File System Forensic Analysis
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Information Leakage Caused by Hidden Data in Published Documents
IEEE Security and Privacy
Forensic investigation of OOXML format documents
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A compression-based text steganography method
Journal of Systems and Software
Hi-index | 0.00 |
Nowadays, many electronic documents reside in individual systems and on public networks. Electronic documents contain important information such as private data and trade secrets. Because of this, electronic documents can be used as digital evidence in forensic investigations. Until now, forensic examiners have looked at the contents of an electronic document using specific applications, a procedure which fails to provide them with information about how an electronic document was created. Research into the process by which an electronic document is written can help forensic examiners discover the relationships among several electronic documents and the traces of past work in some special cases. This paper demonstrates new methods for investigating Microsoft PowerPoint files that include some useful information about their own writing process.