C04391 - Project on Forensic - Report

Added on - Mar 2020

In this report, we will get to know about  FORENSIC REPORT.  It has been known that there were several files that were transmitted via the internet via e-mail from an unknown source. The task at hand is to embed at least four messages into the files. The report provides information about the techniques used for embedding content files and also a brief explanation of the embedding process is provided in the report.

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 3 of 6 pages
Running head: FORENSIC REPORTForensic ReportName of the Student:Name of the University:Author Note
1FORENSIC REPORTTable of ContentsTask 2: Case Project........................................................................................................................2Task 3: Research Project.................................................................................................................3Introduction..................................................................................................................................3Process used for embedding contents in the files........................................................................3Embedding process......................................................................................................................3Conclusion...................................................................................................................................4References........................................................................................................................................5
2FORENSIC REPORTTask 2: Case ProjectIn the provided scenario, image form the disk of a computer cannot be removed andhence as result some image Acquisition tasks are to be performed on the system. In is also giventhat the system is a Linux based system. Hence, the main task at hand is the acquisition of theimage from a Linux based system (Han & Deng, 2015). The solution also provides brief detailsabout the hardware and the software requirements for the process to carry out. The HALCONsoftware provided by the MVTec Company would be used for the image acquisition procedure.The image acquisition is a process that involves various type of machine visionapplication. It consists of several activities such as interaction with various type of hardwaresuch as cameras or frame grabber boards. The HALCON system already provides a interfaceswhich incorporates all these items into its procedures. In the application the task of imageacquisition reduce to mere line of codes and the image is obtained. In addition to this, theapplication also provides several cost limiting functions for the users (Hanninen, 2015). Thisapplication can also help in obtaining images from any kind of platform. The applicationprovides very efficient image acquisition interfaces for the interfaces. These interfaces bridge thegap that between the individual image acquisition directories and the main libraries of thesoftware. This application can very easily incorporate a large number of frame grabber andvarious types of industrial cameras and industrial gadgets such as the Camera link, USB 2.0,IEEE1394 and also GigE. The system makes use of a camera to input the picture into the system.This is then processed inside the system. The frame grabber is connected to the system and theimage is opened in the system with the help of the frame grabber device. The frame grabber isinitially set in the default settings for the systems and also the standard grabbing mode for the

In conclusion, it can be said that Steganography is selected as the most appropriate process for embedding the files with the content as requested by the investigator. The report provides information about the Steganographic techniques used for embedding content in the files and also a brief explanation of the embedding process is provided in the report.

Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access