Image Forensics Tool with Steganography Detection
DOI:
https://doi.org/10.61841/5sj83618Keywords:
Image Forensics, Image Forgery Detection, Image Steganography, Image Steganalysis, Image Processing.Abstract
The problem context that inspired and motivated this project idea is that as the quote says a picture or image speaks a thousand words. An Image is forensically rich media it contains a lot of metadata you can extract for any Digital Forensics investigation and it can answer the 3 w’s. which is what (what device is used to capture the picture or Image), where (The location where the picture or image was capture) and when (the exact time and date when the image was capture). The current issues are that most of the current image forensics tools is their output is too complex to understand, for students starting out their studies into digital forensics its quite difficult for them to comprehend some details of their output. The tool will also detect if the image has been tempered with if any hidden messages or items is stored inside using steganography. The project is an Image Forensics Tool with Steganography Detection, which can aid in a digital forensics’ investigation where by the investigator is required to get metadata out of any Digital image.
Downloads
References
[1] M.D. Ansari, S.P. Ghrera and V. Tyagi, “Pixel-Based Image Forgery Detection: A Review,” IETE Journal
of Education, 2014.
[2] B. Li, J. He, J. Huang and Y. Q. Shi, “A Survey on Image Steganography and Steganalysis,” Journal of
Information Hiding and Multimedia Signal Processing, vol. 2, no. 11, p. 2, 2011.
[3] N. Schonning, N. Potapenko, t. pratt, M. Hoffman, M. Jones, L. Latham and M. Wenzel, “How to: Read
Image Metadata,” 2017. [Online]. Available: https://docs.microsoft.com/en-us/dotnet/framework/
winforms/advanced/how-to-read-image-metadata. [Accessed 30 1 2019].
[4] Merriam Webster, “meme,” 2019. [Online]. Available: https://www.merriam-webster.com/ dictionary/
meme. [Accessed 21 1 2019].
[5] M. Kan, “Hacker Uses Internet Meme to Send Hidden Commands to Malware,” 2018. [Online]. Available:
https://sea.pcmag.com/news/30767/hacker-uses-internet-meme-to-send-hidden-commands-to-malware.
[Accessed 20 1 2019].
[6] T. Marques, “PNG Embedded – Malicious payload hidden in a PNG file,” 2016. [Online]. Available:
https://securelist.com/png-embedded-malicious-payload-hidden-in-a-png-file/74297/. [Accessed 20 1
2019].
[7] D. Cid, “Malware Hidden Inside JPG EXIF Headers,” 2013. [Online]. Available: https://blog.sucuri.net/
2013/07/malware-hidden-inside-jpg-exif-headers.html. [Accessed 20 1 2019].
[8] Microsoft Doc, “Image.PropertyItems Property,” [Online]. Available: https://docs.microsoft.com/enus/dotnet/api/system.drawing.image.propertyitems?redirectedfrom=MSDN&view=netframework-
4.7.2#System_Drawing_Image_PropertyItems. [Accessed 5 2 2019].
[9] Microsoft, “PropertyItem.Id Property,” [Online]. Available: https://docs.microsoft.com/en-us/dotnet/api/
system.drawing.imaging.propertyitem.id?redirectedfrom=MSDN&view=netframework-4.7.2#System_
Drawing_Imaging_PropertyItem_Id. [Accessed 15 2 2019].
[10] Layola Marymount University, “webapps,” [Online]. Available: http://cs.lmu.edu/~ray/notes/webapps/.
[Accessed 29 January 2019].
[11] Microsoft, “Steganography - LSB,” 2014. [Online]. Available: https://social.msdn.microsoft.com/
Forums/vstudio/en-US/ae4c9a97-286b-467f-ae58-0774c9c0d7c6/steganography-lsb?forum=vbgeneral.
[Accessed 16 2 2019].
[12] Microsoft, “PropertyItem Class,” 2015. [Online]. Available: https://docs.microsoft.com/enus/dotnet/api/system.drawing.imaging.propertyitem?redirectedfrom=MSDN&view=netframework-4.7.2.
[Accessed 15 2 2019].
[13] Cyberdiligence.com, “Email Forensics,” 2014. [Online]. Available: http://www.cyberdiligence.com/
email_forensics.html. [Accessed 24 November 2018].
[14] Paraben, “Paraben Email Examiner,” 2018. [Online]. Available: https://www.paraben.com/products/e3-
emx. [Accessed 24 November 2018].
[15] Veracode, “Common Malware Types: Cybersecurity 101,” 2012. [Online]. Available:
ahttps://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101. [Accessed 29
January 2019].
