SlideShare a Scribd company logo
Steganography & Stegananalysis: A Technical & Psychological Perspective ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net There are only 10 kind of people in the world Those who understand binary and those who dont
The Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganogrphy The art of data hiding in carrier files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Essentials before we begin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The process ,[object Object],[object Object],[object Object]
Section 1 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Pixel: The building block of Image
BMP files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GrayscaleImages with colour palettes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RGB colour images with colour palette ,[object Object],[object Object],[object Object]
24 bit BMP image with the palette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 2 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Bitmap image ,[object Object],BMP File Header Stores general information about the BMP file. Bitmap Information  (DIB header) Stores detailed information about the bitmap image. Color Palette Stores the definition of the colors being used for indexed color bitmaps. (At times not needed) Bitmap Data Stores the actual image, pixel by pixel.
The BMP header This is intel Processor  so Use little Endian system
The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels  16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used.  22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
With the structure ready its time to fill the pixels in the image ,[object Object],Pixel No Red value Green Value Blue Value Colour of pixel 1 8B=139 87 = 135 A0=160 2 8D=141 89=137 A2=162 3 8F=143  8B=139 A4=164 .. .. .. .. n C6=198 F7=247 FF=255
The JPEG File Format ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable  Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable  Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable  Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable  Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n  markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable  Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every  r  macroblocks, where  r  is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable  Application-specific For example, an  Exif  JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on  TIFF . 0xFFFE variable  Comment Contains a text comment. 0xFFD9 none End Of Image
The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag  arrangement of binaries Finally compressed block
GIF image ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganography techniques ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net Section 3
Appending data at the end of the file ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Inserting data in comment or junk field ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Concept of LSB ,[object Object],01111111 10111111 11011111 11101111 11110111 11111011 11111101 11111110 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Image date in hex before hiding data Image date in Binary before hiding data Image date in Binary after hiding data Image date in hex after hiding data
Palette manipulation ,[object Object],nullcon Goa 2010 http://nullcon.net
[object Object],Palette manipulation nullcon Goa 2010 http://nullcon.net ,[object Object],[object Object],A better variation can be not using the exact colour but using the near approximation of that colour
Data Hiding strategies ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
LSB Enhancement File: test.bmp  (Contains no hidden data) File: test1.bmp  (Contains hidden data)
Launch an LSB enhancement attack (Replacing all the bits in every byte with the LSB of that Byte) ,[object Object],[object Object],[object Object],[object Object]
Explanation ,[object Object],[object Object],[object Object]
Why this pattern emerge  (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001  61  b 98 011 00010  62  c 99 011 00011  63  d 100 011 00100  64  e 101 011 00101  65  f 102 011 00110  66  g 103 011 00111  67  h 104 011 01000  68  I 105 011 01001  69  j 106 011 01010  6A  k 107 011 01011  6B  l 108 011 01100  6C  m 109 011 01101  6D  Char Decimal Binary Hex n 110 011 01110  6E  o 111 011 01111  6F  p 112 011 10000  70  q 113 011 10001  71  r 114 011 10010  72  s 115 011 10011  73  t 116 011 10100  74  u 117 011 10101  75  v 118 011 10110  76  w 119 011 10111  77  x 120 011 11000  78  y 121 011 11001  79  z 122 011 11010  7A
Data encryption  (The new challenge that defeats LSB enhancement attack) ,[object Object],[object Object],[object Object],[object Object]
Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption  (S-Tools) Image with no data hidden
Which is the better option for hiding the data 1 2 3 4
Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
Chi square test ,[object Object],[object Object]
How chi square works in steganalysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets see the chi square result of the images shown
Chi square with encrypted data in pure black image ,[object Object],[object Object]
Cracking the algorithm Jsteg ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Camouflage ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],nullcon Goa 2010 http://nullcon.net File with no Hidden data File with Hidden data
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net With no data hidden it was compressed to 98.4% with Winrar With 5 MB of data hidden the file could not  achieve any compression with winrar If the hidden data is more than the file size in JPEG the compression will be close to 0
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net Plain white BMP image of 1.42 MB was compressed to 2 kb with winrar Plain white BMP image of 1.42 MB with 18 KB of hidden data was compressed to 48 kb with winrar Extremely colorful image  of 2.25 MB without any data hidden was compressed to 43.5% with winrar Extremely colorful image  of 2.25 MB with 500 KB of hidden datwithout any data hidden was compressed to 46.8% with winrar
Other Methods ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
Other Methods and tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Few Steganalysis tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
Peeping in Expressions Body Language  Micro expressions
Body Language
[object Object],[object Object],[object Object],[object Object],[object Object],Is it important
[object Object],[object Object],[object Object]
Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another  belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff).  If you have nothing to hide, why not tell the complete truth?
Non verbal Behavior and deception Emotions  Content Complexity Attempted Control Behaviour
Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
Content Complexity ,[object Object],[object Object],[object Object]
Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
Non Verbal Cues ,[object Object],During Deception Non Verbal High Pitch of Voice Speech errors Illustrators Hand/Finger Movement > > < < Verbal Cues Unstructured Production Logical Structure Quantity of detail Contextual Embedding Description of interactions Reproduction of speech Unusual Detail Spontaneous Correction Admitting lack of memory < < < < < < < < <
Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a  tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars.  Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers.  Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure  An evaluation of the CBCA outcomes
Physiological  Reactions and Deception  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Polygraph ,[object Object],[object Object],[object Object],[object Object]
CQT:- Control Question technique ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GKT:- Guilt Knowledge Test ,[object Object],[object Object],[object Object],[object Object],[object Object]
Validity of Polygraphs ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Counter-Measures to the Polygraph ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Effective are Physical Counter-measures? ,[object Object],[object Object],[object Object],[object Object]
Mental Counter-Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Micro Expressions ,[object Object],[object Object],[object Object],[object Object]
Peeping in Words Statement Analysis
Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times.  If we're being deceptive, a conflict occurs with our ID and it creates stress.  &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional).  That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
Technique Truthful statements differ from fabricated ones in both content and quality  Norm Investigators determine what is typical of a truthful statement Deviation from the norm
Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
Important Parts Of Speech ,[object Object],[object Object],[object Object],[object Object],If a deviation from the norm appears, they then should ask, &quot;Why?&quot;
Extraneous Information Extraneous information in a statement also can provide clues to deception.  A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely.  Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions.  In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened.  They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot;  They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot;  These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance.  Statements should be more than just a series of details.  They need to sound like an account of the event.
[object Object],[object Object],[object Object],Truthful statement has THREE parts ,[object Object],[object Object],[object Object],If any part of a statement is incomplete or missing altogether, then the statement is probably false.
Signs to Observe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Graphology
Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided.  Truthful people will provide a logical statement that follows a chronological time frame.  Deceptive people often won't.  Gaps in a statement indicate deception.  When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail.  Any missing time elements should raise red flags  Time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Emotions
Peeping in Mind Brain Fingerprinting
Criminal Brain   ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Techniques
[object Object],[object Object],[object Object],[object Object],[object Object],Techniques
Role in Criminal Findings ,[object Object],[object Object],[object Object],[object Object]
Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Investigation
Interview of the subject ,[object Object],[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Keep in mind
Keep in mind ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scientific Testing with Brain Fingerprinting  ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Attributes
[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
[object Object],[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
A Good Password  ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object]
Social Engineering should we USE or not BUT  If they can why cant we!!!!
[object Object],[object Object],[object Object],[object Object],[object Object],Why use Social Engineering
[object Object],Reverse Social Engineering
[object Object],Reverse /Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Reverse Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why it works!!!!
nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]

