Research Output
Advanced security and network forensics: obfuscation and data hiding.
  4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR encoding
Coding
4.4 Obfuscation through tunneling
4.5 Covert channels
IP and TCP data hiding
4.6 Watermarking and Stenography
4.7 Hiding File contents
File contents
4.7.1 GIF files
4.7.2 JPEG file format
4.7.3 ZIP file format

  • Type:

    Teaching Resource

  • Date:

    25 January 2011

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University

Authors

Keywords

Data hiding; encryption; obfuscation; hashing; tunnelling; secure sockets; authentication; covert channels; file signatures;

Monthly Views:

Available Documents