Data Hiding Techniques for Database Environments

  • Heloise Pieterse
  • Martin Olivier
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 383)


Databases are widely used today, but the study of forensic analysis in database environments has not been extensive. The lack of research is due mostly to the complex structure of databases and the scarcity of database forensic tools. This has created a wide range of possibilities for data hiding as a means to hinder data discovery during forensic investigations. This paper describes several techniques that can be used to hide data in a database. Although the techniques are evaluated with respect to object-relational databases, they can be applied to any type of database.


Database forensics data hiding 


  1. 1.
    W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding, IBM Systems Journal, vol. 35(3-4), pp. 313–336, 1996.CrossRefGoogle Scholar
  2. 2.
    H. Berghel, Hiding data, forensics and anti-forensics, Communications of the ACM, vol. 50(4), pp. 15–20, 2007.CrossRefGoogle Scholar
  3. 3.
    T. Connolly and C. Begg, Database Systems: A Practical Approach to Design, Implementation and Management, Addison Wesley Longman, London, United Kingdom, 2009.Google Scholar
  4. 4.
    K. Fowler, SQL Server database forensics, presented at the Black Hat USA Conference, 2007. Google Scholar
  5. 5.
    P. Fruhwirt, M. Huber, M. Mulazzani and E. Weippl, InnoDb database forensics, Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications, pp. 1028–1036, 2010.CrossRefGoogle Scholar
  6. 6.
    M. Guimaraes, R. Austin and H. Said, Database forensics, Proceedings of the Information Security Curriculum Development Conference, pp. 62-65, 2010.Google Scholar
  7. 7.
    M. Olivier, On metadata context in database forensics, Digital Investigation, vol. 5(3-4), pp. 115–123, 2009.CrossRefGoogle Scholar
  8. 8.
    PostgreSQL Global Development Group, PostgreSQL 8.4.12 Documentation, San Francisco, California (, 2009.
  9. 9.
    P. Rob and C. Coronel, Database Systems: Design, Implementation and Management, Thomson Course Technology, Boston, Massachusetts, 2009.Google Scholar
  10. 10.
    P. Stahlberg, G. Miklau and B. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the ACM International Conference on Management of Data, pp. 91–102, 2007.Google Scholar
  11. 11.
    N. Wu and M. Hwang, Data hiding: Current status and key issues, International Journal of Network Security, vol. 4(1), pp. 1–9, 2007.Google Scholar
  12. 12.
    A. Yeung and G. Hall, Spatial Database Systems: Design, Implementation and Project Management, Springer, Dordrecht, The Netherlands, 2007. Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Heloise Pieterse
    • 1
  • Martin Olivier
    • 1
  1. 1.University of PretoriaPretoriaSouth Africa

Personalised recommendations