dc.creator | Martini, A. I. | en |
dc.creator | Zaharis, A. | en |
dc.creator | Ilioudis, C. | en |
dc.date.accessioned | 2015-11-23T10:39:01Z | |
dc.date.available | 2015-11-23T10:39:01Z | |
dc.date.issued | 2008 | |
dc.identifier | 10.1109/WDFIA.2008.9 | |
dc.identifier.isbn | 9780769533629 | |
dc.identifier.uri | http://hdl.handle.net/11615/30759 | |
dc.description.abstract | Data hiding technique through Alternate Data Streams in compressed form is poorly documented and less known among Forensic experts. This paper deals with the documentation of Compressed ADS and their attributes concerning hiding information, provides a simple technique of creating compressed ADS and using it in a malicious manner. Finally a method is presented in order to detect and manipulate ADS in a proper way, complying with the Computer Forensic techniques. © 2008 IEEE. | en |
dc.source.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-67650154233&partnerID=40&md5=5c549247fcf24abcea9df8b36c7f068f | |
dc.subject | Computer forensics | en |
dc.subject | Data hiding | en |
dc.subject | Data stream | en |
dc.subject | Data communication systems | en |
dc.subject | Electronic crime countermeasures | en |
dc.title | Detecting and manipulating compressed alternate data streams in a forensics investigation | en |
dc.type | conferenceItem | en |