Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Mass. :
Syngress
2013.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628593306719 |
Tabla de Contenidos:
- Half Title; Copyright; Dedication; Raggo Acknowledgments; Hosmer Acknowledgments; Contents; About the Authors; About the Technical Editor; Preface; 1 History of Secret Writing; Introduction; Cryptology; Substitution Cipher; Caesar; Coded Radio Messages and Morse Code; Vigenere Cipher; Transposition Cipher; Spartan Scytale; The Difference Between Substitution Ciphers and Transposition Ciphers; Steganography; Cardano's Grille; Invisible Ink; Microdots; Printer Tracking Dots; Watermarks; Summary; References; 2 Four Easy Data Hiding Exercises; Hiding Data in Microsoft Word; Image Metadata
- Mobile Device Data HidingFile Compression Tool Data Hiding; Summary; References; 3 Steganography; Introduction; Steganographic Techniques; Insertion Methods; Append Insertion; Prepend Insertion; Modification; LSB; Hiding in PDFs (Insertion Meets LSB); Hiding in Executables (Hydan); Hiding in HTML; Steganalysis; Anomalous Analysis; File Properties; Steganalysis Tools; Freeware Tools; StegSpy; Description; Installation; Using StegSpy; Stegdetect; Using Stegdetect; Summary; References; 4 Multimedia Data Hiding; Multimedia Overview; Data Hiding in Digital Audio
- Simple Audio File Embedding (Imperceptible Approach)Data hiding in a .wav file; StegAnalysis of LSB Wave Data Hiding; Advanced Audio File Embedding; Audio Summary; Data Hiding in Digital Video; MSU Stego; TCStego; Summary; References; 5 Data Hiding Among Android Mobile Devices; Android Overview; Android ImgHid and Reveal App; Analysis of the Resulting ImgHid Data Hiding Operation; Android My Secret App; Stego Analysis of the Resulting My Secret Images; Summary; StegDroid; Using the Android Application; Summary; References; 6 Apple iOS Data Hiding; Introduction
- Mobile Device Data Hiding ApplicationsSpy Pix Analysis; Data Hiding Method Analysis; Stego Sec Analysis; Data Hiding Method Analysis; InvisiLetter Analysis; Data Hiding Method Analysis; Summary; References; 7 Operating System Data Hiding; Windows Data Hiding; Alternate Data Streams Reviewed; Stealth Alternate Data Streams; Volume Shadowing; Linux Data Hiding; Linux Filename Trickery; Extended Filesystem Data Hiding; TrueCrypt; References; 8 Virtual Data Hiding; Introduction; Hiding a Virtual Environment; Getting Started; A Review of Virtual Environments; VMware Files
- Hiding Data in a VMware ImageSummary; References; 9 Data Hiding in Network Protocols; Introduction; VoIP Data Hiding; Delayed Packet Modification Method; IP Layer Data Hiding, The TTL Field; Investigating Protocol Data Hiding; Summary; References; 10 Forensics and Anti-Forensics; Introduction; Anti-Forensics-Hiding your tracks; Data Hiding Passwords; Hiding Your Tracks; Forensics; Looking for Data Hiding Software; Finding Remaining Artifacts; WetStone Technologies StegoHuntTM; Identifying and View Cached Images (Cache Auditing Tools); STG Cache Audit; Evidence in Thumbnails
- Searching for Hidden Directories and Files