Detection of hidden information in forensic tools

Yeog Kim, Jewan Bang, Sangjin Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations produce valid results [1]. CFTT suggests requirements, assertions and test cases document for verification of forensic tools. There are hidden data in acquired image however CFTT do not deal with detection test on hidden data. Detection technology depends on cover carriers, such as images, audio, text or code represented digitally, hold the hidden data. This paper proposes preprocesses for detection of hidden data to be existed or not by forensic tools.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages248-252
Number of pages5
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Publication series

NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

    Fingerprint

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Kim, Y., Bang, J., Lee, S., & Lim, J. (2008). Detection of hidden information in forensic tools. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 248-252). [4511571] (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008). https://doi.org/10.1109/ISA.2008.34