Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Advanced security and network forensics: obfuscation and data hiding.
Buchanan, William J
Authors
Abstract
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR encoding
Coding
4.4 Obfuscation through tunneling
4.5 Covert channels
IP and TCP data hiding
4.6 Watermarking and Stenography
4.7 Hiding File contents
File contents
4.7.1 GIF files
4.7.2 JPEG file format
4.7.3 ZIP file format
Citation
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. [Educational resource]. Edinburgh Napier University
Other Type | Teaching Resource |
---|---|
Publication Date | Jan 25, 2011 |
Deposit Date | Jan 25, 2011 |
Publicly Available Date | Jan 25, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Data hiding; encryption; obfuscation; hashing; tunnelling; secure sockets; authentication; covert channels; file signatures; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4149 |
Contract Date | Jan 25, 2011 |
Files
unit04.pdf
(6.9 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
asnf_unit04.html
(497 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search