Data Hiding

Data Hiding

Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

1st Edition - November 9, 2012

Write a review

  • Authors: Michael Raggo, Chet Hosmer
  • Paperback ISBN: 9781597497435
  • eBook ISBN: 9781597497411

Purchase options

Purchase options
Available
DRM-free (PDF, Mobi, EPub)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.

Key Features

  • Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7
  • Dives deep into the less known approaches to data hiding, covert communications, and advanced malware
  • Includes never before published information about next generation methods of data hiding
  • Outlines a well-defined methodology for countering threats
  • Looks ahead at future predictions for data hiding

Readership

Penetration Testers, Incident Response teams, Information Security Analysts

Table of Contents

  • Dedication

    Raggo Acknowledgments

    Hosmer Acknowledgments

    About the Authors

    About the Technical Editor

    Preface

    Chapter 1. History of Secret Writing

    Introduction

    Cryptology

    Steganography

    Summary

    References

    Chapter 2. Four Easy Data Hiding Exercises

    Hiding Data in Microsoft Word

    Image Metadata

    Mobile Device Data Hiding

    File Compression Tool Data Hiding

    Summary

    References

    Chapter 3. Steganography

    Introduction

    Steganographic Techniques

    Steganalysis

    Summary

    References

    Chapter 4. Multimedia Data Hiding

    Multimedia Overview

    Data Hiding in Digital Audio

    Data Hiding in Digital Video

    Summary

    References

    Chapter 5. Data Hiding Among Android Mobile Devices

    Android Overview

    Android ImgHid and Reveal App

    Android My Secret App

    StegDroid

    Summary

    References

    Chapter 6. Apple iOS Data Hiding

    Introduction

    Mobile Device Data Hiding Applications

    Summary

    References

    Chapter 7. Operating System Data Hiding

    Windows Data Hiding

    Linux Data Hiding

    References

    Chapter 8. Virtual Data Hiding

    Introduction

    Hiding a Virtual Environment

    A Review of Virtual Environments

    Summary

    References

    Chapter 9. Data Hiding in Network Protocols

    Introduction

    VoIP Data Hiding

    Delayed Packet Modification Method

    IP Layer Data Hiding, The TTL Field

    Investigating Protocol Data Hiding

    Summary

    References

    Chapter 10. Forensics and Anti-Forensics

    Introduction

    Anti-Forensics—Hiding your tracks

    Forensics

    Summary

    References

    Chapter 11. Mitigation Strategies

    Forensic Investigation

    Mitigation

    Summary

    References

    Chapter 12. Futures

    The Future, and the Past

    Summary

    Index

Product details

  • No. of pages: 350
  • Language: English
  • Copyright: © Syngress 2012
  • Published: November 9, 2012
  • Imprint: Syngress
  • Paperback ISBN: 9781597497435
  • eBook ISBN: 9781597497411

About the Authors

Michael Raggo

Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.

Affiliations and Expertise

CISSP, NSA-IAM, ACE, CSI

Chet Hosmer

Chet Hosmer
Chet Hosmer is the Chief Scientist and Sr. Vice President at Allen Corporation and a co-founder of WetStone Technologies, Inc. Chet has been researching and developing technology and training surrounding data hiding, steganography and watermarking for over a decade. He has made numerous appearances to discuss the threat steganography poses including National Public Radio's Kojo Nmadi show, ABC's Primetime Thursday, NHK Japan, CrimeCrime TechTV and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to steganography and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired magazine. Chet also serves as a visiting professor at Utica college where he teaches in the Cybersecurity Graduate program. Chet delivers keynote and plenary talks on various cyber security related topics around the world each year.

Affiliations and Expertise

Chief Scientist and Sr. Vice President, Allen Corporation, and co-founder WetStone Technologies, Inc.

Ratings and Reviews

Write a review

There are currently no reviews for "Data Hiding"