Steganalysis in computer forensics

Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University

Place of Publication

Perth, Western Australia

Faculty

Faculty of Computing, Health and Science

School

School of Computing, Health and Science

RAS ID

3964

Comments

Ibrahim, A. (2007, December). Steganalysis in Computer Forensics. In proceedings of the 5th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia. Available here

Abstract

Steganography deals with secrecy and convert communication and today the techniques for countering this in the context of computer forensics has somewhat fallen behind. This paper will discuss on how steganography is used for information hiding and its implications on computer forensics. While this paper is not about recovering hidden information, tools that are used for both steganography and steganalysis is evaluated and identifies the shortcomings that the forensic analysts would face. In doing so this paper urges on what the stakeholders in the field of computer forensics needs to do to keep ahead of criminals who are using such techniques to their advantage and obscure their criminal activities.

DOI

10.4225/75/57ad58327ff2e

Access Rights

free_to_read

Share

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57ad58327ff2e