sak 4801 introduction to computer forensics chapter 7 image files forensics mohd taufik abdullah...

78
SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science and Information Technology University Putra of Malaysia Room No: 2.28 Portions of the material courtesy Nelson et. al., and EC-Council

Upload: mervyn-lucas

Post on 15-Jan-2016

261 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

SAK 4801 INTRODUCTION TO COMPUTER FORENSICSChapter 7 Image Files Forensics

Mohd Taufik AbdullahDepartment of Computer Science

Faculty of Computer Science and Information TechnologyUniversity Putra of Malaysia

Room No: 2.28

Portions of the material courtesy Nelson et. al., and EC-Council

Page 2: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

2 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Learning ObjectivesAt the end of this chapter, you will be

able to: Describe types of graphics file formats Explain types of data compression Explain how to locate and recover graphics files Describe how to identify unknown file formats Explain copyright issues with graphics

Page 3: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

3 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Chapter 7 Outline 7. Image File Forensics

7.1. Introduction 7.2. Recognize image files 7.3. Understand data Compression 7.4. Locate and recover image files 7.5. Analyze image file header 7.6. Reconstructing file fragments

Page 4: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.1 Introduction

Page 5: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

5 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.1 Introduction Image file formats can be:

A black and white Image A grayscale Image A color image Indexed Color image

All image formats differ between ease of use, size of the file, and the quality of reproduction

Page 6: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.2 Recognize Image Files

Page 7: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2 Recognize Image Files Contains digital photographs, line art, three-

dimensional images, and scanned replicas of printed pictures Pixels: All small dots used to create images Bitmap images:

collection of dots A representation of a graphics image a grid-

type format Vector graphics: based on mathematical

instructions/equations Metafile graphics: combination of bitmap and

vector images Types of programs

Graphics editors Image viewers

Page 8: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

8 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2 Recognize Image Files (Cont.) The circled area

in this screen shot shows the resolution of the screen by pixels

Page 9: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

9 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.1 Understanding Bitmap and Vector Images Bitmap images

Grids of individual pixels Bitmap images can be made in the following

applications: Photoshop MS Paint Image Ready Paintshop Pro

Continuous tone photos Raster images

Pixels are stored in rows Better for printing

Page 10: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

10 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.1 Understanding Bitmap and Vector Images (Cont.) Vector Images

Uses geometric equations Higher quality image than a bitmap Useful for rendering types and shapes Characteristics

Lines instead of dots Store only the calculations for drawing lines and

shapes Smaller size Preserve quality when image is enlarged

CorelDraw, Adobe Illustrator Image quality

Screen resolution Software Number of color bits used per pixel

Page 11: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

11 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.2 Understanding Metafile Graphics Metafiles combine raster and vector graphics. Metafiles have similar features of both bitmap and

vector images. When metafiles are enlarged it results in a loss of

resolution giving the image a shady appearance. Example

Scanned photo (bitmap) with text (vector) Share advantages and disadvantages of both types

When enlarged, bitmap part loses quality

Page 12: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

12 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.3 Understanding Image File Formats Standard bitmap file formats

Graphic Interchange Format (.gif) Joint Photographic Experts Group (.jpeg, .jpg) Tagged Image File Format (.tiff, .tif) Window Bitmap (.bmp) JPEG 2000 (.jp2) Portable Network Graphics (.png)

Standard vector file formats Hewlett Packard Graphics Language (.hpgl) Autocad (.dxf)

Page 13: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

13 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.3 Understanding Image File Formats (Cont.) Nonstandard graphics file formats

Targa (.tga) Raster Transfer Language (.rtl) Adobe Photoshop (.psd) and Illustrator (.ai) Freehand (.fh9) Scalable Vector Graphics (.svg) Paintbrush (.pcx)

Search the Web for software to manipulate unknown image formats

Page 14: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

14 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats Witnesses or suspects can create their own digital

photos Examining the raw file format

Raw file format Referred to as a digital negative Typically found on many higher-end digital

cameras Sensors in the digital camera simply record pixels

on the camera’s memory card Raw format maintains the best picture quality

Page 15: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

15 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.) Examining the raw file format (continued)

The biggest disadvantage is that it’s proprietary And not all image viewers can display these

formats The process of converting raw picture data to

another format is referred to as demosaicing Examining the Exchangeable Image File format

Exchangeable Image File (EXIF) format Commonly used to store digital pictures Developed by JEIDA as a standard for storing

metadata in JPEG and TIFF files

Page 16: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

16 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.) Examining the Exchangeable Image File format

(continued) EXIF format collects metadata

Investigators can learn more about the type of digital camera and the environment in which pictures were taken

EXIF file stores metadata at the beginning of the file

With tools such as ProDiscover and Exif Reader You can extract metadata as evidence for your

case

Page 17: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

17 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.)

