Data Hiding and Detection
The objectives of this chapter are to:
- 1.F. Rice, “Open XML file formats,” Microsoft Corporation, online at http://msdn.microsoft.com/en-us/library/aa338205.aspx, last accessed April 14, 2011.
- 3.B. Park, J. Park, S. Lee, “Data concealment and detection in Microsoft Office 2007 files,” digital investigation, no. 5, pp. 104–114, 2009.Google Scholar
- 4.“ECMA OOXML documentation,” online at http://www.ecma-international.org/publications/standards/Ecma-376.htm, last accessed April 14, 2011.
- 5.B. Park, J. Park and S. Lee, “Data Concealment & Detection in Microsoft Office 2007 files,” Digital Investigation, vol. 5, no. 3/4, pp. 104–114, March 2009.Google Scholar
- 6.S.L. Garfinkel and J.J Migletz, “New XML-Based Files Implications for Forensics,” Security & Privacy, IEEE, vol. 7, no. 2, pp. 38–44, March-April 2009.Google Scholar
- 7.T. Ngo, “Office Open XML Overview,” ECMA TC45 white paper, online at http://www.ecma-international.org/news/TC45_current_work/OpenXML%20White%20Paper.pdf, last accessed April 14, 2011.
- 8.Microsoft, “Remove personal or hidden information,” online at http://office.microsoft.com/en-us/word/HP051901021033.aspx, last accessed April 14, 2011.
- 9.Microsoft, “The remove hidden data tool for Office 2003 and Office XP,” online at http://support.microsoft.com/kb/834427, last accessed April 14, 2011.
- 11.Muhammad Ali Raffay. Data hiding and detection in office open XML (OOXML) documents. Master’s thesis, University of Ontario Institute of Technology, 2011.Google Scholar
© Springer Nature Switzerland AG 2018