簡易檢索 / 詳目顯示

研究生: 翁吉田
Weng, Chi‐Tien
論文名稱: 一個新的網路層封包數位標籤的嵌入與偵測之鑑識方法用於JPEG影像之研究
Novel Packet‐level JPEG Forensics Scheme for Packet Signature Embedding and Detection
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 50
中文關鍵詞: 網路監聽Packet-level標籤數位鑑識資訊隱藏JPEG
外文關鍵詞: JPEG, Information hiding, Packet-level signature, Network monitor, Digital forensic
相關次數: 點閱:117下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來由於網路及數位多媒體相關技術突飛猛進,利用網路做多媒體資訊交換變得相當方便,然而在便利的數位傳播技術下卻突顯出許多法律議題,如非法複製、篡改、詐欺及色情傳播等問題,因此如何有效追蹤、記錄、分析與遏止數位多媒體被非法侵權,成為一個相當重要的議題。

    本論文中,我們針對目前最大眾化使用的JPEG影像,提出一套鑑識機制,在此我們分成兩步驟:1. 偵測之前把欲防止非法取得與散佈的影像藏入數位標籤,在不影響影像品質且不被他人察覺的前提下,讓私人的JPEG影像能在封包中被辨識。2. 當數位影像以封包形式在網路上傳送,還未到達用戶端電腦時(on the fly),在特定router後端用網路監聽的方式,在封包鏈中檢測含有數位標籤的JPEG影像,也就是不把封包重組成檔案,直接從網路封包中找出有傳輸該數位影像的可疑犯罪證據,再把這些可疑封包儲存到證據資料庫,輔佐法庭當有力的審判證據。我們所提的方法有別於傳統數位鑑識機制,不透過繁雜的犯罪現場蒐證程序,直接在可信賴的蒐證系統上分析封包,以快速且有效的方式來達到蒐證目的。

    In recent years, owing to rapid development in the network and digital multimedia, multimedia information exchange is very convenient in the Internet. However the illegal distribution problems, such as unlawful coping, falsifying and dissemination of pornographic, etc, arise with the convenience. Consequently, network forensic is a significant tool to help the legal issues.

    This thesis focuses a packet-level forensic mechanism on JPEG image. The proposed scheme has two phases. At first, on the premise that maintains quality of images, those were embedded particular digital signature are private JPEG images before the detection. Secondly, when the packet train for the target JPEG arrives at a specific router, suspicious packets can be verified with the known digital signature for forensic. We used a simple and valid approach which gathered evidence free from in the crime scene is different from traditional digital forensic mechanism.

    摘要 III ABSTRACT IV ACKNOWLEDGEMENT V CHAPTER1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 MOTIVATION AND CONTRIBUTION 2 1.3 ORGANIZATION 4 CHAPTER2 BACKGROUND AND RELATED WORK 5 2.1 DIGITAL EVIDENCE 5 2.2 DIGITAL FORENSICS 6 2.3 INFORMATION HIDING AND DETECTION 8 2.3.1 Information Hiding 8 2.3.2 Stego detection 11 2.4 DIGITAL IMAGE FORENSIC 12 2.5 JPEG COMPRESSION STANDARD 13 CHAPTER3 SYSTEM SCHEME 20 3.1 SYSTEM ASSUMPTION 20 3.2 FRAMEWORK INTRODUCTION 21 3.3 SIGNATURE EMBEDDED METHOD 22 3.3.1 Method 1 algorithm 24 3.3.1.1. Flowchart with single JPEG compression on LSB 24 3.3.1.2. Flowchart with multiple JPEG compression on LSB 26 3.3.2 Method 2 algorithm 27 3.3.2.1. Flowchart with single JPEG compression on LTSB 27 3.3.2.2. Flowchart with multiple JPEG compression on LTSB 28 3.4 EVIDENCE COLLECTION SYSTEM 29 3.4.1 Data transmission in TCP/IP module 30 3.4.2 Signature detection and suspicious packets collection system 33 CHAPTER4 SIMULATION RESULTS 37 4.1 DISCUSSIONS IMAGE QUALITY AFTER EMBEDDED SIGNATURE 37 4.2 SUSPICIOUS PACKETS DETECTION RESULT 41 CHAPTER5 DISCUSSION 43 5.1 COMPUTATIONAL COMPLEXITY IN OUR PACKET-LEVEL DETECTION 43 5.2 COMPUTATIONAL COMPLEX IN AN STEGDETECT METHOD 44 5.3 TIME CONSUMPTION OF PACKET-LEVEL IMAGE FORENSICS 46 5.4 INTEGRATION OF COMPUTATIONAL COMPLEXITY 47 CHAPTER6 CONCLUSION 48 REFERENCES 49

    [1] W. C. Liu, “A Novel and Efficient Packet-Level JPEG Image Forensics,” Institute of Computer & Communication of NCKU, Taiwan, 2008.

    [2] C. J. Hsieh, W. C. Liu and J. S. Li, “An Efficient Packet-level JPEG Forensic Data Collection,” Future generation communication and networking, 2007.

    [3] G.K. Wallace, “The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Electronics, vol.38, no.1, pp. 18-34, Feb. 1992.

    [4] B. Carrier, “Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers,” International Journal of Digital Evidence, 2003.

    [5] S. Mukkamala and A. H. Sung, “Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques,” International Journal of Digital Evidence, 2003.

    [6] G. Palmer, “A Road Map for Digital Forensics Research,” Technical Report DTR-T0010-01, DFRWS. Report from the First Digital Forensics Research Workshop (DFRWS), November 2001.

    [7] M. Reith, C. Carr and G. Gunsch, “An Examination of Digital Forensic Models”, International Journal of Digital Evidence, 2002.

    [8] N. Provos, P. Honeyman, “Detecting steganographic content on the internet,” ISOC NDSS’02, Feb. 2002.

    [9] N. Provos, P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security & Privacy Magazine, vol. 1, pp. 32-44, 2003.

    [10] J. Fridrich, M. Goljan, D. Hogea, “Attacking the OutGuess,” Proc. ACM: Special Session on Multimedia Security and Watermarking, Juan-les-Pins, France, 2002.

    [11] F. Dongdong, Q. S. Yun and S. Wei, “A generalized Benford’s law for JPEG coefficients and its applications in image forensics,” to appear in SPIE, 2007.

    [12] F.A.P. Petitcolas, R.J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proceedings of the IEEE, vol. 87, pp. 1062-1078, July 1999.

    [13] C.C. Chang, T.S. Chen, L.Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” information Sciences, Vol. 141, pp. 123-138, 2002.

    [14] J.F. Kurose, K.W. Ross, K. Ross, “Computer networking: a top-down approach featuring the Internet,” Addison Wesley Longman Inc., 4th Ed., 2007.

    [15] A. S. Tanenbaum, “Computer Networks,” Prentice Hall, 4th Ed., 2002.

    [16] W.B. Pennebaker and J. L. Mitchell, “JPEG still image data compression standard,” VAN NOSTRAND REINHOLD, 1993.

    [17] E. Casey, “Digital evidence and computer crime: forensic science, computers, and the Internet,” Academic Press, 2nd Ed., 2004.

    [18] R. Rivest, “RFC 1321: The MD5 Message-Digest Algorithm,” Status: INFORMATIONAL, April, 1992.

    [19] Felix Fuentes, Dulal C. Kar, “Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose”, Journal of Computing Sciences in Colleges, Volume 20 , Issue 4 , pp. 169-176, April 2005.

    [20] http://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio

    下載圖示 校內:2010-07-28公開
    校外:2010-07-28公開
    QR CODE