O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Data Hiding

Abstract

Hiding data, especially in the form of communicative information, is a prime objective of criminals and terrorists in order to remain secretive and undiscovered. By remaining unseen and undetected, criminals can continue to operate without fear of being identified as their mere existence is unknown. Searching for hidden data within electronic files requires practiced skill, patience, and is not always successful when cryptography and encryption are also involved in hiding data.

Keywords

Antiforensics; Ciphers; Codes; Counterforensics; Cryptography; Data hiding; Encryption; Investigations; Steganography

Introduction

Successful criminals are competent in committing crimes and subsequently getting away with their crimes, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required