Sempersol Nullcon Reena Prince Presentation On Steganography
Sempersol Nullcon Reena Prince Presentation On Steganography
Stegananalysis: A Technical
& Psychological Perspective
-Prince Komal Boonlia
-Dr. Reena Bhansali
There are only 10 kind of people in the world
Those who understand binary and those who dont
•Carrier File
•Stego File
•Data File
Section 1
BASICS OF IMAGES
Clours
Pixel
Colour depth
•Blue
•Image •Red
•RGB Cube
•Palette
Section 2
22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size.
26h 4 the horizontal resolution of the image. (pixel per meter, signed integer)
2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer)
2Eh 4 the number of colors in the color palette, or 0 to default to 2 n.
32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
With the structure ready its time to fill the pixels
in the image
Specifies the interval between RSTn markers, in macroblocks. This marker is followed by
0xFFDD 2 bytes Define Restart Interval
two bytes indicating the fixed size so it can be treated like any other variable size segment.
Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is
generally a single scan. Progressive DCT JPEG images usually contain multiple scans.
0xFFDA variable Start Of Scan
This marker specifies which slice of data it will contain, and is immediately followed by
entropy-coded data.
0xFFD0 … Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used
none Restart
0xFFD7 if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7.
For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a
0xFFEn variable Application-specific
structure based closely on TIFF.
0xFFFE variable Comment Contains a text comment.
0xFFD9 none End Of Image
Quantization table
DCT Coefficients of the block
Steganography techniques
Appending data at the end of
file
Hiding data in comment or junk
field
Hiding data in LSB’s
Palette manipulation
10111111
11111101
•LSB 3 •3
•6 •1111111
1
11011111
11111011 •5 •4
11110111 11101111
•Represents 1
•test.bmp •test1.bmp
•Emerging pattern LSB
LSB indicating Plain text
enhanced enhanced
data hidden
•Did you observer the behavior of black and white colours? Can
you see there are only 16 colours in this image??? WHY?
Explanation
All the character starting from
“a” till “z” have first 3 binaries
(011) as common and rest 5 are
variable
With LSB enhancement we will have
a common pattern of 3 bytes being
all”0”, all1” and all”1” followed
by random 5 bytes.
This generates a repetitive
pattern every 3 byte after every 5
bytes resulting in a pattern
formation
Why this pattern emerge
(Nature of the ASCII )
Decim Decim
Char Binary Hex Char Binary Hex
al al
a 97 01100001 61 n 110 01101110 6E
b 98 01100010 62 o 111 01101111 6F
c 99 01100011 63 p 112 01110000 70
d 100 01100100 64 q 113 01110001 71
e 101 01100101 65 r 114 01110010 72
f 102 01100110 66 s 115 01110011 73
g 103 01100111 67 t 116 01110100 74
h 104 01101000 68 u 117 01110101 75
4
2
Take a break and look at this
Image
File with no
Hidden data
File with
Hidden data
Hash Comparison
There are bunch of image files that are
available either with OS as wallpaper or those
are taken from internet.
A hash database is part of most Forensic
Toolkits wherein a database of known files is
kept
Slightest change in the file will result in
changed Hash and it can be compared with the
stegano file to detect the steganography
Palette of complete
Palette of complete black image as
black image original changed by S-tools
after hiding the data
Body Language
Micro expressions
Body Language
Is it important
•Vocal :-38%
If you have nothing to hide, why not tell the complete truth?
Non verbal Behavior and deception
•< occurs less during deception, > occurs more during deception
Verbal Behavior and deception
CBCA:- Criteria Based Content Analysis-is a tool to assess the veracity of written statements, and is
used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be
higher for truth tellers than for liars.
Assumptions:-
(i) Lying is cognitively more difficult than truth telling,
(ii)Liars are more concerned with the impression they make on others than truth tellers.
Three Phase
A specific interview procedure to obtain a statement from information about what constitute a properly
conducted interview
Coding of the transcribed statement using the CBCA procedure
An evaluation of the CBCA outcomes
Physiological Reactions and Deception
•Modern way of detecting physiological activity in liars is by using a polygraph
•Polygraph is a scientific measuring device which can which can display via ink pens onto chart or via computer
visual display unit, a direct and valid representation of various types of bodily activities
A polygraph does not detect lies but only the arousal which may accompany
telling a lie. E.g. Sweating of fingers, Respiration and Blood Pressure
Polygraph
•CQT •GKT
•Control Question Technique •Guilt Knowledge Test
CQT:- Control Question technique
Innocent will respond to both control and relevant questions with equal emotional reactivity
Guilty person will show more reactivity to relevant questions than control questions.. Creating a
difference in score
GKT:- Guilt Knowledge Test
Laboratory Studies - asked college students to commit a crime and then lie about it
• Charts scored by independent polygraph examiners (blind scoring) - use of only the charts and
no additional information
Physical
Suppressing physiological responses
Mental dissociation
Statement Analysis
Statement Analysis
Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the
victim. It's the process of examining a person's words to see exactly what they're saying.