Page 18: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

18 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.)

Page 19: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

19 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.)

Page 20: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

20 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.4 Understanding Digital Camera File Formats (Cont.)

Page 21: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

21 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.2.5 File Types Different types of files

Graphics file format – .gif/.jpg/.jpeg/.jfif Text file format – .txt/.htm/.html Audio file format – .au/.uLaw/.MuLaw/.aiff

– .mp3/.ra/.wav/.wma Video file format

– .avi/.mov/.movie/.mpg/.mpeg/.qt/.ram Document file format – .doc/.pdf/.ps Compress file format – .z/.zip/.sit/.gzip/.gz

Data compression: is done by using a complex algorithm used to reduce the size of a file

Vector quantization: A form of vector image that uses an algorithm similar to rounding up decimal values to eliminate unnecessary data

Page 22: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.3 Understand Data Compression

Page 23: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

23 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.3 Understand Data Compression Some image formats compress their data

GIF, JPEG, PNG Others, like BMP, do not compress their data

Use data compression tools for those formats Data compression

Coding of data from a larger to a smaller form Types

Lossless compression and lossy compression

Page 24: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

24 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.3.1 Understanding Lossless and Lossy Compression GIF and PNG image file formats reduce the file size

by using lossless compression Lossless compression

Reduces file size without removing data Based on Huffman or Lempel-Ziv-Welch coding For redundant bits of data Utilities: WinZip, PKZip, StuffIt, and FreeZip

Lossy compression Permanently discards bits of information Vector quantization (VQ)

Determines what data to discard based on vectors in the graphics file

Utility: Lzip

Page 25: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.4 Locate and Recover Images Files

Page 26: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

26 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4 Locate and Recover Image Files Operating system tools

Time consuming Results are difficult to verify

Computer forensics tools Image headers

Compare them with good header samples Use header information to create a baseline

analysis Reconstruct fragmented image files

Identify data patterns and modified headers

Page 27: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

27 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.1 Identifying Graphics File Fragments Carving or salvaging

Recovering all file fragments Carving: The process of removing an item from a

group of items Salvaging: Another term for carving. It is the

process of removing an item from a group of them Computer forensics tools

Carve from slack and free space Help identify image files fragments and put them

together

Page 28: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

28 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.1 Identifying Graphics File Fragments (Cont.)The screenshot above shows the location of the

clusters where the data has been found and the data found with the matching search.

Page 29: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

29 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.2 Repairing Damaged Headers Use good header samples

Each image file has a unique file headerJPEG: FF D8 FF E0 00 10

Most JPEG files also include JFIF string Exercise:

Investigate a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS)

Page 30: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

30 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space

Page 31: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

31 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 32: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

32 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space(Cont.) Steps

Planning your examination Searching for and recovering digital photograph

evidence Use ProDiscover to search for and extract

(recover) possible evidence of JPEG files False hits are referred to as false positives

Page 33: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

33 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 34: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

34 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 35: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

35 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 36: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

36 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 37: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

37 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 38: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

38 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.3 Searching for and Carving Data from Unallocated Space (Cont.)

Page 39: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

39 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.) Try to open the file first and follow steps if you can’t

see its content Steps

Recover more pieces of file if needed Examine file header

Compare with a good header sample Manually insert correct hexadecimal values

Test corrected file

Page 40: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

40 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 41: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

41 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 42: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

42 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 43: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

43 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 44: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

44 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 45: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

45 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.4.4 Rebuilding File Headers (Cont.)

Page 46: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.5 Analyze Image Files Headers

Page 47: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

47 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Necessary when you find files your tools do not recognize

Use hex editor such as Hex Workshop Record hexadecimal values on header

Use good header samples

7.5 Analyze Image File Headers

Page 48: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

48 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.5 Analyze Image File Headers (Cont.)

Page 49: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

49 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.5 Analyze Image File Headers (Cont.)

