Forensic Report: Analysis of Image Acquisition and Data Embedding

Verified

Added on  2020/03/02

|6
|1046
|313
Report
AI Summary
This forensic report presents an analysis of image acquisition processes and data embedding techniques within a Linux-based system. The report details the use of HALCON software for image acquisition, outlining hardware and software requirements. It explains the application of steganography for embedding messages into files, specifically using the .png format. The report covers the Steganographic technique, file hybridization, and an algorithm for data hiding, including substitution, masking, filtering, and transform techniques. It discusses the implementation of the List Significant Bit technique and the Direct Cosine Technique for file transformation. The conclusion highlights the selection of Steganography as the most appropriate method for embedding content, summarizing the techniques and the embedding process involved.
Document Page
Running head: FORENSIC REPORT
Forensic Report
Name of the Student:
Name of the University:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
FORENSIC REPORT
Table of Contents
Task 2: Case Project........................................................................................................................2
Task 3: Research Project.................................................................................................................3
Introduction..................................................................................................................................3
Process used for embedding contents in the files........................................................................3
Embedding process......................................................................................................................3
Conclusion...................................................................................................................................4
References........................................................................................................................................5
Document Page
2
FORENSIC REPORT
Task 2: Case Project
In the provided scenario, image form the disk of a computer cannot be removed and
hence as result some image Acquisition tasks are to be performed on the system. In is also given
that the system is a Linux based system. Hence, the main task at hand is the acquisition of the
image from a Linux based system (Han & Deng, 2015). The solution also provides brief details
about the hardware and the software requirements for the process to carry out. The HALCON
software provided by the MVTec Company would be used for the image acquisition procedure.
The image acquisition is a process that involves various type of machine vision
application. It consists of several activities such as interaction with various type of hardware
such as cameras or frame grabber boards. The HALCON system already provides a interfaces
which incorporates all these items into its procedures. In the application the task of image
acquisition reduce to mere line of codes and the image is obtained. In addition to this, the
application also provides several cost limiting functions for the users (Hanninen, 2015). This
application can also help in obtaining images from any kind of platform. The application
provides very efficient image acquisition interfaces for the interfaces. These interfaces bridge the
gap that between the individual image acquisition directories and the main libraries of the
software. This application can very easily incorporate a large number of frame grabber and
various types of industrial cameras and industrial gadgets such as the Camera link, USB 2.0,
IEEE1394 and also GigE. The system makes use of a camera to input the picture into the system.
This is then processed inside the system. The frame grabber is connected to the system and the
image is opened in the system with the help of the frame grabber device. The frame grabber is
initially set in the default settings for the systems and also the standard grabbing mode for the
Document Page
3
FORENSIC REPORT
system is activated. The image once grabbed is ready for segmentation process. The HDevelop
program is used to initiate the application and the image is then processed in the application.
After the image is grabbed it is processed in a loop. The processed image is then stored in the
library of the system. The system also supports various type of standards such as Video4Linux,
DirectFile ad Twain. Hence, the application is very useful and indentified as the most appropriate
application for the image acquisition process.
Task 3: Research Project
Introduction
It has been known that there were several files that were transmitted via the internet on t
he e-mail from an unknown source. The task at hand is to embed the at least four messages into
the files. The report provides the information about the techniques used for embedding content
the files and also a brief explanation about the embedding process is provided in the report.
Process used for embedding contents in the files
After several brainstorming sessions it was decided that the Steganographic technique for
embedding the files with the content would be the most appropriate for the investigator. This
procedure involves the activities such as embedding text into the image files (Kour & Verma,
2014). Hence, by using this technique we can very easily embed the messages into the .png files.
This process would be completed by the file hybridization technique. The main task at hand is to
design an embedded algorithm for the data hiding procedure.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
FORENSIC REPORT
Embedding process
The embedding process involves several activities that are to be performed by the user ot
perform the steganographic process. The main activity that the user is required to perform is to
design a brief algorithm to embed 4 messages into a file with the extension as .png. Then the
following techniques are to be used by the user:
Substitution
Masking & Filtering
Transform Technique
The data that is to be substitutes is selected and should be provided as an input for the
algorithm. This process is used for reducing the size of the file. For this, the List Significant Bit
technique is used. After this the masking and the filtering technique is applied to the files. The
transformation technique is applied to the file after the Masking and Filtering process (Juneja &
Sandhu, 2014). The direct cosine Technique is applied for the transformation of the file. It use
the quantization technique for the transforming the important part of the files. After the
transformation of the file the embedded files would be ready for process.
Conclusion
For conclusion it can be said that Steganography is selected as the most appropriate
process for embedding the files with the content as requested by the investigator. The report
provides the information about the Steganographic techniques used for embedding content the
files and also a brief explanation about the embedding process is provided in the report.
Document Page
5
FORENSIC REPORT
References
Han, L., & Deng, J. (2015). A Study on Flexible Vibratory Feeding System Based on HALCON
Machine Vision Software.
Hänninen, J. (2015). Using Gocator laser profiling sensor with HALCON machine vision
software.
Juneja, M., & Sandhu, P. S. (2014). Improved LSB based Steganography Techniques for Color
Images in Spatial Domain. IJ Network Security, 16(6), 452-462.
Kour, J., & Verma, D. (2014). Steganography Techniques–A Review Paper. International
Journal of Emerging Research in Management &Technology ISSN, 2278-9359.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]