We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics

Published on November 2013 by Manish H. Bhagwani, Rajiv V. Dharaskar
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 3
November 2013
Authors: Manish H. Bhagwani, Rajiv V. Dharaskar
9d5e3405-6394-4313-b5ec-fd6ee436db8b

Manish H. Bhagwani, Rajiv V. Dharaskar . Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 3 (November 2013), 22-26.

@article{
author = { Manish H. Bhagwani, Rajiv V. Dharaskar },
title = { Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { November 2013 },
volume = { NCIPET },
number = { 3 },
month = { November },
year = { 2013 },
issn = 0975-8887,
pages = { 22-26 },
numpages = 5,
url = { /proceedings/ncipet/number3/566-1375/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Manish H. Bhagwani
%A Rajiv V. Dharaskar
%T Study of significance of Data Hiding and Data Finding Techniques from the context of Digital Forensics
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 3
%P 22-26
%D 2013
%I International Journal of Computer Applications
Abstract

This paper focuses on the initial definitions of data hiding and digital forensics followed by study of different data hiding techniques, their need, characteristics, parameters of evaluating those techniques and advantages. The ways of how to get the hidden data during investigation by computer forensic investigator are also discussed.

References
  1. Bende, W. Gruhl, D. Morimoto, N. Lu, A. 1996. Techniques for data hiding. In IBM Systems Journal Volume: 35, Issue: 3. 4 Page(s): 313 – 336.
  2. Berghel, Hal. 2007. Hiding Data, Forensics and Anti-Forensics. In Communications of ACM, April 2007.
  3. Rowe, Jon. 2008. What are File Headers? (Signatures). At http://www. pinpointlabs. com/wordpress/2008/08/12/what-are-file-headers-signatures/. Articles from Pinpoint Labs Blog. 12-08-2008.
  4. Cheong Kai Wee. Analysis of hidden data in the NTFS file system. At http://www. forensicfocus. com/hidden-data-analysis-ntfs.
  5. Cox, I. , Miller, M. , and Bloom, J. 2001. Digital Watermarking. Morgan Kauf-mann.
  6. Wu, M. and Liu, B. Multimedia Data Hiding. New York, NY, Springer-Verlag, 2002.
  7. Eggers, J. and Girod, B. 2002. Informed Watermarking. Norwell, MA. Kluwer Academic Publisher.
  8. Sencars, H. , Ramkumar, M. , and Akansu, A. 2004. Data Hiding Fundamentals and Applications. Elsevier Academic Press.
Index Terms

Computer Science
Information Sciences

Keywords

Data Hiding Digital Forensics Computer Forensic Investigator