Steganography and Computer Forensics - the art of hiding information: a systematic review
DOI:
https://doi.org/10.56394/aris2.v2i2.20Keywords:
steganography, steganalysis, computer forensicsAbstract
This paper focuses on the study of steganoprahy as an anti-forensic method. The purpose of steganography techniques is to hide information from individuals unrelated to its content. Through a systematic review, the objectives of this article are: (I) explore and investigate the importance of steganography in computer forensics; (II) understand and analyze the methodology used to hide information in a file and (III) understand and analyze the methodology used to extract the information. The results summarize the previous research on this topics and we conclude the article with a warning to develpop more studies regarding this thematic as well as and make the security forces aware of this type of digital evidence and, in the same way that the methodology is being developed, the stegananalysis must also seek, at least, to reach the same technological level
References
Raphael J, Sundaram V. Cryptography and Steganography – A Survey. Int J Comput Tech Appl 2011;2(3):626-30.
Warkentin, Merrill; Bekkering, Ernst; and Schmidt, Mark B. (2008) "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law: Vol. 3 : No. 2 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2008.1039
N. Alabdali and S. Alzahrani, ‘An Overview of Steganography through History’, vol. 5, no. 2, p. 4.
Bierbrauer, Jürgen, and Jessica Fridrich. “Constructing Good Covering Codes for Applications in Steganography.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2008, pp. 1–22. https://doi.org/10.1007/978-3-540-69019-1_1. DOI: https://doi.org/10.1007/978-3-540-69019-1_1
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Claudia Sofia Fernandes

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.