Steganography for the Computer Forensics Examiner

نویسنده

  • Gary C. Kessler
چکیده

| Introduction | Null Ciphers | Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015)

| Introduction | Null Ciphers| Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio

متن کامل

An Overview of Steganography for the Computer Forensics Examiner

Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication -to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at computer forensics examiners who need a practical understanding of steganography without delving ...

متن کامل

Steganalysis in Computer Forensics

Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of computer forensics has somewhat fallen behind. This paper will discuss on how steganography is used for information hiding and its implications on computer forensics. While this paper is not about recovering hidden information, tools that are used for both steganography and ...

متن کامل

Steganography: Forensic, Security, and Legal Issues

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the curre...

متن کامل

Fusion of Multi-class Steg- Analysis Systems Using Bayesian Model Averaging

Several steganography methods are available over the Internet for hiding information within digital images. A digital forensics examiner must be able to extract a hidden message from a digital image. Extraction requires first identifying the embedding method used. Several steganalysis systems exist that identify a subset of the available embedding methods. Each steganalysis systems has its own ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007