ch08
ch08
and Investigations
Fifth Edition
Chapter 8
Recovering Graphics Files
Objectives
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 2
Recognizing a Graphics File
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 3
Understanding Bitmap and Raster
Images
• Bitmap images
– Grids of individual pixels
• Raster images - also collections of pixels
– Pixels are stored in rows
– Better for printing
• Image quality
– Screen resolution - determines amount of detail
– Software contributes to image quality (drivers)
– Number of color bits used per pixel
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 4
Understanding Vector Graphics
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 5
Understanding Metafile Graphics
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 6
Understanding Graphics File Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 8
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 9
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 11
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 12
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 13
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 14
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 15
Understanding Digital Camera File
Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 16
Understanding Data Compression
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 17
Lossless and Lossy Compression
• Lossless compression
– Reduces file size without removing data
– Based on Huffman or Lempel-Ziv-Welch coding
• For redundant bits of data
– Utilities: WinZip, PKZip, StuffIt, and FreeZip
• Lossy compression
– Permanently discards bits of information
– Vector quantization (VQ)
• Determines what data to discard based on vectors in the
graphics file
– Utility: Lzip
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 18
Locating and Recovering Graphics
Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 19
Identifying Graphics File Fragments
• Carving or salvaging
– Recovering any type of file fragments
• Digital forensics tools
– Can carve from file slack and free space
– Help identify image files fragments and put them
together
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 20
Repairing Damaged Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 21
Repairing Damaged Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 22
Repairing Damaged Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 23
Repairing Damaged Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 24
Searching For and Carving Data from
Unallocated Space
• Steps
– Planning your examination
– Searching for and recovering digital photograph
evidence
• Use ProDiscover to search for and extract (recover)
possible evidence of JPEG files
• False hits are referred to as false positives
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 25
Searching For and Carving Data from
Unallocated Space
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 26
Searching For and Carving Data from
Unallocated Space
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 27
Searching For and Carving Data from
Unallocated Space
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 28
Searching for and Carving Data from
Unallocated Space
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 29
Searching for and Carving Data from
Unallocated Space
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 30
Rebuilding File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 32
Rebuilding File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 33
Rebuilding File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 34
Rebuilding File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 35
Rebuilding File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 36
Reconstructing File Fragments
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 37
Reconstructing File Fragments
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 38
Reconstructing File Fragments
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 39
Reconstructing File Fragments
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 40
Reconstructing File Fragments
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 41
Identifying Unknown File Formats
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 42
Analyzing Graphics File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 44
Analyzing Graphics File Headers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 45
Tools for Viewing Images
• After recovering a graphics file
– Use an image viewer to open and view it
• No one viewer program can read every file format
– Having many different viewer programs is best
• Most GUI forensics tools include image viewers
that display common image formats
• Be sure to analyze, identify, and inspect every
unknown file on a drive
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 46
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 47
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 48
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 49
Understanding Steganography in
Graphics Files
• Substitution
– Replaces bits of the host file with other bits of data
– Usually change the last two LSBs (least significant bit)
– Detected with steganalysis tools (a.k.a - steg tools)
• You should inspect all files for evidence of
steganography
• Clues to look for:
– Duplicate files with different hash values
– Steganography programs installed on suspect’s drive
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 50
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 51
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 52
Understanding Steganography in
Graphics Files
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 53
Using Steganalysis Tools
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 54
Understanding Copyright Issues with
Graphics
• Steganography has been used to protect
copyrighted material
– By inserting digital watermarks into a file
• Digital investigators need to aware of copyright
laws
• Copyright laws for Internet are not clear
– There is no international copyright law
• Check www.copyright.gov
– U.S. Copyright Office identifies what can and can’t
be covered under copyright law in U.S.
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 55
Summary
• Three types of graphics files
– Bitmap
– Vector
– Metafile
• Image quality depends on various factors
• Standard file formats: .gif, .jpeg, .bmp, and .tif
• Nonstandard file formats: .tga, .rtl, .psd, and .svg
• Some image formats compress their data
– Lossless compression
– Lossy compression
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 56
Summary
• Digital camera photos are typically in raw and EXIF
JPEG formats
• Recovering image files
– Carving file fragments
– Rebuilding image headers
• The Internet is best for learning more about file
formats and their extensions
• Software
– Image editors
– Image viewers
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 57
Summary
• Steganography
– Hides information inside image files
– Forms
• Insertion
• Substitution
• Steganalysis
– Finds whether image files hide information
Guide to Computer Forensics and Investigations, Fifth Edition © Cengage Learning 2015 58