Forensics Journal - Stevenson University 2013 | Page 32

FORENSICS JOURNAL Another benefit to a carrier file with a significantly larger size is that once the file size increases due to the payload, the new size won’t be as noticeable. ematical method of determining the authenticity of a digital message or document. All software has its own unique digital signature therefore a forensics tool performing a signature scan may be able to detect the carrier files if the signature list is current. In addition to signature detection, some programs can detect steganography, although doing so is difficult. The first step in detection is to locate files with hidden text, which can be done by analyzing patterns in the images and changes to the color palette. (Graves) To combat forensic detection of steganography, author Stephen Lau writes: TRADITIONAL DETECTION OF STEGANOGRAPHY “Steganography relies on the fact that the human senses are inadequate when compared to analysis performed by machines or even in fact the senses of other animals of the earth.” (McGill) Most people who choose to send information covertly across a digital medium such as the Internet use some form of cryptography. Cryptography is defined as the process of creating, communicating in, and deciphering secret writings or messages. This however can be a signal to anyone watching that something is happening on that connection. Steganography transfers information across a connection so that anyone monitoring the link will not be able to detect what is being sent. As Dr. Cole states, there is no point in hiding data if someone can figure out how and where the data is hidden. Steganography is designed to make the hidden data hard to detect by disguising it in such a way that there is little change to the properties of the hidden file. (Cole) In recent years, more sophisticated techniques have evolved, specifically to defeat most standard methods of detecting steganography. These involve analyzing the image prior to embedding the message to determine its statistical properties. By locating redundant bits of an image and probabilistically replacing the bits with new information, one can defeat most statistical analyses. In addition, by subsequently modifying other portions of the image, one can recreate the “statistical” footprint of the original unmodified image that can thwart most attempts at statistical analysis. (Lau) Figure 1 illustrates one method by which a forensic analyst would be able to detect the use of steganography, but only if the original file is known. Every digital file has a hash value which remains constant as long as the file remains unchanged. A hash value is a mathematical representation of the data contained in the file. Generally speaking, hash values are unique to each file and are difficult to duplicate on another file. Once a change is made to the file, the hash value will also change, thus reflecting an alteration to the document. In Figure 1, the hash value in the top field is from the original file and the hash to compare field is the file that has been altered by steganography. Steganalysis, the art of detecting the use of steganography, is very tedious and difficult. The easie