Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Steganography: how it is used for counter/anti-forensics - Research Paper Example

Comments (0) Cite this document
It also refers to covert and secret communication and it includes techniques of broadcasting surreptitious messages by means of inoffensive cover…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Steganography: how it is used for counter/anti-forensics
Read TextPreview

Extract of sample "Steganography: how it is used for counter/anti-forensics"

Download file to see previous pages hare (2009) explains that steganography works by replacing bits of unused or useless data in regular computer files such as HTML, graphics, text, and sound, with bits of different, invisible information. The hidden information can be an image, plaintext, or ciphertext. Ec-Council (2009) also explains that unlike encryption whereby there is evidence that communication has taken place, steganography conceals the fact that a message is even being sent. For extra security, steganography can be used to conceal information in an encrypted file, in such a way that even if one decrypts the file, the message will remain hidden.
Steganography can be traced back to ancient Greece, where common practices entailed engraving messages in wooden tablets and plastering them with wax, and tattooing a shaved head of a messenger, allowing his hair grow back, and then cutting it off once he arrived at his contact point. Today, one can use steganographic techniques to conceal secret information in digital video and audio files, digital image folders, as well as other digital media with some replaceable redundant bits that can to conceal secret information. Simmons first came up with the idea of steganography in the beginning of the 1980s while he discussed inmates’ problem. He talked about a situation whereby two inmates in different cells have to correspond with each other inoffensively without arousing any suspicion. Simmons used the notion of subliminal channels in place of steganography, and this was one of the first attempts into steganography as a field (Potdar1, et al., 2006).
Steganography has been used for both legitimate purposes such as digital fingerprinting, watermarking, and copyrighting, and for illegitimate purposes, one of the illegitimate purposes being when a person is attempting to steal data, whereby he/she hides it in another file and sends it as an innocuous file transfer or email. People also use steganography to transfer/hide ponographic data, other use it ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Steganography: how it is used for counter/anti-forensics Research Paper”, n.d.)
Steganography: how it is used for counter/anti-forensics Research Paper. Retrieved from
(Steganography: How It Is Used for counter/Anti-Forensics Research Paper)
Steganography: How It Is Used for counter/Anti-Forensics Research Paper.
“Steganography: How It Is Used for counter/Anti-Forensics Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Steganography: how it is used for counter/anti-forensics


...his followers. Considerable focus was given to the potential that messages were concealed in these videos. Despite investigation no messages were ever uncovered. Currently, the United States government has developed a Counter Terrorist Steganography Search Engine that attempts to detect the most likely sources for terrorist steganography messages. Miscellaneous Uses Another major contemporary use of steganographic techniques has been in digital watermarking. While generally the intention of steganography is to conceal messages, digital watermarking has frequently been implemented to prevent the replication of a file or document. Digital...
11 Pages(2750 words)Research Paper

Computer Forensics

...?Part Computer forensics has always interested me and though I have considered myself close to being an expert in computer science, I must admit I have had to concede that I have learned that one can do many illicit things with a computer; situations that I did not know existed. Yet on the same token the forensic investigators, “the good guys”, can counter these illegal operations with many sophisticated tricks of their own. Sometimes it is not as instantaneous or glamorous as the fancy gadgets they show on CSI NY but they have many tools available to recreate crimes that can eventually hold up in court. But the TV shows have it right in at least one respect. Not only must the computer...
4 Pages(1000 words)Essay

Computer Forensics

...this process. Moreover, following in the footsteps of government many private sector companies are also having drug test for interested employees. Most of these companies belong to the manufacturing sector. One of the important questions surrounding this field is that would it be able to maintain its distinct state in the years coming ahead? The answer is most probably no (Jackson & Jackson, 2004). The reason being that forensic toxicologists now face the pressure of having know how of the importance of their job in civil matter as well as they also need to learn the related portions of law so that they can handle the legal affairs as well. In addition, there are many religions around the world who think...
5 Pages(1250 words)Research Paper


