| 研究生: |
翁吉田 Weng, Chi‐Tien |
|---|---|
| 論文名稱: |
一個新的網路層封包數位標籤的嵌入與偵測之鑑識方法用於JPEG影像之研究 Novel Packet‐level JPEG Forensics Scheme for Packet Signature Embedding and Detection |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 50 |
| 中文關鍵詞: | 網路監聽 、Packet-level標籤 、數位鑑識 、資訊隱藏 、JPEG |
| 外文關鍵詞: | JPEG, Information hiding, Packet-level signature, Network monitor, Digital forensic |
| 相關次數: | 點閱:117 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來由於網路及數位多媒體相關技術突飛猛進,利用網路做多媒體資訊交換變得相當方便,然而在便利的數位傳播技術下卻突顯出許多法律議題,如非法複製、篡改、詐欺及色情傳播等問題,因此如何有效追蹤、記錄、分析與遏止數位多媒體被非法侵權,成為一個相當重要的議題。
本論文中,我們針對目前最大眾化使用的JPEG影像,提出一套鑑識機制,在此我們分成兩步驟:1. 偵測之前把欲防止非法取得與散佈的影像藏入數位標籤,在不影響影像品質且不被他人察覺的前提下,讓私人的JPEG影像能在封包中被辨識。2. 當數位影像以封包形式在網路上傳送,還未到達用戶端電腦時(on the fly),在特定router後端用網路監聽的方式,在封包鏈中檢測含有數位標籤的JPEG影像,也就是不把封包重組成檔案,直接從網路封包中找出有傳輸該數位影像的可疑犯罪證據,再把這些可疑封包儲存到證據資料庫,輔佐法庭當有力的審判證據。我們所提的方法有別於傳統數位鑑識機制,不透過繁雜的犯罪現場蒐證程序,直接在可信賴的蒐證系統上分析封包,以快速且有效的方式來達到蒐證目的。
In recent years, owing to rapid development in the network and digital multimedia, multimedia information exchange is very convenient in the Internet. However the illegal distribution problems, such as unlawful coping, falsifying and dissemination of pornographic, etc, arise with the convenience. Consequently, network forensic is a significant tool to help the legal issues.
This thesis focuses a packet-level forensic mechanism on JPEG image. The proposed scheme has two phases. At first, on the premise that maintains quality of images, those were embedded particular digital signature are private JPEG images before the detection. Secondly, when the packet train for the target JPEG arrives at a specific router, suspicious packets can be verified with the known digital signature for forensic. We used a simple and valid approach which gathered evidence free from in the crime scene is different from traditional digital forensic mechanism.
[1] W. C. Liu, “A Novel and Efficient Packet-Level JPEG Image Forensics,” Institute of Computer & Communication of NCKU, Taiwan, 2008.
[2] C. J. Hsieh, W. C. Liu and J. S. Li, “An Efficient Packet-level JPEG Forensic Data Collection,” Future generation communication and networking, 2007.
[3] G.K. Wallace, “The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Electronics, vol.38, no.1, pp. 18-34, Feb. 1992.
[4] B. Carrier, “Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers,” International Journal of Digital Evidence, 2003.
[5] S. Mukkamala and A. H. Sung, “Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques,” International Journal of Digital Evidence, 2003.
[6] G. Palmer, “A Road Map for Digital Forensics Research,” Technical Report DTR-T0010-01, DFRWS. Report from the First Digital Forensics Research Workshop (DFRWS), November 2001.
[7] M. Reith, C. Carr and G. Gunsch, “An Examination of Digital Forensic Models”, International Journal of Digital Evidence, 2002.
[8] N. Provos, P. Honeyman, “Detecting steganographic content on the internet,” ISOC NDSS’02, Feb. 2002.
[9] N. Provos, P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security & Privacy Magazine, vol. 1, pp. 32-44, 2003.
[10] J. Fridrich, M. Goljan, D. Hogea, “Attacking the OutGuess,” Proc. ACM: Special Session on Multimedia Security and Watermarking, Juan-les-Pins, France, 2002.
[11] F. Dongdong, Q. S. Yun and S. Wei, “A generalized Benford’s law for JPEG coefficients and its applications in image forensics,” to appear in SPIE, 2007.
[12] F.A.P. Petitcolas, R.J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proceedings of the IEEE, vol. 87, pp. 1062-1078, July 1999.
[13] C.C. Chang, T.S. Chen, L.Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” information Sciences, Vol. 141, pp. 123-138, 2002.
[14] J.F. Kurose, K.W. Ross, K. Ross, “Computer networking: a top-down approach featuring the Internet,” Addison Wesley Longman Inc., 4th Ed., 2007.
[15] A. S. Tanenbaum, “Computer Networks,” Prentice Hall, 4th Ed., 2002.
[16] W.B. Pennebaker and J. L. Mitchell, “JPEG still image data compression standard,” VAN NOSTRAND REINHOLD, 1993.
[17] E. Casey, “Digital evidence and computer crime: forensic science, computers, and the Internet,” Academic Press, 2nd Ed., 2004.
[18] R. Rivest, “RFC 1321: The MD5 Message-Digest Algorithm,” Status: INFORMATIONAL, April, 1992.
[19] Felix Fuentes, Dulal C. Kar, “Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose”, Journal of Computing Sciences in Colleges, Volume 20 , Issue 4 , pp. 169-176, April 2005.
[20] http://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio