Show simple item record

dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorKhan, Muhammed
dc.contributor.authorChang, Elizabeth
dc.contributor.authorUlieru, M.
dc.contributor.authorWorthington, P.
dc.date.accessioned2017-01-30T15:10:52Z
dc.date.available2017-01-30T15:10:52Z
dc.date.created2008-11-12T23:21:51Z
dc.date.issued2005
dc.identifier.citationPotdar, Vidyasagar and Khan, M and Chang, Elizabeth and Ulieru, Mihaela and Worthington, Paul R.. 2005. e-Forensics steganography systems for secret information retrieval. Advanced Engineering Informatics 19: 235-241.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/43915
dc.identifier.doi10.1016/j.aei.2005.04.003
dc.description.abstract

Steganography is the art and science of hiding information. This paper introduces e-Forensics as a novel technique for extracting secret information electronically creatively. We propose an e-Forensics system capable of detecting or extracting secret information using generic steganalytic algorithms. The system is based on an agent computing approach where the autonomic agent would traverse several websites and detect steganographic communication. If steganographic activity was detected it would report back to the concerned authority. A conceptual overview of the system, as well as its design layout is presented. An illustrative example clarifies system's functionality and performance.

dc.publisherElsevier Ltd
dc.subjectStego-key
dc.subjectSteganography
dc.subjectData extraction
dc.subjectAutonomic agent
dc.subjectSecret information hiding
dc.subjectData embedding
dc.subjectinformation systems
dc.subjectsecrecy
dc.titlee-Forensics steganography systems for secret information retrieval
dc.typeJournal Article
dcterms.source.volume19
dcterms.source.startPage235
dcterms.source.endPage241
dcterms.source.titleAdvanced Engineering Informatics
curtin.note

Potdar, Vidysagar and Khan, M and Chang, Elizabeth and Ulieru, Mihaela and Worthington, Paul R. (2005) e-Forensics steganography systems for secret information retrieval, Advanced Engineering Informatics 19:235-241.

curtin.note

The link to this article is:

curtin.note

http://dx.doi.org/doi:10.1016/j.aei.2005.04.003

curtin.note

Copyright 2006 Elsevier B.V. All rights reserved

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-677
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record