메뉴 건너뛰기




Volumn 80, Issue 5, 2007, Pages 750-764

Taking advantages of a disadvantage: Digital forensics and steganography using document metadata

Author keywords

Computer forensics; Digital forensics; Document metadata; Information leakage; Steganography

Indexed keywords

INFORMATION ANALYSIS; INFORMATION RETRIEVAL SYSTEMS; INTERNET; METADATA; PROBLEM SOLVING;

EID: 33847656645     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2006.07.006     Document Type: Article
Times cited : (73)

References (49)
  • 2
    • 10444267476 scopus 로고    scopus 로고
    • Bishop, M., Bhumiratana, B., Crawford, R., Levitt, K., June 2004. How to sanitize data. In: Proceedings of 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'04). pp. 217-222.
  • 3
    • 33847668690 scopus 로고    scopus 로고
    • Bourne, V., January 2005. The risk of sharing. Available from: .
  • 4
    • 10644245884 scopus 로고    scopus 로고
    • On the role of file system metadata in digital forensics
    • Buchholz F., and Spafford E. On the role of file system metadata in digital forensics. J. Digital Invest. 1 December (2004) 298-309
    • (2004) J. Digital Invest. , vol.1 , Issue.December , pp. 298-309
    • Buchholz, F.1    Spafford, E.2
  • 5
    • 2342477114 scopus 로고    scopus 로고
    • Information leakage caused by hidden data in published documents
    • Byers S. Information leakage caused by hidden data in published documents. IEEE Security Privacy 2 2 (2004) 23-27
    • (2004) IEEE Security Privacy , vol.2 , Issue.2 , pp. 23-27
    • Byers, S.1
  • 6
    • 33847644408 scopus 로고    scopus 로고
    • Cachin, C., 2005. Digital steganography. In: Encyclopedia of Cryptography and Security. pp. 129-168.
  • 7
    • 33847672127 scopus 로고    scopus 로고
    • Calipari Incident at Wikipedia Online Encyclopedia, May 2005. The Calipari Incident. Available from: .
  • 10
    • 33847683243 scopus 로고    scopus 로고
    • Cypherpunks mailing list, October 2000. The Mike Ciresi Incident. Available from: .
  • 11
    • 33847663213 scopus 로고    scopus 로고
    • DataTek Engineering, 2004. The Forensic ToolKit. Available from: .
  • 12
    • 33847649161 scopus 로고    scopus 로고
    • Davis Wright Tremaine LLP, October 2005. Privacy and Security Law Blog: The New Dictionary is Here ... Available from: .
  • 13
    • 33847666720 scopus 로고    scopus 로고
    • Dornseif, M., December 2004. Far more than you ever wanted to tell - hidden data in document formats. Available from: .
  • 14
    • 33847648720 scopus 로고    scopus 로고
    • Farmer, D., Venema, W., 2004. The Coroner's Toolkit. Available from: .
  • 15
    • 33847647445 scopus 로고    scopus 로고
    • Free Software Foundation, June 2005. GNU binutils. Available from: .
  • 16
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of Data Passed: A Study of Disk Sanitization Practices
    • January/February
    • Garfinkel S., and Shelat A. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security and Privacy 1 1 (2003) 17-27 January/February
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.1    Shelat, A.2
  • 17
    • 33847635938 scopus 로고    scopus 로고
    • Guidance Software, 2005. Encase forensic software. Available from: .
  • 18
    • 33847621055 scopus 로고    scopus 로고
    • Gutmann, P., July 1996. Secure Deletion of Data from Magnetic and Solid-State Memory. In: Proceedings of the Sixth Usenix Security Symposium. pp. 77-90.
  • 19
    • 33847675252 scopus 로고    scopus 로고
    • An overview of steganography for the computer forensics examiner
    • Available from:
    • Kessler G.C. An overview of steganography for the computer forensics examiner. J. Forensic Sci. Commun. - Federal Bureau Invest. 6 3 (2004). http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm Available from:
    • (2004) J. Forensic Sci. Commun. - Federal Bureau Invest. , vol.6 , Issue.3
    • Kessler, G.C.1
  • 20
    • 33847656480 scopus 로고    scopus 로고
    • Kraft, M.S., Kennedy, P.D., Lesser, P.E., 2004. Ezclean. Available from: .
  • 21
    • 33847633320 scopus 로고    scopus 로고
    • McCarthy, K., May 2005. The Calipari/Sgrena Incident. Available from: .
  • 22
    • 33847654113 scopus 로고    scopus 로고
    • Microsoft Corporation, 1999. OLE Concepts and Requirements Overview. Available from: .
