Limit search to available items
Book Cover
E-book
Author Hassan, Nihad Ahmad, author

Title Data hiding techniques in Windows OS : a practical approach to investigation and defense / Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor
Published Cambridge, MA : Syngress, [2017]
©2017

Copies

Description 1 online resource (1 volume) : illustrations
Contents Machine generated contents note: 1. Introduction and Historical Background -- Introduction -- Classical Cipher Types -- Substitution Cipher -- Transposition Cipher -- Other Ciphers and Codes -- Difference Between Substitution and Transposition Cipher -- Practicing Old Ciphers Using Modem Computing -- Modern Cryptography Systems -- Secret Key Cryptography -- Public Key Cryptography -- Digital Signature -- Cryptographic Hash Function -- Steganography -- What Is Steganography? -- Comparing Steganography and Cryptography -- Steganography Types -- Watermarking -- Watermarking Types -- Compare Steganography and Watermarking -- Anonymity -- Summary -- References -- Bibliography -- 2. Data Hiding Using Simple Methods -- Introduction -- Bit-Shifting Data Hiding -- Hiding Data Inside Rich Text Format Documents -- Renaming Files -- Matching File Signatures and File Extensions -- Hiding Data in Compressed Files -- Hiding Data Through File Splitting -- Hiding Data in Microsoft® Office Documents -- Hidden Text -- Hidden Data Within Document Attributes (Metadata) -- White Font -- Hiding Data by Exploiting OLE Structured Storage -- Self-Encrypt MS Office® Document -- Hiding Inside MS Excel® Spreadsheet -- Data Hiding Inside Image Attributes (Image Metadata) -- Summary -- References -- Bibliography -- 3. Data Hiding Using Steganographic Techniques -- Introduction -- Text Steganography -- Format-Based Steganography -- Random and Statistical Generation -- Linguistic-Based Methods -- Hiding Inside MS Office® Documents Based on OOXML File Format -- Webpage Text Steganography -- Hiding Secret Messages Inside Twitter Updates -- Image Steganography -- Digital Image Basic Concepts -- Image Steganographic Techniques -- Digital Media Steganography Tools -- Data Hiding Inside Audio Files -- Audio Files Basic Concepts -- Audio Steganography Types -- Data Hiding Using Other Digital Media Types -- Data Hiding Inside PDF Documents -- Data Hiding Inside Program Binaries -- Summary -- References -- Bibliography -- 4. Data Hiding Under Windows® OS File Structure -- Introduction -- Data Hiding Using Alternate Data Stream -- What Is the New Technology File System? -- What Is an Alternate Data Stream? -- How Can We Use Alternate Data Streams to Hide Files? -- Hiding Executable Code in Alternate Data Stream Files -- Important Notes About Using Alternate Data Stream in Hiding Files -- How to Delete Alternate Data Stream Files -- Detecting Alternate Data Stream Files -- Data Hiding Using Stealth Alternate Data Stream -- Hiding Data Inside Windows® Restoration Points -- Hiding Data Inside Windows® Registry -- Hiding in a File's Slack Space -- Understanding Hard Disk Drives -- File Allocation Table -- Hidden Partitions -- Hidden Partitions Under Windows® OS -- Creating a Hidden Partition Within a USB Zip Drive -- Data Hiding Within Master File Table -- Data Hiding in Disk Bad Blocks -- Data Hiding Under Computer Hardware Level -- Data Hiding Inside Host Protected Area -- Hiding Data in Device Configuration Overlay -- Summary -- References -- Bibliography -- 5. Data Hiding Using Encryption Techniques -- Introduction -- Security Awareness Corners -- Human Security -- Device Security -- Message Security -- Network Security -- Anonymous Operating System -- Tails -- Ubuntu Privacy Remix -- Other Security Distributions -- Advice When Using Security Operating Systems -- Portable Stick Computer -- Disk Encryption -- Encrypting Partitions Using BitLocker -- Creating Encrypted Vaults -- Single File Encryption -- Cloud Storage Encryption -- Discussion of Security Level in Disk Encryption -- Anonymize Your Location Online -- Using the TOR Browser -- Virtual Private Networks -- SSH Tunneling -- Using Proxy Server -- Anonymous Search Engine -- Web Browser Privacy Add-Ons -- Secure Anonymous File Sharing -- Encrypting Email Communications -- Email Encryption Using Gpg4Win -- Open PGP Encryption for Webmail Using the Mailvelope Browser Extension -- Secure Web Mail Providers -- Encrypt Instant Messaging, Video Calls, and VOIP Sessions -- What Are the Risks? -- Off-the-Record-Messaging and Pidgin -- Secure Video Calling Service Using Gruveo -- Secure Anonymous Calling Service Using GHOST CALL -- Retroshare Secure Social Platform -- TOR Messenger -- Complete Anonymous IM Using Ricochet -- Create and Maintain Secure Passwords -- Password Best Practice -- Password Generation Tools -- Password-Saving Techniques -- Password Manager Tools -- Miscellaneous Security Hints and Best Practices -- Summary -- References -- Bibliography -- 6. Data Hiding Forensics -- Introduction -- Understanding Computer Forensics -- Computer Forensic Process -- Differences Between Computer Forensics and Other Computing Domains -- Need for Digital Evidence -- Steganalysis -- Steganalysis Methods -- Destroying Hidden Data -- Steganalysis of Digital Media Files -- Text Document Steganalysis -- Image Forensics -- Audio Forensics -- Video Forensics -- Digital Files Metadata Forensic -- Windows Forensics -- Capture Volatile Memory -- Capture Disk Drive -- Deleted Files Recovery -- Windows Registry Analysis -- Forensic Analysis of Windows Prefetch Files -- Windows Minidump Files Forensics -- Windows Thumbnail Forensics -- File Signature Analysis -- File Attributes Analysis -- Discover Hidden Partitions -- Detect Alternative Data Streams -- Investigating Windows Volume Shadow Copy -- Virtual Memory Analysis -- Windows Password Cracking -- Host Protected Area and Device Configuration Relay Forensic -- Examining Encrypted Files -- Summary -- References -- Bibliography -- 7. Antiforensic Techniques -- Introduction -- Antiforensics Goals -- Data Hiding General Advice -- Data Destruction -- Hard Disk Wiping -- Manipulating Digital File Metadata -- Windows Antiforensics Techniques -- Configure Windows for Better Privacy -- Disable Recycle Bin -- Registry Antiforensics -- Disable Windows Hibernation -- Disable Windows Virtual Memory (Paging File) -- Disable System Restore Points and File History -- Disable Windows Thumbnail Cache -- Disable Windows Prefetch Feature -- Disable Windows Logging -- Disable Windows® Password Hash Extraction -- Clearing Digital Footprints -- Live CDs and Bootable USB Tokens -- Virtual Machines -- Using Portable Applications -- Direct Attack Against Forensic Software -- Summary -- References -- Bibliography -- 8. Future Trends -- Introduction -- Future of Encryption -- Data Stored in Cloud Computing -- Visualization Technology -- Data Hiding in Enterprise Networks -- Data Concealment -- Data Leakage Prevention -- Streaming Protocols -- Wireless Networks and Future Networking Protocols -- Data Hiding in Mobile Devices -- Anonymous Networks -- Summary -- References -- Bibliography
Bibliography Includes bibliographical references and index
Notes Online resource; title from title page (viewed October 10, 2016)
Subject Data encryption (Computer science)
Data protection.
COMPUTERS -- Computer Science.
Data encryption (Computer science)
Data protection
Form Electronic book
Author Hijazi, Rami, author
Salminen, Helvi, editor
ISBN 9780128044964
0128044969
0128044497
9780128044490