Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR encoding
Coding
4.4 Obfuscation through tunneling
4.5 Covert channels
IP and TCP data hiding
4.6 Watermarking and Stenography
4.7 Hiding File contents
File contents
4.7.1 GIF files
4.7.2 JPEG file format
4.7.3 ZIP file format
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. [Educational resource]. Edinburgh Napier University
Other Type | Teaching Resource |
---|---|
Publication Date | Jan 25, 2011 |
Deposit Date | Jan 25, 2011 |
Publicly Available Date | Jan 25, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Data hiding; encryption; obfuscation; hashing; tunnelling; secure sockets; authentication; covert channels; file signatures; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4149 |
Contract Date | Jan 25, 2011 |
unit04.pdf
(6.9 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
asnf_unit04.html
(497 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search