Abstract
Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence. We discuss encryption and steganography and describe potential methods of coping with each. The techniques we discuss require no special knowledge or advanced hardware or software; however, the use of these techniques does not guarantee the recovery of obfuscated information.
Original language | American English |
---|---|
State | Published - Mar 2005 |
Event | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV - Orlando, FL Duration: Mar 1 2005 → … |
Conference
Conference | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV |
---|---|
Period | 3/1/05 → … |
Keywords
- digital forensics
- computer crime
- steganography
- digital evidence
Disciplines
- Social and Behavioral Sciences
- Forensic Science and Technology