It's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's
easier to tell a partial truth than to completely fabricate a statement
It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all
times.
If we're being deceptive, a conflict occurs with our ID and it creates stress.
"Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components." When a
person lies, this causes a conflict within ourselves and creates stress (emotional).
That stress then triggers a sympathetic nervous system to act, as part of the "Fight or Flight" syndrome.
Technique
Norm
Investigators determine what is typical of a truthful statement
Lack of
Conviction
Important Parts Of Speech
•Pronouns
•Nouns
•Verbs
•Occurrence
Truthful Deceptive
Nervous at first ; calms down as interview progresses Angry; nonspecific; won't calm down
Anger; specific Overly anxious; seems confused
Composed attitude; self assured Overly polite
Wants you to know he's innocent Defensive
Cooperates with investigation Will be quiet; afraid he will say something to get him in trouble
appears without an attorney Evasive in answers
Willing to prove innocence Non committal in response
Answers questions directly Complains; uncooperative
Willing to take lie detector test Guarded about what they tell you
Open; Will volunteer info Have to give a reason why they don't cooperate
Unyielding & adamant in denials Defeated; slumps head forward
Willl sit forward in the chair & ask what one want to know
Graphology
• The technique uses the well known fact that an electrical signal known as P300 is
emitted from an individual's brain beginning approximately 300 milliseconds after it is
confronted with a stimulus of special significance, e.g. a rare vs. a common stimulus or a
stimulus the subject is asked to count
• The application of this in brain fingerprinting is to detect the P300 as a response to
stimuli related to the crime or other investigated situation, e.g., a murder weapon,
victim's face, or knowledge of the internal workings of a terrorist cell. Because it is
based on EEG signals, the system does not require the subject to issue verbal responses
to questions or stimuli.
Techniques
• The person to be tested wears a special headband with electronic sensors that measure the EEG from
several locations on the scalp. The subject views stimuli consisting of words, phrases, or pictures
presented on a computer screen
• Stimuli are of three types:
– “Irrelevant” stimuli that are irrelevant to the investigated situation and to the test subject,
– “Target” stimuli that are relevant to the investigated situation and are known to the subject,
– “Probe” stimuli that are relevant to the investigated situation and that the subject denies knowing.
Probes contain information that is known only to the perpetrator and investigators, and not to the
general public or to an innocent suspect who was not at the scene of the crime.
Role in Criminal Findings
Investigation
Interview
Scientific Testing
Adjudication
Investigation
Science of Brain Fingerprinting accurately determines whether or not specific information is stored in a
specific person’s brain.
It detects the presence or absence of specific information in the brain.
The job of the investigator is to find features relevant to the crime that have the following attributes
They are salient features that perpetrator almost certainly encountered in the course of committing the crime.
The suspect has not been exposed to them in some other context, i.e., interrogation or court proceedings.
Investigation
Probe Stimuli
If the suspect knows specific features of the crime, and has had no access to this
information other than through committing the crime, then this will provide
evidence of his involvement in the crime.
If the suspect lacks this knowledge, this will provide evidence supporting his
innocence.
Brain Fingerprinting tests for the presence or absence of this information stored in
the suspect’s brain.
Interview of the subject
• Once evidence has been accumulated through investigation, and before the Brain Fingerprinting test is
conducted to determine if the evidence can be linked to the suspect, it can in some cases be very valuable
to obtain the suspect’s account of the situation
• The interview with the suspect may help to determine which scientific tests to conduct, or how to
conduct the tests
• The suspect is asked if he would have any legitimate reason for knowing any of the information that is
contained in the potential probe stimuli.
• This information is described without revealing which stimuli are probes and which are irrelevant
Interview of the subject
• It is vital that the suspect be given a chance before the Brain Fingerprinting test to disclose any familiarity he may
have with the crime, so that any probes that he knows about for a legitimate reason can be eliminated from the test.
• Recall that the probes contain crime-relevant information that the suspect has no way of knowing except through
having been present at the crime.