[16] Penn State Extension, “Standard Operating Procedures: A Writing Guide,” 2019. [Online]. Available:
https://extension.psu.edu/standard-operating-procedures-a-writing-guide. [Accessed 29 January 2019].
[17] J. Kennedy and M. Satran, “Property Item Descriptions,” [Online]. Available: https://docs.microsoft.com/
en-us/windows/desktop/gdiplus/-gdiplus-constant-property-item-descriptions. [Accessed 12 2 2019].
[18] Paweł Korus, “Digital image integrity – a survey of protection and verification techniques,” Elsevier, 2017.
[19] D. Schweitzer, Incident Response: Computer Forensics Toolkit, 1 ed., Wiley Publishing Inc.
[20] B.S. Felix C. Freiling, “A Common Process Model for Incident Response and Computer Forensics,” 2011.
[21] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, “Digital image steganography: Survey and analysis of
current methods,” Signal Processing, vol. Volume 90, no. Issue 3, pp. 727-752, 2010.
[22] J. Kamenicky, M. Bartos, J. Flusser, BabakMahdiana, J. Koteraa, A. Novozamskya, S. Saic, F. Sroubek, M.
Sorel, A. Zita, B. Zitova, Z. Sima, P. Svarc and J. Horinek, “PIZZARO: Forensic analysis and restoration
of image and video data,” Forensic Science International, vol. 264, pp. 153-166, 2016.
[23] X. Qiu, H. Li, W. Luo and J. Huang, “A universal image forensic strategy based on steganalytic model,”
ACM, pp. 1-1, 2016.
[24] N. Afshin, F. Razzazi and M.-S. Moin, “A dictionary based approach to JPEG anti-forensics,” 2016 IEEE
8th International Conference on Intelligent Systems (IS), 2016.
[25] G. Fahmy and R. Wurtz, “Phase based forgery detection of JPEG anti forensics,” 2016 IEEE International
Symposium on Signal Processing and Information Technology (ISSPIT), 2016.
[26] F. Wei, W. Kai, C. François and X. Zhang, “JPEG Anti-Forensics with Improved Tradeoff between
Forensic Undetectability and Image Quality,” IEEE Transactions on Information Forensics and Security,
vol. 9, no. 8, pp. 1211 - 1226, 2014.
[27] H.T. Sencar and N. Memon, Digital Image Forensics: There is more to a Picture than Meets the Eye, New
York: Springer, 2013.
[28] H. Farid, Fake photo, The MIT Press Publication, 2019.
[29] H. Farid, Photo Forensics, MIT press, 2016.
[30] D. Cabrera, “Get image file metadata in C# using .NET,” 2018. [Online]. Available: https://medium.com/
@dannyc/get-image-file-metadata-in-c-using-net-88603e6da63f. [Accessed 4 2 2019].
[31] D. Noakes, “C# Exif code - sample usage,” 2011. [Online]. Available: http://www.holmessoft.co.uk/
homepage/Software/ExifUsage.htm. [Accessed 11 2 2019].
[32] S. Ambli, “Getting Started with Image Processing,” 2014. [Online]. Available: https://code.msdn.microsoft.
com/Getting-Started-with-Image-74a37d8b/sourcecode?fileId=113114&pathId=208812097. [Accessed 15
2 2019].
[33] R. Stephens, “compare images to find differences in c,” 2015. [Online]. Available:
http://csharphelper.com/blog/2015/07/compare-images-to-find-differences-in-c/. [Accessed 17 2 2019].
[34] R. Stephens, “use image subtraction to compare images in c,” 2015. [Online]. Available:
http://csharphelper.com/blog/2015/07/use-image-subtraction-to-compare-images-in-c/. [Accessed 15 2
2019].
[35] H. soboh, “Steganography: Simple Implementation in C#,” 2014. [Online]. Available:
https://www.codeproject.com/Tips/635715/Steganography-Simple-Implementation-in-Csharp. [Accessed
17 2 2019].
[36] A. Tanasi and M. Buoncristiano, “Ghiro,” 2018. [Online]. Available: http://www.getghiro.org/. [Accessed
29 12 2018].
[37] A. Tanasi and M. Buoncristiano, “Image Forensic,” 2019. [Online]. Available:
http://www.imageforensic.org/. [Accessed 12 1 2019].
[38] N. Krawetz, “Foto Forensics,” 2019. [Online]. Available: http://fotoforensics.com/. [Accessed 10 1 2019].
[39] B. Turnbull and S. Randhawa, “Automated event and social network extraction from digital evidence
sources with ontological mapping,” Digital Investigation, vol. 13, pp. 94-106, 2015.
[40] D. Quick and K.K. R. Choo, “Big forensic data reduction: digital forensic images and electronic evidence,”
The Journal of Networks, Software Tools and Applications, vol. 22, 2016.
