Forensic statisticians hunting for hidden messages

Nov 09, 2006

Two Iowa State mathematicians have developed software that will detect secret files in seemingly innocent digital images. Jennifer Davidson and Cliff Bergman, both professors in the math department, are fine-tuning the artificial neural net (ANN). When plopped into a computer, the ANN will work like radar that culls out suspicious images.

If terrorists aren't already using it, it's only a matter of time. It's called steganography, a way to hide messages in seemingly innocent digital images. Apparently harmless JPEG files, such as family vacation photos containing hidden data, could be e-mailed or posted on the Web -- possibly activating terrorist cells.

To help catch the bad guys, two Iowa State University mathematicians have developed software that will detect secret files in images. Jennifer Davidson and Cliff Bergman, both professors in the math department, are fine-tuning the artificial neural net (ANN). When plopped into a computer, the ANN will work like radar that culls out suspicious images.

The software was created with local law enforcement in mind. Plans to have it field-tested in Iowa are under way.

Forensic statisticians hunting for hidden messages
Seemingly innocent images can be used to hide other computer data using steganography programs. ISU mathematicians are using a pattern-recognition system to distinguish between innocent images and not-so-innocent images. Photos courtesy of Ames Lab.

"Any forensic tool you can get your hands on is valuable," said Michael Morris, special agent supervisor with the Division of Criminal Investigation in Iowa. "The whole Internet and computer world changes by the minute. That's why having new tools to combat the changing technology is important."

Morris added that an application for the ANN would be terrorist-type investigations.

So how does it all work?

"An image is just a series of dots," Bergman said. "One way to embed data is to just change the value of those dots. If you change those numbers slightly, that change contains the hidden data."

There are steganography, or "stego" programs that criminals can download for free to embed a secret file, or payload -- which can be another image or text. The programs look at the payload as represented by a string of zeroes and ones. The program then adjusts pixel values (or dots) in the "cover" image to even-odd numbers that represent the zeros and ones from the secret file. For instance, it may adjust a grayscale value of 146 to 145. The receiver on the other end can look at the even-odd pixel values to reconstruct the secret file's string of zeros and ones.

Adding another complication for investigators, there is a good chance secret files would be encrypted.

"We're hopeful that just the fact that you've found, say, a cache of suspicious images, ought to be enough to at least warrant further investigation," Bergman said.

"When you insert this information into the image file, encrypted or not, there are certain statistical values or measures of images that will change from one that has a message in it and one that doesn't," Davidson said. The ANN is trained to use sophisticated pattern recognition as it takes multiple measures of statistical values in an image.

The ANN program was trained on a database of more than 10,000 images. The database was built using 1,300 clean images, a certain percentage of which were altered using various stego embedding techniques. In preliminary tests, the ANN identified 92 percent of the stego images and flagged only 10 percent of the innocent images.

Bergman and Davidson hope to improve those results to come up with statistics convincing enough for forensic scientists to use in a court of law. The two foresee the evidence being used much in the way DNA evidence is used to establish a link between the defendant and the crime.

Source: Iowa State University, by Samantha Beres

Explore further: Computer scientists win a major grant to network mobile devices in the cloud

add to favorites email to friend print save as pdf

Related Stories

CT scans of Egyptian mummy help Vt. solve crimes

Apr 26, 2011

A childhood fascination with archaeology and a chance encounter with a 2,700-year-old Egyptian mummy are helping Vermont doctors and law enforcement officials find truth in some of the most challenging of ...

The future of reading

Jul 21, 2010

Emma Teitgen, 12, thought the chemistry book her teacher recommended would make perfect bedside reading. Perfect because it might help her fall asleep.

Global warming slows coral growth in Red Sea

Jul 15, 2010

In a pioneering use of computed tomography (CT) scans, scientists at Woods Hole Oceanographic Institution (WHOI) have discovered that carbon dioxide (CO2)-induced global warming is in the process of killing ...

Recommended for you

Computerized emotion detector

4 hours ago

Face recognition software measures various parameters in a mug shot, such as the distance between the person's eyes, the height from lip to top of their nose and various other metrics and then compares it with photos of people ...

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Teaching computers the nuances of human conversation

Sep 12, 2014

Computer scientists have successfully developed programs to recognize spoken language, as in automated phone systems that respond to voice prompts and voice-activated assistants like Apple's Siri.

Mapping the connections between diverse sets of data

Sep 12, 2014

What is a map? Most often, it's a visual tool used to demonstrate the relationship between multiple places in geographic space. They're useful because you can look at one and very quickly pick up on the general ...

User comments : 0