Sure, let's break down and answer each part of the question from the exam paper on Digital Forensics and Anti-Forensics.
4. Digital Forensics and Anti-Forensics
# a) Steganography and Other Anti-Forensic Techniques
(i) Explain briefly what steganography is. Provide a diagram illustrating the agents who participate in a steganographic system. Include those who seek to communicate using the steganographic channel and those who seek to compromise such communications. Identify also the processing carried out by agents and the inputs to such processes.A
Key Concept
Explanation
Steganography is the practice of hiding information within other non-secret text or data. The agents involved include the sender, receiver, and adversary. The sender embeds the secret message into a cover medium (e.g., image, audio), and the receiver extracts it. The adversary attempts to detect or alter the hidden message.
(ii) Outline how Least Significant Bit (LSB) steganography works. Assume that relevant images are grayscale with pixel values in the range 0...255.B
Key Concept
Explanation
LSB steganography involves modifying the least significant bits of pixel values in a grayscale image to embed secret data. For example, if a pixel value is 100 (binary 01100100), changing the least significant bit to 1 would make it 101 (binary 01100101).
(iii) One of the goals of an adversary is to detect the use of steganography. State whether you think the use of LSB steganography is easily detected or not and whether the number of least significant bits used by an LSB scheme (e.g., single least significant bit or least significant 2 bits) affects detectability. Justify your answers.C
Key Concept
Detectability of LSB Steganography
Explanation
The use of LSB steganography can be detected through statistical analysis. The more bits used (e.g., 2 LSBs vs. 1 LSB), the easier it is to detect because it introduces more noticeable changes in the image's statistical properties.
(iv) Steganography can be regarded as an anti-forensics technique. Briefly outline 3 other anti-forensic techniques.D
Key Concept
Explanation
Three other anti-forensic techniques include data wiping (securely deleting data), file obfuscation (renaming or altering file headers), and encryption (making data unreadable without a key).
# b) Camera Forensics
(i) Briefly explain what is meant by source classification, device identification, and device linking.A
Key Concept
Explanation
Source classification involves determining the type of device used to capture an image. Device identification is pinpointing the exact device. Device linking connects multiple images to the same device.
(ii) Outline one technical means of identifying the use of a specific camera.B
Key Concept
Technical Means of Camera Identification
Explanation
One method is analyzing the sensor pattern noise (SPN) unique to each camera sensor, which acts like a fingerprint.
# c) Traffic Analysis
(i) An operational military unit communicates via a radio frequency multi-hop network. Explain how traffic analysis can be used to gain information on the network. Identify clearly what information can be gained in this way.A
Key Concept
Explanation
Traffic analysis involves monitoring and analyzing communication patterns to infer information such as network topology, node roles, and communication frequency. This can reveal critical nodes and potential vulnerabilities.
(ii) Briefly outline one technical means of identifying the use of a specific camera.B
Key Concept
Technical Means of Camera Identification
Explanation
As mentioned earlier, sensor pattern noise (SPN) can be used to identify a specific camera. This noise pattern is unique to each camera sensor and can be extracted from images.
I hope this helps you understand and answer the various parts of the question!