[41] N. Singh and S. Joshi, “Digital Image Forensics: Progress and Challenges,” National convention of
Electronics and Telecommunication Engineers, vol. 31, 2015.
[42] B.V. Prasanthi, “Cyber Forensic Tools: A Review,” International Journal of Engineering Trends and
Technology (IJETT), vol. 41, no. 5, 2016.
[43] M. Cicconet, H. Elliott, D. Richmond, D. Wainstock and M. Walsh, “Image Forensics: Detecting
duplication of scientific images with manipulation-invariant image similarity,” arXiv., 2018.
[44] A. Singh and J. Malik, “A Comprehensive Study of Passive Digital Image Forensics Techniques based on
Intrinsic Fingerprints,” International Journal of Computer Applications, vol. 116, no. 19, 2015.
[45] S. Wickramasinghe and S. Hettiarachchi, “Use of Computer Forensics and Its Implications,” Research
Gate, 2016.
[46] F.Y.L. Chow, “Computer Forensics – An Essential Element of Modern IT Security,” Journal of Harbin
Institute of Technology, vol. 6, no. 2014, 2014.
[47] T.S. Amor Lazzez, “Forensics Investigation of Web Application Security Attacks,” I. J. Computer Network
and Information Security, 2015.
[48] L.R.J. III, Computer Incident Response and Forensics Team Management Conducting a Successful
Incident Response, elsevier, 2014.
[49] N.M.N. Sundresan Perumal, “New Improvement in Digital Forensic Standard Operating Procedure (SOP),”
Proceedings of the 3rd International Conference on Computing and Informatics, ICOCI, vol.3, no. 104,
2011.
[50] I.L. L. A.C. Yun-Sheng Yen, “A Study on Digital Forensics Standard Operation Procedure for Wireless
Cybercrime,” International Journal of Computer Engineering Science (IJCES), vol. 2, no. 3, 2012.
[51] R.H.A. Baláž, “Forensic Analysis of Compromised Systems,” IEEE International Conference on Emerging
eLearning Technologies and Applications, vol. 10, 2012.
[52] M.T. Banday, “Techniques and Tools for Forensic Investigation of E-Mail,” International Journal of
Network Security & Its Applications (IJNSA), vol. 3, no. 6, 2011.
[53] Microsoft, “System. Drawing. Imaging Namespace,” 2015. [Online]. Available:
https://docs.microsoft.com/en-us/dotnet/api/system.drawing.imaging?view=netframework-4.8. [Accessed
22 1 2019].
[54] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760, ISSN
Online: 2162-2086.
[55] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The
Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997, which is in C category of
ABDC List. http://www.eel.my100megs.com/volume-18-number-3.htm
[56] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International
Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014.
[57] P. Mary Jeyanthi, “Industry 4.O: The combination of the Internet of Things (IoT)and the Internet of People
(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-
9785.
[58] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An
Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN
Online: 2350-1111 (Online).
[59] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in
Financial Institutions”, Vivekananda Journal of Research. Vol. 7, Special Issue 1, May 2018, ISSN 2319-
8702(Print), ISSN 2456-7574(Online).
[60] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization
Approach”, International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.
[61] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision
Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-
2013. URL: https://www.ijert.org/browse/volume-2-2013/august-2013-edition?start=140
[62] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic
Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and
Communication Engineering, Volume 3, Issue 3, March-2014. URL: https://ijarcce.com/wpcontent/uploads/2012/03/IJARCCE7F-a-mary-prem-A-NEW-IMPLEMENTATION.pdf
[63] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical
Study”, International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.
URL: http://www.hindex.org/2015/p1258.pdf
[64] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud
Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)
[65] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment
generation in the field of UPVC widows” (ICSMS2019).
[66] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across
emerging countries”, International Conference on Sustainability Management and Strategy”
(ICSMS2018).
[67] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International
Conference on Business Management and Information Systems” (ICBMIS2015).
[68] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International
Conference on Mathematics in Engineering & Business Management (ICMEB 2012).
[69] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear
Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering
& Business Management (ICMEB 2012).
[70] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision
Making”, 2011 IEEE International Conference on Computational Intelligence and Computing Research
(2011 IEEE ICCIC).
[71] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome
the Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing
Research (2011 IEEE ICCIC).
[72] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing
and Communication Technologies. (SCCT-2015)
[73] Dr.P. Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm
for Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019
[74] Dr.P. Mary Jeyanthi, “Customer Value Management (CVM) – Thinking Inside the box” – ISBN: 978-93-
87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.
[75] Jeyanthi, P.M., & Shrivastava, S.K. (2019). The Determinant Parameters of Knowledge Transfer among
Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.