SUSTAINABLE DEVELOPMENT
Innovate. Sustain. Transform.
Save up to 30% on top Physical Sciences & Engineering titles!

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all… Read more
SUSTAINABLE DEVELOPMENT
Save up to 30% on top Physical Sciences & Engineering titles!
Dedication
Raggo Acknowledgments
Hosmer Acknowledgments
About the Authors
About the Technical Editor
Preface
Chapter 1. History of Secret Writing
Introduction
Cryptology
Steganography
Summary
References
Chapter 2. Four Easy Data Hiding Exercises
Hiding Data in Microsoft Word
Image Metadata
Mobile Device Data Hiding
File Compression Tool Data Hiding
Summary
References
Chapter 3. Steganography
Introduction
Steganographic Techniques
Steganalysis
Summary
References
Chapter 4. Multimedia Data Hiding
Multimedia Overview
Data Hiding in Digital Audio
Data Hiding in Digital Video
Summary
References
Chapter 5. Data Hiding Among Android Mobile Devices
Android Overview
Android ImgHid and Reveal App
Android My Secret App
StegDroid
Summary
References
Chapter 6. Apple iOS Data Hiding
Introduction
Mobile Device Data Hiding Applications
Summary
References
Chapter 7. Operating System Data Hiding
Windows Data Hiding
Linux Data Hiding
References
Chapter 8. Virtual Data Hiding
Introduction
Hiding a Virtual Environment
A Review of Virtual Environments
Summary
References
Chapter 9. Data Hiding in Network Protocols
Introduction
VoIP Data Hiding
Delayed Packet Modification Method
IP Layer Data Hiding, The TTL Field
Investigating Protocol Data Hiding
Summary
References
Chapter 10. Forensics and Anti-Forensics
Introduction
Anti-Forensics—Hiding your tracks
Forensics
Summary
References
Chapter 11. Mitigation Strategies
Forensic Investigation
Mitigation
Summary
References
Chapter 12. Futures
The Future, and the Past
Summary
Index
MR
CH