Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
Raggo Acknowledgments
Hosmer Acknowledgments
About the Authors
About the Technical Editor
Preface
Chapter 1. History of Secret Writing
Introduction
Cryptology
Steganography
Summary
References
Chapter 2. Four Easy Data Hiding Exercises
Hiding Data in Microsoft Word
Image Metadata
Mobile Device Data Hiding
File Compression Tool Data Hiding
Summary
References
Chapter 3. Steganography
Introduction
Steganographic Techniques
Steganalysis
Summary
References
Chapter 4. Multimedia Data Hiding
Multimedia Overview
Data Hiding in Digital Audio
Data Hiding in Digital Video
Summary
References
Chapter 5. Data Hiding Among Android Mobile Devices
Android Overview
Android ImgHid and Reveal App
Android My Secret App
StegDroid
Summary
References
Chapter 6. Apple iOS Data Hiding
Introduction
Mobile Device Data Hiding Applications
Summary
References
Chapter 7. Operating System Data Hiding
Windows Data Hiding
Linux Data Hiding
References
Chapter 8. Virtual Data Hiding
Introduction
Hiding a Virtual Environment
A Review of Virtual Environments
Summary
References
Chapter 9. Data Hiding in Network Protocols
Introduction
VoIP Data Hiding
Delayed Packet Modification Method
IP Layer Data Hiding, The TTL Field
Investigating Protocol Data Hiding
Summary
References
Chapter 10. Forensics and Anti-Forensics
Introduction
Anti-Forensics—Hiding your tracks
Forensics
Summary
References
Chapter 11. Mitigation Strategies
Forensic Investigation
Mitigation
Summary
References
Chapter 12. Futures
The Future, and the Past
Summary
Index
← Prev
Back
Next →
← Prev
Back
Next →