Title

Steganalysis in computer forenics

Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University

Place of Publication

Perth, Western Australia

Faculty

Computing, Health and Science

School

Computing, Health and Science

RAS ID

3964

Comments

This paper was originally published as: Ibrahim, A. (2007, December). Steganalysis in Computer Forensics. In proceedings of the 5th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia. Original article available here

Abstract

Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of computer forensics has somewhat fallen behind. This paper will discuss on how steganography is used for information hiding and its implications on computer forensics. While this paper is not about recovering hidden information, tools that are used for both steganography and steganalysis is evaluated and identifies the shortcomings that the forensic analysts would face. In doing so this paper urges on what the stakeholders in the field of computer forensics needs to do to keep ahead of criminals who are using such techniques to their advantage and obscure their criminal activities.