Digital Forensics: Image Acquisition and Watermarking Report

Verified

Added on  2020/02/24

|5
|1179
|256
Report
AI Summary
This report delves into the realm of digital forensics, specifically focusing on two key tasks. The first task outlines the process of acquiring a disk image from a Linux-based computer at a crime scene, emphasizing the use of a Linux Live CD like HELIX 3, along with necessary hardware such as an external hard drive. The report highlights HELIX 3's capabilities as a digital forensic tool, including its ability to gather data from various sources like physical memory and network connections, and store the disk image for evidence. The second task addresses the embedding of secret messages into graphic files, such as images or videos, utilizing digital watermarking techniques. The report explains the concept of digital watermarking, particularly invisible watermarking, as a solution for concealing sensitive data within graphic files to ensure secure transmission and ownership protection. The report also mentions two types of digital watermarking, Visible and Invisible Watermarking. Invisible watermarking is considered as the best approach in this assignment.
Document Page
Running head: DIGITAL FORENSICS
Digital Forensics
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DIGITAL FORENSICS
Task 2
The purpose of the assignment is to provide an outline on the possible software and
hardware that can be used to acquire the disk image of a Linux based computer from the
crime scene. Many software is there in the market, both freeware and licensed that can be
used in digital forensic purpose. The best approach is to use Linux Live CD that has an
operating system of its own and can be used to gather disk image from the computer at a
crime scene, which cannot be removed from the scene (Nelson, Phillips & Steuart, 2014).
The basic hardware requirement is an external hard drive or a external storage device
that has the required storage space to load the disk image that has been retrieved from the
computer (Quick & Choo, 2016).
The software requirement can be mitigated by using a digital forensic tool, the basic
knowledge regarding the modification of the BIOS setup of the computer if required and
knowledge of using shell commands within the computer. In this case, the HELIX 3 Linux
Live CD is considered as a tool to retrieve the disk image from the Linux computer (Rafique
& Khan, 2013).
HELIX 3 Live CD – A type of digital forensic package created to gather digital evidences
from the digital devices that have been found in the crime scene. It contains a number of free
digital forensic tools inclusive of hex editors, password cracking and data carving tools
(Sindhu & Meshram, 2012). The purpose of this tool is to gather information from the
physical memory, user accounts, executing processes and schedules, network connections,
scheduled jobs, chat logs, registry, screen captures, applications, environment variables, SAM
files, Internet history and drivers of the computer. After the data is collected, it analyses and
reviews the data to generate the report based on the results (Sindhu & Meshram, 2012).
Document Page
2DIGITAL FORENSICS
The obtained data or image of the disk is stored in an external hard drive for using as
evidence during the investigation (Sindhu & Meshram, 2012).
Task 3
The objective of the assignment is to provide solution regarding the embedding
procedure of secret messages to a graphic file such as an image or video file for an
investigation where a number of graphic files have been sent from an unknown source to a
suspect of the crime via email. Many procedures are there that help in embedding
confidential data in graphic files. The prime purpose of such a method is to send sensitive
data to a target recipient without involving the chance of compromising the data at the hands
of an intermediate receiver who might intercept the transmission (Singh & Chadha, 2013).
The process of Digital Watermarking is considered as a solution to embed such kind
of secret data into a graphic file like an image or video file (Kaur, Jindal & Behal, 2012).
Digital Watermarking – It is a process, which is considered to be some kind of data that is
hidden behind another data for localization, traitor tracing, tamper detection and ownership
proof processes. The process of digital watermarking involves altering a graphic file in a
method so that the hidden data can be passively viewed without hampering the original file. It
is generally used to authenticate the identity of the owner of a digital image (Ra, 2013). In
this process, the information that authenticates the owner is hidden into the graphic file,
especially in an image or video file. It is generally used by famous artists who watermark
their images to prevent the images from being acquired by criminals and claiming as their
own creation. Anyone trying to copy the image will have to copy along with the watermark
without their notice (Chandrakar & Bagga, 2013).
Document Page
3DIGITAL FORENSICS
There are two types of Digital Watermarking, namely Visible Watermarking and
Invisible Watermarking.
In case of Visible Watermarking, the information is visible on the image or video file.
These are generally seen in the form of logos and texts. For example, in a TV broadcast, the
logo of the channel is visible on screen.
Invisible Watermarking involves adding secret information in a digital image or video
as digital data. It is not visible to the naked eye, however, it can detected by various methods.
It is also accepted as a kind of steganography and has a wide variety of application. Invisible
Watermarking finds its use in copyright protection, annotation of photographs and source
tracing (Chandrakar & Bagga, 2013).
In this assignment, the best approach will be in the form of Invisible Watermarking
that will solve the problem in the investigation.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DIGITAL FORENSICS
References
Chandrakar, N., & Bagga, J. (2013). Performance comparison of digital Image watermarking
techniques: a survey. International Journal of Computer Applications Technology and
Research, 2(2), 126-130.
Kaur, M., Jindal, S., & Behal, S. (2012). A study of digital image watermarking. Journal of
Research in Engineering and Applied Sciences, 2(2), 126-136.
Nelson, B., Phillips, A., & Steuart, C. (2014). Guide to computer forensics and investigations.
Cengage Learning.
Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and
electronic evidence. Cluster Computing, 19(2), 723-740.
Rafique, M., & Khan, M. N. A. (2013). Exploring static and live digital forensics: Methods,
practices and tools. International Journal of Scientific & Engineering Research, 4(10),
1048-1056.
Ram, B. (2013). Digital image watermarking technique using discrete wavelet transform and
discrete cosine transform. International journal of Advancements in Research &
technology, 2(4), 19-27.
Sindhu, K. K., & Meshram, B. B. (2012). Digital forensics and cyber crime datamining.
Journal of Information Security, 3(3), 196.
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications
and attacks. International Journal of Engineering and Innovative Technology (IJEIT),
2(9), 165-175.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]