More Related Content

Viewers also liked

Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
Prince Boonlia
 
5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
defconmoscow
 
Steganography
SteganographySteganography
Steganography
mohamed3kh
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
Maria Vassilopoulou
 
Steganography
SteganographySteganography
Steganography
Pavninder
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
Sri Madhur
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
 
One-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic AnalysisOne-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic Analysis
Takahiro Haruyama
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
Prince Boonlia
 
PDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documents
Ange Albertini
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
Takahiro Haruyama
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Hossain Md Shakhawat
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
HITCON GIRLS
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
Mohamed Loey
 
QR code
QR codeQR code
QR code
Noah Kim
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
Zachary Moore
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (20)

Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
 
Steganography
SteganographySteganography
Steganography
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
 
Steganography
SteganographySteganography
Steganography
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
One-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic AnalysisOne-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic Analysis
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
PDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documents
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
QR code
QR codeQR code
QR code
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
Prince Boonlia
 
Dip
DipDip
//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats
Rosa ɯǝukɯɐn
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
ssuserff72e4
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
ssuserff72e4
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
theem college of engineering
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
Godo Dodo
 
Multimedia Object - Image
Multimedia Object - ImageMultimedia Object - Image
Multimedia Object - Image
Telkom Institute of Management
 
Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
Fatih Özlü
 
File types photorestoration and panoramics
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
daviddiener
 
PPT
PPTPPT
Jpegxr readme
Jpegxr readmeJpegxr readme
Jpegxr readme
Kenneth Boyles
 
Jpeg
JpegJpeg
Unit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representationUnit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representation
Eellekwameowusu
 
Mm01 a vformat
Mm01 a vformatMm01 a vformat
Mm01 a vformat
gotovikas
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
siddharth rathore
 
