Skip to main content

Research Repository

Advanced Search

Advanced security and network forensics: obfuscation and data hiding.

Buchanan, William J

Authors



Abstract

4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR encoding
Coding
4.4 Obfuscation through tunneling
4.5 Covert channels
IP and TCP data hiding
4.6 Watermarking and Stenography
4.7 Hiding File contents
File contents
4.7.1 GIF files
4.7.2 JPEG file format
4.7.3 ZIP file format

Other Type Teaching Resource
Publication Date Jan 25, 2011
Deposit Date Jan 25, 2011
Publicly Available Date Jan 25, 2011
Peer Reviewed Not Peer Reviewed
Keywords Data hiding; encryption; obfuscation; hashing; tunnelling; secure sockets; authentication; covert channels; file signatures;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4149
Contract Date Jan 25, 2011

Files






You might also like



Downloadable Citations