• The targets are also discussed in the interview. Recall that the targets contain information about the crime that the
suspect knows whether he committed the crime or not, and are used to establish a baseline brain response for
information known to be significant to this subject in the context of the crime
Interview of the subject
• In the interview, the suspect is also given a list of all of the stimuli to be presented in
the test, without disclosing which stimuli are probes and which are irrelevants.
• The suspect is asked to identify any stimuli that are significant to him for reasons that
have nothing to do with the crime.
• If any stimulus is significant to the suspect for reasons having nothing to do with the
crime, then that stimulus is eliminated from the test.
Keep in mind
• Brain Fingerprinting determines scientifically whether or not specific information is stored in a specific
person’s brain.
• Brain Fingerprinting tells us the following, no more and no less: “These specific details about this crime
are (or are not) stored in this person’s brain.”
•Investigation and
Interview
•Probe
•Input
Stimuli
•Output
• The science of Brain Fingerprinting does not tell us what information to test for.
• This is determined according to the skill and judgment of the investigator – which is in the end
evaluated by the judge and jury.
• Brain Fingerprinting does not test whether a person is guilty of a crime. This is adjudicated by the judge
and jury. The question of guilt or innocence is a legal determination to be made by a judge and jury, not
a scientific one to be made by a scientist or a computer.
• What Brain Fingerprinting does is to provide evidence that can be weighed by the judge and jury in
making their determination of guilt or innocence.
A Good Password
Lot of awareness has been created for keeping a SAFE PASSWORD
Now the ONUS is on us when we need to BREAK the sturdy walls created
and constructed by us.
We taught them to be safe in turn they backstabbed us by using our
knowledge for the WRONG
Ones we have detected the CRIME or traced where the things are
hidden
The next step is finding PASSWORD of the person committing
Is it ethical to trace the password
But is it EHTICAL to commit crime
The debate is long and never ending
Psychology and Technology has to go hand in hand
There is no sure shot answer anywhere unless the criminal in
front of us
Even if CRIMINAL reveals all, are we sure he is not lying.
•Social
Engineering
Social Engineering should we USE or not
BUT
If they can why cant we!!!!
Why use Social Engineering
•The reasons for using social engineering to gain access are simple: once mastered, social engineering can be used on a system
despite the platform or the quality of the hardware and software present.
•Social engineering comes in many forms, but they are all based on the principle of disguising oneself as a no hacker who needs
or deserves the information to gain access to the system.
•Aside from user larger security systems, another tactic that security professionals employ is 'security through obscurity,' which is
providing little or no information to a user, assuming that legitimate users have already been trained,and that the hackers would
be discouraged by having to guess different commands or procedures.
•Security through obscurity methods can also be accomplished by hiding certain files or information systems or having confusing
login prompts.
•This method of security is completely undermined when social engineering is involved. With a legitimate human user providing
information, all the information that allowed for security through obscurity would also be divulged to the hacker.
Reverse Social Engineering
•Reverse social engineering is a superior form of social engineering that deals with the
common difficulties that come with normal social engineering. This form can be
described as a legitimate user of a system asking the hacker questions for information.
In reverse social engineering (RSE), the hacker is thought to be a higher-level that the
legitimate user, who is actually a target. In order to pull of an RSE attack, however, the
attacker must be knowledgeable of the system and usually must also have previous
access granted to him, usually through normal social engineering.
Reverse /Social Engineering
•Reverse social engineering is a superior form of social engineering that deals with the
common difficulties that come with normal social engineering. This form can be
described as a legitimate user of a system asking the hacker questions for information.
In reverse social engineering (RSE), the hacker is thought to be a higher-level that the
legitimate user, who is actually a target. In order to pull of an RSE attack, however, the
attacker must be knowledgeable of the system and usually must also have previous
access granted to him, usually through normal social engineering.
Reverse Social Engineering
•Social Engineering: The hacker places the calls and is dependent on the user
• Reverse Social Engineering: The user places the calls and are dependent the hacker
• Social Engineering: The user feels that the hacker is indebted to them.
• Reverse Social Engineering: The user feels indebted to the hacker.
• Social Engineering: Questions often remain unresolved to the victim.
• Reverse Social Engineering: All the problems are corrected, no suspicious loose ends
• Social Engineering: The user has control by providing information.
• Reverse Social Engineering: The hacker has complete control.
• Social Engineering: Little or no preparation required.
• Reverse Social Engineering: Lots of planning and previous access usually needed
Why it works!!!!
[email protected]
[email protected]