Abstract
The objectives of this chapter are to:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
F. Rice, “Open XML file formats,” Microsoft Corporation, online at http://msdn.microsoft.com/en-us/library/aa338205.aspx, last accessed April 14, 2011.
A. Castiglione, A. De Santis and C. Soriente, “Taking advantages of a disadvantage: Digital forensics and steganography using document metadata,” Journal of Systems and Software, vol. 80, no. 5, pp. 750-764, May 2007.
B. Park, J. Park, S. Lee, “Data concealment and detection in Microsoft Office 2007 files,” digital investigation, no. 5, pp. 104–114, 2009.
“ECMA OOXML documentation,” online at http://www.ecma-international.org/publications/standards/Ecma-376.htm, last accessed April 14, 2011.
B. Park, J. Park and S. Lee, “Data Concealment & Detection in Microsoft Office 2007 files,” Digital Investigation, vol. 5, no. 3/4, pp. 104–114, March 2009.
S.L. Garfinkel and J.J Migletz, “New XML-Based Files Implications for Forensics,” Security & Privacy, IEEE, vol. 7, no. 2, pp. 38–44, March-April 2009.
T. Ngo, “Office Open XML Overview,” ECMA TC45 white paper, online at http://www.ecma-international.org/news/TC45_current_work/OpenXML%20White%20Paper.pdf, last accessed April 14, 2011.
Microsoft, “Remove personal or hidden information,” online at http://office.microsoft.com/en-us/word/HP051901021033.aspx, last accessed April 14, 2011.
Microsoft, “The remove hidden data tool for Office 2003 and Office XP,” online at http://support.microsoft.com/kb/834427, last accessed April 14, 2011.
http://www.bleepingcomputer.com/tutorials/windows-alternate-data-streams/
Muhammad Ali Raffay. Data hiding and detection in office open XML (OOXML) documents. Master’s thesis, University of Ontario Institute of Technology, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X. (2018). Data Hiding and Detection. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-00581-8_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00580-1
Online ISBN: 978-3-030-00581-8
eBook Packages: Computer ScienceComputer Science (R0)