Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics

Manish H. Bhagwani, Rajiv V. Dharaskar Published in Digital Analog

IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Year of Publication: 2013
© 2012 by IJAIS Journal
10.5120/ncipet1375
Download full text
  1. Manish H Bhagwani and Rajiv V Dharaskar. Article: Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics. IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) NCIPET(3):22-26, November 2013. BibTeX

    @article{key:article,
    	author = "Manish H. Bhagwani and Rajiv V. Dharaskar",
    	title = "Article: Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics",
    	journal = "IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)",
    	year = 2013,
    	volume = "NCIPET",
    	number = 3,
    	pages = "22-26",
    	month = "November",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

This paper focuses on the initial definitions of data hiding and digital forensics followed by study of different data hiding techniques, their need, characteristics, parameters of evaluating those techniques and advantages. The ways of how to get the hidden data during investigation by computer forensic investigator are also discussed.

Reference

  1. Bende, W. Gruhl, D. Morimoto, N. Lu, A. 1996. Techniques for data hiding. In IBM Systems Journal Volume: 35, Issue: 3. 4 Page(s): 313 – 336.
  2. Berghel, Hal. 2007. Hiding Data, Forensics and Anti-Forensics. In Communications of ACM, April 2007.
  3. Rowe, Jon. 2008. What are File Headers? (Signatures). At http://www. pinpointlabs. com/wordpress/2008/08/12/what-are-file-headers-signatures/. Articles from Pinpoint Labs Blog. 12-08-2008.
  4. Cheong Kai Wee. Analysis of hidden data in the NTFS file system. At http://www. forensicfocus. com/hidden-data-analysis-ntfs.
  5. Cox, I. , Miller, M. , and Bloom, J. 2001. Digital Watermarking. Morgan Kauf-mann.
  6. Wu, M. and Liu, B. Multimedia Data Hiding. New York, NY, Springer-Verlag, 2002.
  7. Eggers, J. and Girod, B. 2002. Informed Watermarking. Norwell, MA. Kluwer Academic Publisher.
  8. Sencars, H. , Ramkumar, M. , and Akansu, A. 2004. Data Hiding Fundamentals and Applications. Elsevier Academic Press.

Keywords

Data Hiding, Digital Forensics, Computer Forensic Investigator