Forensic statisticians hunting for hidden messages

November 9, 2006

Two Iowa State mathematicians have developed software that will detect secret files in seemingly innocent digital images. Jennifer Davidson and Cliff Bergman, both professors in the math department, are fine-tuning the artificial neural net (ANN). When plopped into a computer, the ANN will work like radar that culls out suspicious images.

If terrorists aren't already using it, it's only a matter of time. It's called steganography, a way to hide messages in seemingly innocent digital images. Apparently harmless JPEG files, such as family vacation photos containing hidden data, could be e-mailed or posted on the Web -- possibly activating terrorist cells.

To help catch the bad guys, two Iowa State University mathematicians have developed software that will detect secret files in images. Jennifer Davidson and Cliff Bergman, both professors in the math department, are fine-tuning the artificial neural net (ANN). When plopped into a computer, the ANN will work like radar that culls out suspicious images.

The software was created with local law enforcement in mind. Plans to have it field-tested in Iowa are under way.

Seemingly innocent images can be used to hide other computer data using steganography programs. ISU mathematicians are using a pattern-recognition system to distinguish between innocent images and not-so-innocent images. Photos courtesy of Ames Lab.
"Any forensic tool you can get your hands on is valuable," said Michael Morris, special agent supervisor with the Division of Criminal Investigation in Iowa. "The whole Internet and computer world changes by the minute. That's why having new tools to combat the changing technology is important."

Morris added that an application for the ANN would be terrorist-type investigations.

So how does it all work?

"An image is just a series of dots," Bergman said. "One way to embed data is to just change the value of those dots. If you change those numbers slightly, that change contains the hidden data."

There are steganography, or "stego" programs that criminals can download for free to embed a secret file, or payload -- which can be another image or text. The programs look at the payload as represented by a string of zeroes and ones. The program then adjusts pixel values (or dots) in the "cover" image to even-odd numbers that represent the zeros and ones from the secret file. For instance, it may adjust a grayscale value of 146 to 145. The receiver on the other end can look at the even-odd pixel values to reconstruct the secret file's string of zeros and ones.

Adding another complication for investigators, there is a good chance secret files would be encrypted.

"We're hopeful that just the fact that you've found, say, a cache of suspicious images, ought to be enough to at least warrant further investigation," Bergman said.

"When you insert this information into the image file, encrypted or not, there are certain statistical values or measures of images that will change from one that has a message in it and one that doesn't," Davidson said. The ANN is trained to use sophisticated pattern recognition as it takes multiple measures of statistical values in an image.

The ANN program was trained on a database of more than 10,000 images. The database was built using 1,300 clean images, a certain percentage of which were altered using various stego embedding techniques. In preliminary tests, the ANN identified 92 percent of the stego images and flagged only 10 percent of the innocent images.

Bergman and Davidson hope to improve those results to come up with statistics convincing enough for forensic scientists to use in a court of law. The two foresee the evidence being used much in the way DNA evidence is used to establish a link between the defendant and the crime.

Source: Iowa State University, by Samantha Beres

Explore further: Stressed, toxic, zombie cells seen for first time in Alzheimer's

Related Stories

Researchers detect secret files lurking within digital images

May 24, 2006

Keeping computer files private requires only the use of a simple encryption program. For criminals or terrorists wanting to conceal their activities, however, attaching an encrypted file to an e-mail message is sure to raise ...

How computers help biologists crack life's secrets

December 17, 2015

Once the three-billion-letter-long human genome was sequenced, we rushed into a new "omics" era of biological research. Scientists are now racing to sequence the genomes (all the genes) or proteomes (all the proteins) of ...

Dutch researchers uncover dirty jokes in Anne Frank's diary

May 15, 2018

Researchers using digital technology deciphered the writing on two pages of Anne Frank's diary that she had pasted over with brown masking paper, discovering four naughty jokes and a candid explanation of sex, contraception ...

Recommended for you

Permanent, wireless self-charging system using NIR band

October 8, 2018

As wearable devices are emerging, there are numerous studies on wireless charging systems. Here, a KAIST research team has developed a permanent, wireless self-charging platform for low-power wearable electronics by converting ...

Facebook launches AI video-calling device 'Portal'

October 8, 2018

Facebook on Monday launched a range of AI-powered video-calling devices, a strategic revolution for the social network giant which is aiming for a slice of the smart speaker market that is currently dominated by Amazon and ...

Artificial enzymes convert solar energy into hydrogen gas

October 4, 2018

In a new scientific article, researchers at Uppsala University describe how, using a completely new method, they have synthesised an artificial enzyme that functions in the metabolism of living cells. These enzymes can utilize ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.