CFP last date
15 October 2024
Reseach Article

Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics

Published on November 2013 by Manish H. Bhagwani, Rajiv V. Dharaskar
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 3
November 2013
Authors: Manish H. Bhagwani, Rajiv V. Dharaskar
a7c77a84-35ef-4086-a5f1-cfbf64a78c42

Manish H. Bhagwani, Rajiv V. Dharaskar . Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 3 (November 2013), 0-0.

@article{
author = { Manish H. Bhagwani, Rajiv V. Dharaskar },
title = { Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { November 2013 },
volume = { NCIPET },
number = { 3 },
month = { November },
year = { 2013 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/ncipet/number3/566-1375/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Manish H. Bhagwani
%A Rajiv V. Dharaskar
%T Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 2249-0868
%V NCIPET
%N 3
%P 0-0
%D 2013
%I International Journal of Applied Information Systems
Abstract

This paper focuses on the initial definitions of data hiding and digital forensics followed by study of different data hiding techniques, their need, characteristics, parameters of evaluating those techniques and advantages. The ways of how to get the hidden data during investigation by computer forensic investigator are also discussed.

References
  1. Bende, W. Gruhl, D. Morimoto, N. Lu, A. 1996. Techniques for data hiding. In IBM Systems Journal Volume: 35, Issue: 3. 4 Page(s): 313 – 336.
  2. Berghel, Hal. 2007. Hiding Data, Forensics and Anti-Forensics. In Communications of ACM, April 2007.
  3. Rowe, Jon. 2008. What are File Headers? (Signatures). At http://www. pinpointlabs. com/wordpress/2008/08/12/what-are-file-headers-signatures/. Articles from Pinpoint Labs Blog. 12-08-2008.
  4. Cheong Kai Wee. Analysis of hidden data in the NTFS file system. At http://www. forensicfocus. com/hidden-data-analysis-ntfs.
  5. Cox, I. , Miller, M. , and Bloom, J. 2001. Digital Watermarking. Morgan Kauf-mann.
  6. Wu, M. and Liu, B. Multimedia Data Hiding. New York, NY, Springer-Verlag, 2002.
  7. Eggers, J. and Girod, B. 2002. Informed Watermarking. Norwell, MA. Kluwer Academic Publisher.
  8. Sencars, H. , Ramkumar, M. , and Akansu, A. 2004. Data Hiding Fundamentals and Applications. Elsevier Academic Press.
Index Terms

Computer Science
Information Sciences

Keywords

Data Hiding Digital Forensics Computer Forensic Investigator