the reset button whenever the image had successful shredded by

the tool. When user click on the image after the image has been shredded, the picture

box will display nothing and user can pick another photo to shred the image again.

Last but not least, user will see the progress bar below the text box which display

the image location. Progress bar will run after the start shredding button confirmation

is click by the user. When the progress bar is full, user can manually go to the file

Page 45: NUR MUNIRAH BINTI ZAHARI

32

Figure 3.7.1: The Image Shredder Tool interface

location that has been selected by the user to see whether the image has been

successfully shredded.

3.8 SUMMARY

This chapter discuss the methodology is selected to implement the image shredder

tool. Methodology is very important in system and application development. There are

lots of different software development methodologies that are available and can be used

to develop any kind of application. All of the activities in each phase in methodology

are explained in detail. Every phase of the tool development is based on the project

methodology described before. Lastly, the details of software and hardware

specification also listed in this chapter.

Page 46: NUR MUNIRAH BINTI ZAHARI

33

REFERENCES

[1] B., Madhu, Holi, G., Holi & , S., Murthy. (2016). An Overview of Image Security

Techniques. International Journal of Computer Applications, 37-46.

[2] Chapple, M. (04 January, 2020). What Is Metadata? Retrieved from Lifewire:

https://www.lifewire.com/metadata-definition-and-examples-1019177

[3] Colombo. (2020). The Technology Revolution and the Restructuring of the Global

Economy. In Globalization of Technology: International Perspectives (pp. 23-31).

Washington: The National Academics of Science Engineering Medicine.

[4] Diéguez, J. (2017). Distortion. Retrieved from Macmillan Dictionary Blog:

https://www.macmillandictionaryblog.com/distortion

[5] Farah, N., Hidayah, R., & Kamarudin, M. (2018). E-Raser: File Shredder

Application With Content Replacement By. INTERNATIONAL JOURNAL ON

INFORMATICS VISUALIZATION, 313-317. Retrieved from

http://joiv.org/index.php/joiv/article/view/175/163

[6] Fisher, T. (01 November, 2019). Data Sanitization Methods. Retrieved from

Lifewire: https://www.lifewire.com/data-sanitization-methods-2626133

[7] Fisher, T. (23 October, 2019). What Is the Write Zero Method? Retrieved from

Lifewire: https://www.lifewire.com/what-is-the-write-zero-method-2626052

[8] Fisher, T. (13 November, 2020). 38 Best Free Data Destruction Software

Programs. Retrieved from Lifewire: https://www.lifewire.com/free-data-

destruction-software-programs-2626174

Page 47: NUR MUNIRAH BINTI ZAHARI

34

[9] Fisher, T. (29 March, 2020). DoD 5220.22-M Data Wipe Method [US DOD Wipe

Standard]. Retrieved from Lifewire: https://www.lifewire.com/dod-5220-22-m-

2625856

[10] Fisher, T. (28 January, 2020). Is the Gutmann Method a Good Way to Erase

Data? Retrieved from Lifewire: https://www.lifewire.com/gutmann-method-

2625891

[11] Morkel T., Eloff J. H., & Olivier M. S. (2006). Using Image Steganography for

Decryptor Distribution. On the Move to Meaningful Internet Systems 2006: OTM

2006 Workshops, 322-330.

[12] Mureed, &. M. (2013). A Survey of Image Steganography Techniques.

International Journal of Advance Science and Technology, Vol 54.

[13] Naima, F., Ameen, S., & Alsaad, A. (2006). Destroying Steganography Content

in Image Files. Retrieved from

https://www.researchgate.net/publication/267369380_Destroying_Steganography

_Content_in_Image_Files

[14] Rouse, M. (August, 2020). Techtarget Network. Retrieved from

https://whatis.techtarget.com/definition/framework

[15] Zhang, N., Jing, J., & Liu, P. (2011). CLOUD SHREDDER: Removing the

Laptop On-Road Data Disclosure Threat in the Cloud Computing Era.

International Joint Conference of IEEE TrustCom, 1592-2599.