Data hiding is the process of making data difficult to find while also keeping it accessible for future use. “Obfuscation and encryption of data give an adversary the ability to limit identification and collection of evidence by investigators while allowing access and use to themselves.”
Some of the more common forms of data hiding include encryption, steganography and other various forms of hardware/software based data concealment. Each of the different data hiding methods makes digital forensic examinations difficult. When the different data hiding methods are combined, they can make a successful forensic investigation nearly impossible.
Read more about this topic: Anti-computer Forensics
Other articles related to "data hiding, data, hiding":
... in which they characterize system elements having potential to be used for data hiding ... Rather, basic principles for data hiding in each of seven OSI layers are established ... Bandwidth number of data hiding bits per channel use ...
... Other forms of data hiding involve the use of tools and techniques to hide data throughout various locations in a computer system ... can include “memory, slack space, hidden directories, bad blocks, alternate data streams, (and) hidden partitions.” One of the more well known tools ... piece of that file into the slack space of other files, thereby hiding it from the forensic examination software ...
Famous quotes containing the words hiding and/or data:
“O hiding hair and dewy eyes,
I am no more with life and death,
My heart upon his warm heart lies,
My breath is mixed into his breath.”
—William Butler Yeats (18651939)
“To write it, it took three months; to conceive it three minutes; to collect the data in itall my life.”
—F. Scott Fitzgerald (18961940)