| |
| |
Dedication | |
| |
| |
Raggo Acknowledgments | |
| |
| |
Hosmer Acknowledgments | |
| |
| |
About the Authors | |
| |
| |
About the Techical Editor | |
| |
| |
Preface | |
| |
| |
| |
History of Secret Writing | |
| |
| |
Introduction | |
| |
| |
Cryptology | |
| |
| |
Substitution Cipher | |
| |
| |
Transposition Cipher | |
| |
| |
The Difference Between Substitution Ciphers and Transposition Ciphers | |
| |
| |
Steganography | |
| |
| |
Cardano's Grille | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Four Easy Data Hiding Exercises | |
| |
| |
Hiding Data in Microsoft Word | |
| |
| |
Image Metadata | |
| |
| |
Mobile Device Data Hiding | |
| |
| |
File Compression Tool Data Hiding | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Steganography | |
| |
| |
Introduction | |
| |
| |
Steganographic Techniques | |
| |
| |
Insertion Methods | |
| |
| |
Modification | |
| |
| |
Hiding in PDFs (Insertion Meets LSB) | |
| |
| |
Hiding in Executables (Hydan) | |
| |
| |
Hiding in HTML | |
| |
| |
Steganalysis | |
| |
| |
Anomalous Analysis | |
| |
| |
Steganalysis Tools | |
| |
| |
Freeware Tools | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Multimedia Data Hiding | |
| |
| |
Multimedia Overview | |
| |
| |
Data Hiding in Digital Audio | |
| |
| |
Simple Audio File Embedding (Imperceptible Approach) | |
| |
| |
Data hiding in a .wav file | |
| |
| |
StegAnalysis of LSB Wave Data Hiding | |
| |
| |
Advanced Audio File Embedding | |
| |
| |
Audio Summary | |
| |
| |
Data Hiding in Digital Video | |
| |
| |
MSU Stego | |
| |
| |
TCStego | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Data Hiding Among Android Mobile Devices | |
| |
| |
Android Overview | |
| |
| |
Android ImgHid and Reveal App | |
| |
| |
Analysis of the Resulting ImgHid Data Hiding Operation | |
| |
| |
Android My Secret App | |
| |
| |
Stego Analysis of the Resulting My Secret Images | |
| |
| |
Summary | |
| |
| |
StegDroid | |
| |
| |
Using the Android Application | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Apple iOS Data Hiding | |
| |
| |
Introduction | |
| |
| |
Mobile Device Data Hiding Applications | |
| |
| |
Spy Pix Analysis | |
| |
| |
Stego Sec Analysis | |
| |
| |
InvisiLetter Analysis | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Operating System Data Hiding | |
| |
| |
Windows Data Hiding | |
| |
| |
Alternate Data Streams Reviewed | |
| |
| |
Stealth Alternate Data Streams | |
| |
| |
Volume Shadowing | |
| |
| |
Linux Data Hiding | |
| |
| |
Linux Filename Trickery | |
| |
| |
Extended Filesystem Data Hiding | |
| |
| |
TrueCrypt | |
| |
| |
References | |
| |
| |
| |
Virtual Data Hiding | |
| |
| |
Introduction | |
| |
| |
Hiding a Virtual Environment | |
| |
| |
Getting Started | |
| |
| |
A Review of Virtual Environments | |
| |
| |
VMware Files | |
| |
| |
Hiding Data in a VMware Image | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Data Hiding in Network Protocols | |
| |
| |
Introduction | |
| |
| |
VoIP Data Hiding | |
| |
| |
Delayed Packet Modification Method | |
| |
| |
IP Layer Data Hiding, The TTL Field | |
| |
| |
Investigating Protocol Data Hiding | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Forensics and Anti-Forensics | |
| |
| |
Introduction | |
| |
| |
Anti-Forensics-Hiding your tracks | |
| |
| |
Data Hiding Passwords | |
| |
| |
Hiding Your Tracks | |
| |
| |
Forensics | |
| |
| |
Looking for Data Hiding Software | |
| |
| |
Finding Remaining Artifacts | |
| |
| |
Identifying and View Cached Images (Cache Auditing Tools) | |
| |
| |
Evidence in Thumbnails | |
| |
| |
Searching for Hidden Directories and Files | |
| |
| |
Network IDS | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Mitigation Strategies | |
| |
| |
Forensic Investigation | |
| |
| |
| |
Steganography Use Discovery | |
| |
| |
| |
Steganography Carrier Discovery | |
| |
| |
| |
Hidden Content Extraction | |
| |
| |
Mitigation | |
| |
| |
Network Technologies for detecting Data Hiding | |
| |
| |
Endpoint Technologies for detecting Data Hiding | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Futures | |
| |
| |
The Future, and the Past | |
| |
| |
Future Threats | |
| |
| |
Steganography as a Countermeasure | |
| |
| |
Current and Futuristic Combined Threats | |
| |
| |
Summary | |
| |
| |
Index | |