A method to compress and anonymize packet traces
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
On the design and performance of prefix-preserving IP traffic trace anonymization
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Digital Evidence and Computer Crime
Digital Evidence and Computer Crime
WETICE '04 Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Information Leakage Caused by Hidden Data in Published Documents
IEEE Security and Privacy
On the role of file system metadata in digital forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Issues and Techniques for Redacting PDF Files
Journal of Digital Forensic Practice
Security and privacy issues in the Portable Document Format
Journal of Systems and Software
New steganographic techniques for the OOXML file format
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
An asynchronous covert channel using spam
Computers & Mathematics with Applications
High capacity and secured methodologies for steganography
International Journal of Electronic Security and Digital Forensics
Forensic investigation of OOXML format documents
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Data concealment and detection in Microsoft Office 2007 files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Forensic investigation of Microsoft PowerPoint files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A novel methodology for data hiding in Microsoft Word file
International Journal of Internet Technology and Secured Transactions
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
Text analysis for detecting terrorism-related articles on the web
Journal of Network and Computer Applications
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.00 |
All the information contained in a plain-text document are visible to everybody. On the other hand, compound documents using opaque formats, like Microsoft Compound Document File Format, may contain undisclosed data such as authors name, organizational information of users involved, previously deleted text, machine related information, and much more. Those information could be exploited by third party for illegal purposes. Computer users are unaware of the problem and, even though the Internet offers several tools to clean hidden data from documents, they are not widespread. Furthermore, there is only one paper about this problem in scientific literature, but there is no detailed analysis. In this paper we fill the gap, analyzing the problem with its causes and then we show how to take advantage of this issue: we show how hidden data may be extracted to gain evidence in forensic environment where even a small piece of information may be relevant and we also introduce a new stegosystem especially designed for Microsoft Office documents. We developed FTA, a tool to improve forensic analysis of Microsoft Office documents, and StegOle, another tool that implements a new stegosystem for Microsoft Office documents. This is the first scientific paper to address the problem from both a steganographic and a forensic point of view.