  • 23
    • 33847662304 scopus 로고    scopus 로고
    • Microsoft Corporation, 2004a. Remove hidden data tool. Available from: .
  • 24
    • 33847665004 scopus 로고    scopus 로고
    • Microsoft Corporation, 2004b. Remove personal or hidden information. Available from: .
  • 25
    • 33847687079 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), November 2001. Advanced Encryption Standard (AES) (FIPS PUB 197). Available from: .
  • 26
    • 33847665893 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), March 2002a. The Keyed-Hash Message Authentication Code (HMAC) (FIPS PUB 198). Available from: .
  • 27
    • 33847682126 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), August 2002b. The Secure Hash Signature Standard (SHS) (FIPS PUB 180-2). Available from: .
  • 28
    • 33847641992 scopus 로고    scopus 로고
    • OpenDocument Format, January 2006. The OpenDocument format. Available from: .
  • 29
    • 1242310066 scopus 로고    scopus 로고
    • Pang, R., Paxson, V., August 2003. A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM 2003. pp. 339-351.
  • 30
    • 33847673892 scopus 로고    scopus 로고
    • Payne Group, 2005. Metadata Assistant. Available from: .
  • 31
    • 1242263141 scopus 로고    scopus 로고
    • Peuhkuri, M., November 2001. A method to compress and anonymize packet traces. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop '01. pp. 257-261.
  • 32
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: an introduction to steganography
    • Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security and Privacy 1 3 (2003) 32-44
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 33
    • 33847673469 scopus 로고    scopus 로고
    • Rentz, D., September 2004. Microsoft Compound Document File Format. Available from: .
  • 34
    • 33847615512 scopus 로고    scopus 로고
    • Roelofs, G., Gailly, J.L., 2004. Compression library. Available from: .
  • 35
    • 1242286401 scopus 로고    scopus 로고
    • The future of computer forensics: a needs analysis survey
    • Rogers M., and Seigfried K. The future of computer forensics: a needs analysis survey. Computers and Security 23 1 (2004) 12-16
    • (2004) Computers and Security , vol.23 , Issue.1 , pp. 12-16
    • Rogers, M.1    Seigfried, K.2
  • 36
    • 33847665894 scopus 로고    scopus 로고
    • RSA Lab., March 1999. PKCS #5 v2.0: Password-Based Cryptography Standard.
  • 37
    • 35048881059 scopus 로고    scopus 로고
    • Sadeghi, A.R., Stuble, C., April 2004. Taming Trusted Platforms by Operating System Design. Lecture Notes in Computer Science, 2908, pp. 286-302.
  • 38
    • 33847671679 scopus 로고    scopus 로고
    • Schwartz, M., 2004. LAOLA. Available from: .
  • 39
    • 33847624442 scopus 로고    scopus 로고
    • Sinofsky, S., June 2005. Microsoft Makes XML the File Format for the Next Version of Microsoft Office. Available from: .
  • 40
    • 33847670475 scopus 로고    scopus 로고
    • Smith, R.M., June 2003. Blair's Iraq Dossier. Available from: .
  • 41
    • 33847643546 scopus 로고    scopus 로고
    • Smith, R., 2004. Word Dumper. Available from: .
  • 42
    • 33847682552 scopus 로고    scopus 로고
    • Soft Experience, 2005. Catalogue. Available from: .
  • 43
    • 33847638346 scopus 로고    scopus 로고
    • StegoArchive, January 2006. Available from: .
  • 44
    • 33847649436 scopus 로고    scopus 로고
    • Telematics between Administrations Committee (TAC) of the European Community, June 2004. European public sector advised to use open document formats. Available from: .
  • 45
    • 33847646154 scopus 로고    scopus 로고
    • US Department of Defense, 1995. Cleaning and Sanitization Matrix. DOD 5220.22-M.
  • 46
    • 33847637911 scopus 로고    scopus 로고
    • US National Security Agency, December 2005. Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF. Available from: .
  • 47
    • 33847632380 scopus 로고    scopus 로고
    • Workshare, 2005. Trace. Available from: .
  • 48
    • 1242308060 scopus 로고    scopus 로고
    • Xu, J., Fan, J., Ammar, M., Moon, S.B., November 2001. On the design and performance of prefix preserving IP traffic trace anonymization. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop '01. pp. 263-266.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.