Taking advantages of a disadvantage: Digital forensics and steganography using document metadata

被引:49
|
作者
Castiglione, Aniello [1 ]
De Santis, A.
Soriente, C.
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz RM Capocelli, I-84084 Salerno, Italy
[2] Univ Calif Irvine, Bren Sch Informat & Comp Sci, Dept Comp Sci, Irvine, CA 92697 USA
关键词
computer forensics; digital forensics; document metadata; information leakage; steganography;
D O I
10.1016/j.jss.2006.07.006
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
All the information contained in a plain-text document are visible to everybody. On the other hand, compound documents using opaque formats, like Microsoft Compound Document File Format, may contain undisclosed data such as authors name, organizational information of users involved, previously deleted text, machine related information, and much more. Those information could be exploited by third party for illegal purposes. Computer users are unaware of the problem and, even though the Internet offers several tools to clean hidden data from documents, they are not widespread. Furthermore, there is only one paper about this problem in scientific literature, but there is no detailed analysis. In this paper we fill the gap, analyzing the problem with its causes and then we show how to take advantage of this issue: we show how hidden data may be extracted to gain evidence in forensic environment where even a small piece of information may be relevant and we also introduce a new stegosystem especially designed for Microsoft Office documents. We developed FTA, a tool to improve forensic analysis of Microsoft Office documents, and StegOle, another tool that implements a new stegosystem for Microsoft Office documents. This is the first scientific paper to address the problem from both a steganographic and a forensic point of view. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:750 / 764
页数:15
相关论文
共 50 条
  • [31] Self-sanitization of digital images using steganography
    Morkel, Tayana
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [32] PROVIDING NETWORK SECURITY BY USING THE STEGANOGRAPHY ON DIGITAL IMAGES
    Ergun, Fulden
    Kirsal Ever, Yoney
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 360 - 364
  • [33] Using phrases and document metadata to improve topic modeling of clinical reports
    Speier, William
    Ong, Michael K.
    Arnold, Corey W.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2016, 61 : 260 - 266
  • [34] Automatic document metadata extraction using support-vector machines
    Han, H
    Giles, CL
    Manavoglu, E
    Zha, HY
    Zhang, ZY
    Fox, EA
    2003 JOINT CONFERENCE ON DIGITAL LIBRARIES, PROCEEDINGS, 2003, : 37 - 48
  • [35] Survey data and metadata modelling using document-oriented NoSQL
    Maghfiroh, Lutfi Rahmatuti
    Nugraha, I. Gusti Bagus Baskara
    INTERNATIONAL CONFERENCE ON DATA AND INFORMATION SCIENCE (ICODIS), 2018, 971
  • [36] Using RFID and dynamic metadata in an educational digital library
    Morales-Salcedo, R
    Ogata, H
    Yano, Y
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON WEB-BASED EDUCATION, 2006, : 323 - 331
  • [37] Advantages and Risks of Using the Digital Educational Environment
    Kuznetsova, Valentina Yu
    Azhmukhamedov, Iskandar M.
    VI INTERNATIONAL FORUM ON TEACHER EDUCATION, 2020, : 1369 - 1381
  • [38] Document capture using a digital camera
    Herley, C
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2001, : 1041 - 1044
  • [39] Using digital forensics in higher education to detect academic misconduct
    Clare Johnson
    Ross Davies
    Mike Reddy
    International Journal for Educational Integrity, 18
  • [40] A Digital Image Steganography using Sierpinski Gasket Fractal and PLSB
    Rupa C.
    Journal of The Institution of Engineers (India): Series B, 2013, 94 (03) : 147 - 151