DocumentCode :
3371265
Title :
Detection of Hidden Information in Forensic Tools
Author :
Kim, Yeog ; Bang, Jewan ; Lee, Sangjin ; Lim, Jongin
Author_Institution :
Center for Inf. Security Technol. & Grad. Sch. of Inf. Manage. & Security, Korea Univ., Seoul
fYear :
2008
fDate :
24-26 April 2008
Firstpage :
248
Lastpage :
252
Abstract :
Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations produce valid results [1]. CFTT suggests requirements, assertions and test cases document for verification of forensic tools. There are hidden data in acquired image however CFTT do not deal with detection test on hidden data. Detection technology depends on cover carriers, such as images, audio, text or code represented digitally, hold the hidden data. This paper proposes preprocesses for detection of hidden data to be existed or not by forensic tools.
Keywords :
computer crime; legislation; program testing; program verification; computer forensic tool testing verification project; computer-related crime investigation; hidden information detection; law enforcement; Application software; Computer crime; Computer security; Data acquisition; Forensics; Information management; Information security; Internet; Layout; Testing; CFTT; Digital Forensics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3126-7
Type :
conf
DOI :
10.1109/ISA.2008.34
Filename :
4511571
Link To Document :
بازگشت