Paper
20 May 2005 Digital evidence obfuscation: recovery techniques
J. Philip Craiger, Jeff Swauger, Chris Marberry
Author Affiliations +
Abstract
Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence. We discuss encryption and steganography below and describe potential methods of coping with each. The techniques we discuss require no special knowledge or advanced hardware or software; however, the use of these techniques does not guarantee the recovery of obfuscated information.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
J. Philip Craiger, Jeff Swauger, and Chris Marberry "Digital evidence obfuscation: recovery techniques", Proc. SPIE 5778, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV, (20 May 2005); https://doi.org/10.1117/12.602489
Lens.org Logo
CITATIONS
Cited by 6 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Steganography

Computing systems

Homeland security

C3I

Defense technologies

Digital watermarking

Security technologies

RELATED CONTENT

Maximizing PPV in C3I systems
Proceedings of SPIE (May 05 2017)
Generic approach to homeland security technologies
Proceedings of SPIE (May 20 2005)
Remote sensing for homeland defense/emergency response
Proceedings of SPIE (September 22 2003)
C3I standards for payload weaponry
Proceedings of SPIE (May 20 2005)
The Institute for Security Technology Studies (ISTS): overview
Proceedings of SPIE (September 15 2004)
Hypergame theory applied to cyber attack and defense
Proceedings of SPIE (May 03 2010)

Back to Top