TY - GEN
T1 - Detection of hidden information in forensic tools
AU - Kim, Yeog
AU - Bang, Jewan
AU - Lee, Sangjin
AU - Lim, Jongin
PY - 2008
Y1 - 2008
N2 - Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations produce valid results [1]. CFTT suggests requirements, assertions and test cases document for verification of forensic tools. There are hidden data in acquired image however CFTT do not deal with detection test on hidden data. Detection technology depends on cover carriers, such as images, audio, text or code represented digitally, hold the hidden data. This paper proposes preprocesses for detection of hidden data to be existed or not by forensic tools.
AB - Forensic tools are used to create critical evidence in computer-related crimes investigation. The evidence has an effect on judgment by the court and it requires verification of forensic tools. The verification should require an agreement of law enforcement organizations. Computer Forensic Tool Testing (CFTT) Verification project provides a measure of assurance that the tools used in the investigations produce valid results [1]. CFTT suggests requirements, assertions and test cases document for verification of forensic tools. There are hidden data in acquired image however CFTT do not deal with detection test on hidden data. Detection technology depends on cover carriers, such as images, audio, text or code represented digitally, hold the hidden data. This paper proposes preprocesses for detection of hidden data to be existed or not by forensic tools.
UR - http://www.scopus.com/inward/record.url?scp=51349118596&partnerID=8YFLogxK
U2 - 10.1109/ISA.2008.34
DO - 10.1109/ISA.2008.34
M3 - Conference contribution
AN - SCOPUS:51349118596
SN - 9780769531267
T3 - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
SP - 248
EP - 252
BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
T2 - 2nd International Conference on Information Security and Assurance, ISA 2008
Y2 - 24 April 2008 through 26 April 2008
ER -