Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.
References
Act 328 of 1931, Michigan Penal Code. §750.540c (2004).
Agrawal, R., Haas, P., and Kiernan, J. (2003).’Watermarking Relational Data: Framework, Algorithms and Analysis’, The International Journal on Very Large Databases, 12(2):157-159.
American Civil Liberties Union. (2003). ‘Privacy and Technology’, http://www.aclu.org/Privacy/PrivacyMain.cfm, October 29.
Anderson, R. J., and Petitcolas, F. A. P. (1998). ‘On the limits of Steganography’, IEEE Journal on Selected Areas in Communications, 16(4): 474-481.
Backbone Security (2008a). ‘Steganography Application Fingerprint Database’, http://www.sarc-wv.com/docs/safdb.pdf, June 20.
Backbone Security (2008b). ‘Steganography Analyzer Artifact Scanner’, http://www.sarc-wv.com/docs/stegalyzeras.pdf, June 25.
Bartlett, J. (2003). ‘The ease of steganography and camouflage’, http://www.sans.org/rr/paper.php?id=762, October 29.
Charny, B. (2003). ‘Disposable cell phones spur debates’, http://news.com./2102-1033_3-273084.html?tag=st_util_print , October 15.
Cohen, A. (2001). ‘When Terror Hides Online’, Time, November 12.
Cole, E. (2003). ‘Hiding in plain sight: Steganography and the art of covert communication’, Wiley Publishing, Inc., Indianapolis.
Johnson, N. (2008). ‘Steganography’, http://www.jjtc.com/stegdoc/steg1995.html, June 25.
Johnson, N. (2008). ‘Steganography Software’, http://www.jjtc.com/Steganography/tools.html, June 25.
Johnson, N., Duric, Z., Jajodia, S. (2001) ‘Information Hiding, and Watermarking - Attacks and Countermeasures’, Kluwer.
Kahn, D. (1996). Codebreakers: The Story of Secret Writing. Revised ed. Scribner, New York. Kerckhoff, A. (1883). ‘La Cryptographie Militaire’, Journal des Sciences Militaires.
Koops, B-J. (2008). ‘Summary of International Crypto Controls’, http://rechten.uvt.nl/koops/cryptolaw/cls-sum.htm, June 25.
Mazurczyk, W. and Szczypiorski, K.(2008) ‘Steganography of VOIP Streams’, http://arxiv.org/ftp/arxiv/papers/0805/0805.2938.pdf, June 25.
Moulin, P., and O’Sullivan, J. A. (2003). ‘Information-theoretic analysis of information hiding’, IEEE Transactions on Information Theory, 49(3): 563- 593.
Palmer, G. (2008). ‘A Road Map for Digital Forensic Research. Report from the First Digital Forensic Research Workshop’, http://www.dfrws.org/2001/dfrws-rm-final.pdf, June 25.
Petitcolas, F. (2000). ‘Information Hiding: Techniques for Steganography and Digital Watermarking’, Artech House Books.
Pfitzmann, B. (1966).'Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals'. First International Workshop on Information Hiding, May 30 - June 1, Cambridge, U.K.
Provos, N. (2008) ‘Steganography Detection with Stegdetect’, http://www.outguess.org/detection.php, June 20.
Radcliff, D. (2002). ‘Quickstudy: Steganography: Hidden Data’, http://www.computerworld.com/securitytopics/security/story/0,10801,71726,0 0.html, June 10.
Schmidt, M. B., Bekkering, E., and Warkentin, M. (2004). ‚On the Illicit Use of Steganography and Its Detection’. ISOneWorld International Conference. April 14-16. Las Vegas, NV.
Schotti, G. (1665). ‘Steganographia’. Unknown publisher.
Standage, T. (1999). ‘The Victorian Internet’, Berkley Books.
Trithemius, J. (ca. 1499). ‘Steganographia’, Unknown publisher.
Warkentin, M., Schmidt, M.B., and Bekkering, E. (2006). ‘Steganography and Steganalysis’, in Warkentin, M. and R. Vaughn (eds.) Enterprise Information Systems Assurance and System Security: Managerial and System Security. Idea Group Publishing, Hershey, PA.
Wetstone Technologies (2008). ‘Stego Suite’, https://www.wetstonetech.com/cgi/shop.cgi?view,1, June 25.
Wingate, J. (2007). ‘Digital Steganography: Threat or Hype?’ Homeland Defense Journal, 5(4): 60-63.
Wired News. (2003). ‘Internet phone calls stymie FBI’, http://www.wired.com/news/print/0,1294,58350,00.html, October 27
Recommended Citation
Warkentin, Merrill; Bekkering, Ernst; and Schmidt, Mark B.
(2008)
"Steganography: Forensic, Security, and Legal Issues,"
Journal of Digital Forensics, Security and Law: Vol. 3
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2008.1039
Available at:
https://commons.erau.edu/jdfsl/vol3/iss2/2
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons