Scanning electronic documents for personally identifiable information
Proceedings of the 5th ACM workshop on Privacy in electronic society
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Security and privacy issues in the Portable Document Format
Journal of Systems and Software
Forensic investigation of Microsoft PowerPoint files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Inconsidering theleakage ofinformationthrough hidden text mechanismsin commonlyused information interchangeformats, the author demonstrates how to automate and scale the search for hidden data in Microsoft Word documents. The combination of this scaling with typical behavior patterns of Word users and the default settings of the Word program leads to an uncomfortable state of affairs for Word users concerned about information security. The author discusses some countermeasures employable by users and notes more general consequences of these effects.