Abstract
Nowadays, many electronic documents reside in individual systems and on public networks. Electronic documents contain important information such as private data and trade secrets. Because of this, electronic documents can be used as digital evidence in forensic investigations. Until now, forensic examiners have looked at the contents of an electronic document using specific applications, a procedure which fails to provide them with information about how an electronic document was created. Research into the process by which an electronic document is written can help forensic examiners discover the relationships among several electronic documents and the traces of past work in some special cases. This paper demonstrates new methods for investigating Microsoft PowerPoint files that include some useful information about their own writing process.
Original language | English |
---|---|
Pages (from-to) | 16-24 |
Number of pages | 9 |
Journal | Digital Investigation |
Volume | 6 |
Issue number | 1-2 |
DOIs | |
Publication status | Published - 2009 Sept |
Keywords
- Digital forensics
- Microsoft PowerPoint file
- Object identifier
- Residual information
- Slide identifier
ASJC Scopus subject areas
- Pathology and Forensic Medicine
- Information Systems
- Computer Science Applications
- Medical Laboratory Technology
- Law