文档介绍:Computer Forensics with Steganography in
Evidence Investigations
DOP Shiuh-Jeng Wang
Full Professor, 中央警察大學資訊管理系所
中華民國資訊安全學會理事
Visiting Scholars at FSU and UF in USA, 2002, 2004
Academic tour for International Project Inspection at CMU in USA, 2007
Columnists of Domestic Information-tech Magazines,
網路通訊/iThome/網管人雜誌, 2002-2006, -2009
Director of ICCL at CPU
(Information Cryptology and Construction Lab.)
Chair of FROG in ICCL
******@,
2009/12/20
INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 1
Outline
Security
Steganography
ICCL-FROG
Forensics and Evidence
Research works
--- Forensics in Steganography Evidence Investigations
Conclusions
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 2
C’est La Via
HAKUNA MATATA
work Security
Authentication and Forensics
work Forensics
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 3
.
資訊安全的目標()
機密性
(Confidentiality)
完整性可用性
(Integrity) (Availability)
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 4
何謂偽裝術(What is Information Hiding)
大自然中
瞞天過海的偽裝術
/gate/big5/
m/video/VIDE1200049101682770
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 5
自然界中的偽裝法
在一個虎視眈眈的世界裏,偽裝必須天衣無縫,否則就毫無用處
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 6
金庸打油詩(偽裝法)
捨身比武搏妹笑性狂難羈武通神
縱是孤苦一生傲亦師亦友身旁鵰
學琴定情濱於江棄私斬奸人稱俠
曲諧常笑傲江湖情堅逾石得仙侶
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 7
不可視浮水印(資料嵌入)
偽裝圖
掩護圖(秘密隱藏後)
(秘密隱藏前)
掩護圖/偽裝圖(128x128pixel)
嵌入小說「哈利波特(Harry Potter)」
部分的內涵
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 8
MY FROG and the FROG with you
2009/12/20 INFORMATION CRYPTOLOGY & CONSTRUCTION LAB (ICCL) 9
Cyber Crime
電腦犯罪日漸嚴重(調查報告)
調查報告美國在西元兩千年因電腦犯罪所產生
的財產損失即增加43% , 由$US265 million
增加為$US378 million (FBI案件統計)
美國85% 的企業及政府機構曾偵測到計算機
系統遭到入侵
資料來源:/icon/0105/0