Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
New steganographic techniques for the OOXML file format
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Forensic investigation of OOXML format documents
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
OOXML file analysis of the july 22nd terrorist manual
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
As more offenders attempt to conceal incriminating data or stolen information, it is important for forensic examiners and computer security professionals to know where to look for concealed information. This paper demonstrates how data concealment in Microsoft Office 2007 files is possible. The Office Open XML (OOXML) format forms the basis of Microsoft Office 2007, and an individual can use OOXML to define customized parts, relationships, or both within a Microsoft Office 2007 file to store and conceal information. Fortunately for digital investigators, such concealed data can be detected by looking for the existence of unknown parts or relationships.