Steganography for the Computer Forensics Examiner
نویسنده
چکیده
| Introduction | Null Ciphers | Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio
منابع مشابه
An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015)
| Introduction | Null Ciphers| Digital Image and Audio | Digital Carrier Methods Steganography Examples | Detecting Steganography | Steganography Detection Tools | Summary and Conclusions References | Additional Websites | Companion Downloads | Commercial Vendors | Author's Bio
متن کاملAn Overview of Steganography for the Computer Forensics Examiner
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication -to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at computer forensics examiners who need a practical understanding of steganography without delving ...
متن کاملSteganalysis in Computer Forensics
Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of computer forensics has somewhat fallen behind. This paper will discuss on how steganography is used for information hiding and its implications on computer forensics. While this paper is not about recovering hidden information, tools that are used for both steganography and ...
متن کاملSteganography: Forensic, Security, and Legal Issues
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the curre...
متن کاملFusion of Multi-class Steg- Analysis Systems Using Bayesian Model Averaging
Several steganography methods are available over the Internet for hiding information within digital images. A digital forensics examiner must be able to extract a hidden message from a digital image. Extraction requires first identifying the embedding method used. Several steganalysis systems exist that identify a subset of the available embedding methods. Each steganalysis systems has its own ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007