![]() ![]() Stegowav: Hides information in WAV carrier files.Stegotif: Hides information in TIFF carrier files.Stash: Hides information in BMP, PCX, PNG, and TIFF carrier files.S-Tools: Hides information in BMP, GIF, or WAV carrier files.MP3Stego: Hides information in MP3 carrier files.JPHide-&-Seek: Hides information in JPEG carrier files.Gif-It-Up: Hides information in GIF carrier files.Some of the better-known stego programs that are available for free on the Internet include: The StegoArchive 3 lists more than 100 steganographic programs for Windows, DOS, Linux, and other operating systems. As one may imagine, there are literally an infinite number of audio and image files that can be used as carriers, and users can continue to produce such files forever. ![]() Furthermore, the sheer volume of people downloading the pictures will make it difficult to distinguish between the legitimate buyer and the conspirator.įor steganography to be effective, the sender and receiver have to agree upon the carrier files that will transport the hidden messages, the steganographic software to employ, and, possibly, a password. Unless the individuals are under active investigation, it is unclear that anyone will notice this activity. The ring members know when that time is and download the new photos. But at some pre-arranged time during the week, versions of the photos are posted that contain hidden pictures. The items for sale are legitimate bids are accepted, money is collected and products are dutifully shipped. By pre-agreement, the leader of a child pornography distribution ring puts items for sale on eBay every Monday and posts photographs of the items. In the arena of commercial sexual exploitation of children, law enforcement concerns involve the use of steganography by manufacturers and distributers of child pornography to exchange and to hide child pornography.Ĭonsider the following hypothetical scenario. Unlike cryptography, which merely obscures the communication between two parties when observed by a third party, steganography hides the very existence of the communications channel. The concern in law enforcement, of course, is that steganography is being used to "protect" communication amongst members of a criminal conspiracy. Steganalysis is the detection and recovery of that hidden information - and is the role of the computer forensics examiner for both law enforcement and anti-terrorism investigations. The original file that will contain the hidden information is called the carrier medium the modified carrier file that contains the hidden information is called the steganographic medium. Modern steganographic applications in the digital realm provide a covert communications channel by hiding some type of binary data in another file. Historically, steganographic methods date back thousands of years and include the use of invisible ink, microdots, and tattooing the scalps of slaves. Steganography is often referred to colloquially as "stego " for example, references to "stego" software are common.Īs previously described in an NCPCA UPDATE four years ago, 2 " Steganography: Hidden Images, A New Challenge in the Fight Against Child Porn,” steganography provides the means whereby two parties can communicate in such a way that a third party is not aware of the secret communication. Steganography is the science of "covered writing" and is one of the newer tools in the arsenal of the cybercriminal and cyberterrorist or any moderately computer-astute user. "Steganography," my colleague asked, "is that a dinosaur or an icicle hanging down in a cave?" Steganography: Implications for the Prosecutor and Steganography for the Prosecutor and Computer Forensics Examiner
0 Comments
Leave a Reply. |