...Forensics Introduction: The scientific evidence that would be considered in this study would be that of Ddeoxyribonucleic Acid or simply DNA testing, or DNA profiling, or fingerprinting. In real terms the presence of DNA clues in a crime location could make all the difference between return of a guilty verdict, or the exoneration of a suspect. Crime fighters and forensic experts make good use of DNA profiling by matching DNA profiles found at the site of crimes with the DNA records stored in the database of law enforcement authorities. Over the years of its useful application for major tests, and successful accomplishment as a major crime detector, DNA has, perhaps...
5 Pages(1250 words)Essay

Computer Forensics US-CERT (2008), “computer forensics is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, 2008,p.1). Computer forensics is an important tool for managers and network administrators who handle the security related issues of the computer systems. Proper understandings about the legal and technical aspects of computer forensics will help the computer professionals to locate and prosecute the intruders more easily. This paper briefly analyses the characteristics of...
5 Pages(1250 words)Essay

How fallacies are used

...fallacy wherein the Fox News and it associates is shown as villainous par excellence. The documentary interviews many who are the former employees of the Fox News. Here, there is a question of credibility as it turns out that many of these interviewed had broken careers with Fox News. Besides, accent fallacy too is embedded in Outfoxed as the portrayed faults of the Fox News are emphasized throughout while Fox News is given no space for defending its position. Conclusion The fallacies involved in Outfoxed are quite apparent as the anti-Fox News narrative is unbalanced and premised on black and white world view. In the documentary, opinions against Fox News are unduly highlighted while no contesting perspectives...
1 Pages(250 words)Essay

Counter Trade

...An Analysis of Counter Trade Analysis of Counter Trade Countertrade refers to the exchange of goods or/and services with other goodsor/and services, rather than with hard cash. The exchange may be done partly or wholly. Countertrade may also involve two countries exchanging goods for other goods without involving the payment of money. Countertrade are of different types, namely barter trade, compensation deals, counter purchase, offsets, buybacks and switch trade. The various types of countertrade are a means of managing the global financial operations (Contractor & Lorange, 2002). Barter trade involves the direct exchange of goods with other goods without the use of hard cash or money as a means of payment. Switch trading... as a...
1 Pages(250 words)Assignment


...frequency domain location thus driving the amount of static aspect interferences on the given spatial domain slot to minimum which may be realized by using the Genetic Algorithm (GA) (Dasguptaa, Mondalb & Duttac 2013). As a result, the objective of this paper would be researching the use of GA gauge in concealing metadata. This paper also reviews the various techniques of steganography. The third section of the paper illustrates how GA may be used for data hiding. The fourth section will examine the matric technique, while the fifth section will present an analysis of the offered algorithm. Lastly, the last section would present the result of the...
4 Pages(1000 words)Essay

Virtual Machine Forensics and Network Forensics

... Virtual Machine Forensics A virtual machine (VM) is a software program for creating different environments with each of the environment simulating its components (both hardware and software). Each of the environments (virtual machine) mimics a real computer system with its operating system and hardware. In digital forensics the user controls each of the virtual machines independently. Network forensics refers to the capture, storage, and analysis of network traffic. It can be used interchangeably with terms such as packet mining, packet forensics, or digital forensics. Regardless, the concept remains the same i.e. recording packet...
2 Pages(500 words)Article

Computer Forensics

...? ______ a. Access Data b. Digital Intelligence c. Guidance Software d. Paraben 20. True or False: Password protected data can only be preserved using live acquisitions._______ TRUE 21. Handheld imaging devices are very useful in the acquisition of digital images in the field. Which of the following is not an available handheld imager? _______ a. Logicube Dossier b. ImageMasster Forensic III c. ExactImager II d. None of the Above 22. MD5 and SHA-1 are both defacto standard authentication algorithms. They are both derived from what previous message digest algorithm? Hashing algorithm 23. What does RAID stand for? redundant array of independent disks 24. When conducting remote...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Steganography: how it is used for counter/anti-forensics for FREE!

Contact Us