Page 50: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

7.6 Reconstructing File Fragments

Page 51: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

51 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Locate the starting and ending clusters For each fragmented group of clusters in the file

Steps Locate and export all clusters of the fragmented

file Determine the starting and ending cluster

numbers for each fragmented group of clusters Copy each fragmented group of clusters in their

proper sequence to a recovery file Rebuild the corrupted file’s header to make it

readable in a graphics viewer

7.6 Reconstructing File Fragments

Page 52: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

52 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 53: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

53 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 54: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

54 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 55: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

55 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 56: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

56 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Remember to save the updated recovered data with a .jpg extension

Sometimes suspects intentionally corrupt cluster links in a disk’s FAT Bad clusters appear with a zero value on a disk

editor

7.6 Reconstructing File Fragments (Cont.)

Page 57: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

57 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 58: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

58 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6 Reconstructing File Fragments (Cont.)

Page 59: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

59 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.1 Identifying Unknown File Formats The Internet is the best source

Search engines like Google Find explanations and viewers

Popular Web sites www.digitek-asi.com/file_formats.html www.wotsit.org http://whatis.techtarget.com

Page 60: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

60 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.2 Tools For Viewing Images Use several viewers

ThumbsPlus ACDSee QuickView IrfanView

GUI forensics tools include image viewers ProDiscover EnCase FTK X-Ways Forensics iLook

Page 61: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

61 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography Steganography hides information inside image

files Ancient technique Can hide only certain amount of information

Insertion Hidden data is not displayed when viewing

host file in its associated program You need to analyze the data structure

carefully Example: Web page

Page 62: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

62 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.)

Page 63: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

63 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.)

Page 64: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

64 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.) Substitution

Replaces bits of the host file with bits of data

Usually change the last two LSBs Detected with steganalysis tools

Usually used with image files Audio and video options

Hard to detect

Page 65: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

65 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.) Two files need to hide a message within an image

file The file containing the image into which the

message is supposed to be put in The file containing the message itself

There are 3 methods to hide messages in images, they include: Least Significant Bit Filtering and Masking Algorithms and Transformation aa

Page 66: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

66 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.)

Page 67: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

67 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

7.6.3 Understanding Steganography (Cont.)

Page 68: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

68 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Detect variations of the graphic image When applied correctly you cannot detect hidden

data in most cases Methods

Compare suspect file to good or bad image versions

Mathematical calculations verify size and palette color

Compare hash values

7.6.4 Using Steganalysis Tools

Page 69: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

69 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Hex Workshop

The Hex Workshop application can detect and write messages on to a file

Investigators use the Hex Workshop tool to reconstruct damaged file headers

7.6.4 Using Steganalysis Tools (Cont.)

Page 70: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

70 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Hex Workshop

AS-Tools can hide and detect files hidden in BMP, GIF and WAV files

Investigators have the advantage of multi-threaded operation

Investigators can hide/reveal operations simultaneously without fear of interference to the work environment

7.6.4 Using Steganalysis Tools (Cont.)

Page 71: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

71 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Steganography originally incorporated watermarks

Copyright laws for Internet are not clear There is no international copyright

law Check www.copyright.gov

7.6.3 Identifying Copyright Issues with Graphics

Page 72: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

72 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Section 106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to authorize others to do the following: To perform the work publicly To display the copyright work publicly In the case of sound recordings, to perform the

work publicly by means of a digital audio transmission

To reproduce the work in copies or phonorecords – To prepare derivative works based upon the work

To distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending

7.6.3 Identifying Copyright Issues with Graphics (Cont.)

Page 73: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

73 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Copyrightable works include the following: Literary works Musical works; including any accompanying words Dramatic works; including any accompanying music Pantomimes and choreographic works Pictorial, graphic, and sculptural works. Motion pictures and other audiovisual works. Sound recordings Architectural works

7.6.3 Identifying Copyright Issues with Graphics (Cont.)

Page 74: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

74 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Summary Image types

Bitmap Vector Metafile

Image quality depends on various factors Image formats

Standard Nonstandard

Digital camera photos are typically in raw and EXIF JPEG formats

Page 75: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

75 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Summary (Cont.) Some image formats compress their data

Lossless compression Lossy compression

Recovering image files Carving file fragments Rebuilding image headers

Software Image editors Image viewers

Page 76: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

76 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Summary (Cont.) Some image formats compress their data

Lossless compression Lossy compression

Recovering image files Carving file fragments Rebuilding image headers

Software Image editors Image viewers

Page 77: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

77 Chapter 7 Image Files Forensics SAK4801 Introduction to Computer Forensics

Summary (Cont.) Steganography

Hides information inside image files Forms

Insertion Substitution

Steganalysis Finds whether image files hide information

Page 78: SAK 4801 INTRODUCTION TO COMPUTER FORENSICS Chapter 7 Image Files Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science

End of Chapter 7