StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Steganography: how it is used for counter/anti-forensics - Research Paper Example

Cite this document
Summary
It also refers to covert and secret communication and it includes techniques of broadcasting surreptitious messages by means of inoffensive cover…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Steganography: how it is used for counter/anti-forensics
Read Text Preview

Extract of sample "Steganography: how it is used for counter/anti-forensics"

Download file to see previous pages

hare (2009) explains that steganography works by replacing bits of unused or useless data in regular computer files such as HTML, graphics, text, and sound, with bits of different, invisible information. The hidden information can be an image, plaintext, or ciphertext. Ec-Council (2009) also explains that unlike encryption whereby there is evidence that communication has taken place, steganography conceals the fact that a message is even being sent. For extra security, steganography can be used to conceal information in an encrypted file, in such a way that even if one decrypts the file, the message will remain hidden.

Steganography can be traced back to ancient Greece, where common practices entailed engraving messages in wooden tablets and plastering them with wax, and tattooing a shaved head of a messenger, allowing his hair grow back, and then cutting it off once he arrived at his contact point. Today, one can use steganographic techniques to conceal secret information in digital video and audio files, digital image folders, as well as other digital media with some replaceable redundant bits that can to conceal secret information.

Simmons first came up with the idea of steganography in the beginning of the 1980s while he discussed inmates’ problem. He talked about a situation whereby two inmates in different cells have to correspond with each other inoffensively without arousing any suspicion. Simmons used the notion of subliminal channels in place of steganography, and this was one of the first attempts into steganography as a field (Potdar1, et al., 2006). Steganography has been used for both legitimate purposes such as digital fingerprinting, watermarking, and copyrighting, and for illegitimate purposes, one of the illegitimate purposes being when a person is attempting to steal data, whereby he/she hides it in another file and sends it as an innocuous file transfer or email.

People also use steganography to transfer/hide ponographic data, other use it

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Steganography: how it is used for counter/anti-forensics Research Paper”, n.d.)
Steganography: how it is used for counter/anti-forensics Research Paper. Retrieved from https://studentshare.org/miscellaneous/1603164-steganography-how-it-is-used-for-counteranti-forensics
(Steganography: How It Is Used for counter/Anti-Forensics Research Paper)
Steganography: How It Is Used for counter/Anti-Forensics Research Paper. https://studentshare.org/miscellaneous/1603164-steganography-how-it-is-used-for-counteranti-forensics.
“Steganography: How It Is Used for counter/Anti-Forensics Research Paper”, n.d. https://studentshare.org/miscellaneous/1603164-steganography-how-it-is-used-for-counteranti-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Steganography: how it is used for counter/anti-forensics

Data Compression Algorithms.Use of Compression Algorithms in Forensics

The compression algorithms are also commonly used in forensics.... These algorithms are used to reduce space amount required to store data on the computer hard disk.... For compressing the text or images, the algorithms that are used include: LZW, Borrows-Wheeler transform and LZ77 and Prediction by Partial Matching (also known as PPM).... On the other hand, the lossy compression algorithms are mostly used to compress audio and video data or files....
4 Pages (1000 words) Essay

Interest in Computer Forensics

Yet on the same token the forensic investigators, “the good guys”, can counter these illegal operations with many sophisticated tricks of their own.... Yet from Week 3 onwards, I was able to download a demo copy of the program and we used that program to uncover many things.... Yet I had no idea they were used to examine two disks and determine if they were the same.... I had used, and even created images, many times in my career....
4 Pages (1000 words) Essay

Fingerprinting Technologies in Forensics

Since then, DNA profiling has come a long way and has been used to provide due judicial process of justice in many criminal and non criminal cases.... In real terms the presence of DNA clues in a crime location could make all the difference between return of a guilty verdict, or the exoneration of a suspect....
5 Pages (1250 words) Essay

Computer Forensics Suites

With the advanced technology, the scientists improvised Computer Forensics suites that have been used in the pursuit of curbing the criminal activities.... However, with the advanced technology, the scientists improvised Computer Forensics suites that have been used in the pursuit of curbing the criminal activities.... Therefore, the evidence compiled from this tool can be used in the courts of law as evidence....
2 Pages (500 words) Essay

Use of the Optimization Steganography System

The most significant… This paper will examine steganography as a remedy to the issue.... Through embedding; intended to connect two data types and improve the metadata capacity, steganography might come handy in resolving this issue.... In the given research, the author seeks to undertake an analysis of digital multimedia and its effects on numerous aspects of human life, through the inclusion of spatial domain of steganography....
4 Pages (1000 words) Essay

Handling Digital Evidence

Safety measures have to be… aken while collecting, storing and transporting the digital evidence so as to maintain its viability when used in court (Bennett, Maton, & Kervin, 2008).... Safety measures have to be taken while collecting, storing and transporting the digital evidence so as to maintain its viability when used in court (Bennett, Maton, & Kervin, 2008).... After seizing the computer, I will label, pack and transport it to a secure place so that it can be used to provide evidence....
1 Pages (250 words) Essay

Virtual Machine Forensics and Network Forensics

It can be used interchangeably with terms such as packet mining, packet forensics, or digital forensics.... It can be used interchangeably with terms such as packet mining, packet forensics, or digital forensics.... The acquired image can be used by forensics tools (open-source or commercial) such as EnCase, Sleuthkit, Live View and FTK to carry out a forensics analysis.... These forensic tools (FTK imager and EnCase) can be used to generate both raw images for VM hard disks and the computed hashes of the raw images....
2 Pages (500 words) Article

Digital Crime Investigation and Features of Steganography and Steganalytical Techniques

nbsp;Encryption has traditionally been used to realize security in information technology communication; but once protected information is decoded, it is no longer protected.... On the other hand, Steganalysis refers to the art and science of detecting the existence of or where steganography has been used.... This paper critically reviews both Steganography and Steganalysis, and analyses the different techniques and approaches used to implement steganography using digital text, video, image, or audio; various techniques of Steganalysis are also discussed....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us