Digital image formats
Digital image formatsDigital image formats
Digital image formats
Sarah AL-Hzamat
 
Image Files Formats
Image Files FormatsImage Files Formats
Image Files Formats
Sarah Fernetich
 
ColorLab.pdf
ColorLab.pdfColorLab.pdf
ColorLab.pdf
LeonardoDueasCortes
 
Lec2
Lec2Lec2
Lec2
Kh Ravy
 

Similar to nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective (20)

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Dip
DipDip
Dip
 
//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
 
Multimedia Object - Image
Multimedia Object - ImageMultimedia Object - Image
Multimedia Object - Image
 
Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
 
File types photorestoration and panoramics
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
 
PPT
PPTPPT
PPT
 
Jpegxr readme
Jpegxr readmeJpegxr readme
Jpegxr readme
 
Jpeg
JpegJpeg
Jpeg
 
Unit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representationUnit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representation
 
Mm01 a vformat
Mm01 a vformatMm01 a vformat
Mm01 a vformat
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 
Digital image formats
Digital image formatsDigital image formats
Digital image formats
 
Image Files Formats
Image Files FormatsImage Files Formats
Image Files Formats
 
ColorLab.pdf
ColorLab.pdfColorLab.pdf
ColorLab.pdf
 
Lec2
Lec2Lec2
Lec2
 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
Osint primer
Osint primerOsint primer
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Nmap basics
Nmap basicsNmap basics
Metasploit primary
Metasploit primaryMetasploit primary
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
 
Linux for hackers
Linux for hackersLinux for hackers
Android Pentesting
Android PentestingAndroid Pentesting

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Pixel: The building block of Image
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. The BMP header This is intel Processor so Use little Endian system
  • 15. The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels 16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. 22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
  • 16.
  • 17.
  • 18. JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable Application-specific For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on TIFF . 0xFFFE variable Comment Contains a text comment. 0xFFD9 none End Of Image
  • 19. The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
  • 20. The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
  • 21. Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
  • 22. Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag arrangement of binaries Finally compressed block
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LSB Enhancement File: test.bmp (Contains no hidden data) File: test1.bmp (Contains hidden data)
  • 35.
  • 36.
  • 37. Why this pattern emerge (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001 61 b 98 011 00010 62 c 99 011 00011 63 d 100 011 00100 64 e 101 011 00101 65 f 102 011 00110 66 g 103 011 00111 67 h 104 011 01000 68 I 105 011 01001 69 j 106 011 01010 6A k 107 011 01011 6B l 108 011 01100 6C m 109 011 01101 6D Char Decimal Binary Hex n 110 011 01110 6E o 111 011 01111 6F p 112 011 10000 70 q 113 011 10001 71 r 114 011 10010 72 s 115 011 10011 73 t 116 011 10100 74 u 117 011 10101 75 v 118 011 10110 76 w 119 011 10111 77 x 120 011 11000 78 y 121 011 11001 79 z 122 011 11010 7A
  • 38.
  • 39. Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption (S-Tools) Image with no data hidden
  • 40. Which is the better option for hiding the data 1 2 3 4
  • 41. Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
  • 42.
  • 43.
  • 44. Lets see the chi square result of the images shown
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
  • 54. Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
  • 55.
  • 56.
  • 57. Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
  • 58. Peeping in Expressions Body Language Micro expressions
  • 60.
  • 61.
  • 62. Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff). If you have nothing to hide, why not tell the complete truth?
  • 63. Non verbal Behavior and deception Emotions Content Complexity Attempted Control Behaviour
  • 64. Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
  • 65.
  • 66. Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
  • 67.
  • 68. Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars. Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers. Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure An evaluation of the CBCA outcomes
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. Peeping in Words Statement Analysis
  • 80. Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times. If we're being deceptive, a conflict occurs with our ID and it creates stress. &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional). That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
  • 81. Technique Truthful statements differ from fabricated ones in both content and quality Norm Investigators determine what is typical of a truthful statement Deviation from the norm
  • 82. Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
  • 83.
  • 84. Extraneous Information Extraneous information in a statement also can provide clues to deception. A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely. Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions. In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened. They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
  • 85. Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot; They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot; These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
  • 86. Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance. Statements should be more than just a series of details. They need to sound like an account of the event.
  • 87.
  • 88.
  • 89.
  • 90. Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided. Truthful people will provide a logical statement that follows a chronological time frame. Deceptive people often won't. Gaps in a statement indicate deception. When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail. Any missing time elements should raise red flags Time
  • 91.
  • 92. Peeping in Mind Brain Fingerprinting
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114. Social Engineering should we USE or not BUT If they can why cant we!!!!
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120. nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]