| Dedication | p. V |
| Raggo Acknowledgments | p. VII |
| Hosmer Acknowledgments | p. IX |
| About the Authors | p. XV |
| About the Techical Editor | p. XVII |
| Preface | p. XIX |
| History of Secret Writing | p. 1 |
| Introduction | p. 1 |
| Cryptology | p. 2 |
| Substitution Cipher | p. 3 |
| Transposition Cipher | p. 8 |
| The Difference Between Substitution Ciphers and Transposition Ciphers | p. 10 |
| Steganography | p. 10 |
| Cardano's Grille | p. 11 |
| Summary | p. 17 |
| References | p. 17 |
| Four Easy Data Hiding Exercises | p. 19 |
| Hiding Data in Microsoft Word | p. 20 |
| Image Metadata | p. 26 |
| Mobile Device Data Hiding | p. 29 |
| File Compression Tool Data Hiding | p. 33 |
| Summary | p. 38 |
| References | p. 39 |
| Steganography | p. 41 |
| Introduction | p. 41 |
| Steganographic Techniques | p. 42 |
| Insertion Methods | p. 43 |
| Modification | p. 46 |
| Hiding in PDFs (Insertion Meets LSB) | p. 49 |
| Hiding in Executables (Hydan) | p. 52 |
| Hiding in HTML | p. 54 |
| Steganalysis | p. 55 |
| Anomalous Analysis | p. 58 |
| Steganalysis Tools | p. 59 |
| Freeware Tools | p. 59 |
| Summary | p. 66 |
| References | p. 67 |
| Multimedia Data Hiding | p. 69 |
| Multimedia Overview | p. 69 |
| Data Hiding in Digital Audio | p. 70 |
| Simple Audio File Embedding (Imperceptible Approach) | p. 70 |
| Data hiding in a .wav file | p. 73 |
| StegAnalysis of LSB Wave Data Hiding | p. 78 |
| Advanced Audio File Embedding | p. 79 |
| Audio Summary | p. 79 |
| Data Hiding in Digital Video | p. 80 |
| MSU Stego | p. 80 |
| TCStego | p. 83 |
| Summary | p. 89 |
| References | p. 90 |
| Data Hiding Among Android Mobile Devices | p. 91 |
| Android Overview | p. 91 |
| Android ImgHid and Reveal App | p. 91 |
| Analysis of the Resulting ImgHid Data Hiding Operation | p. 95 |
| Android My Secret App | p. 98 |
| Stego Analysis of the Resulting My Secret Images | p. 100 |
| Summary | p. 101 |
| StegDroid | p. 102 |
| Using the Android Application | p. 103 |
| Summary | p. 106 |
| References | p. 106 |
| Apple iOS Data Hiding | p. 107 |
| Introduction | p. 107 |
| Mobile Device Data Hiding Applications | p. 107 |
| Spy Pix Analysis | p. 110 |
| Stego Sec Analysis | p. 116 |
| InvisiLetter Analysis | p. 125 |
| Summary | p. 130 |
| References | p. 131 |
| Operating System Data Hiding | p. 133 |
| Windows Data Hiding | p. 135 |
| Alternate Data Streams Reviewed | p. 135 |
| Stealth Alternate Data Streams | p. 138 |
| Volume Shadowing | p. 140 |
| Linux Data Hiding | p. 150 |
| Linux Filename Trickery | p. 150 |
| Extended Filesystem Data Hiding | p. 151 |
| TrueCrypt | p. 157 |
| References | p. 166 |
| Virtual Data Hiding | p. 167 |
| Introduction | p. 167 |
| Hiding a Virtual Environment | p. 168 |
| Getting Started | p. 168 |
| A Review of Virtual Environments | p. 171 |
| VMware Files | p. 172 |
| Hiding Data in a VMware Image | p. 172 |
| Summary | p. 179 |
| References | p. 179 |
| Data Hiding in Network Protocols | p. 181 |
| Introduction | p. 181 |
| VoIP Data Hiding | p. 184 |
| Delayed Packet Modification Method | p. 187 |
| IP Layer Data Hiding, The TTL Field | p. 188 |
| Investigating Protocol Data Hiding | p. 190 |
| Summary | p. 191 |
| References | p. 191 |
| Forensics and Anti-Forensics | p. 193 |
| Introduction | p. 193 |
| Anti-Forensics-Hiding your tracks | p. 194 |
| Data Hiding Passwords | p. 194 |
| Hiding Your Tracks | p. 195 |
| Forensics | p. 197 |
| Looking for Data Hiding Software | p. 198 |
| Finding Remaining Artifacts | p. 199 |
| Identifying and View Cached Images (Cache Auditing Tools) | p. 203 |
| Evidence in Thumbnails | p. 204 |
| Searching for Hidden Directories and Files | p. 208 |
| Network IDS | p. 209 |
| Summary | p. 211 |
| References | p. 211 |
| Mitigation Strategies | p. 213 |
| Forensic Investigation | p. 213 |
| Steganography Use Discovery | p. 213 |
| Steganography Carrier Discovery | p. 215 |
| Hidden Content Extraction | p. 215 |
| Mitigation | p. 216 |
| Network Technologies for detecting Data Hiding | p. 219 |
| Endpoint Technologies for detecting Data Hiding | p. 223 |
| Summary | p. 225 |
| References | p. 227 |
| Futures | p. 229 |
| The Future, and the Past | p. 229 |
| Future Threats | p. 230 |
| Steganography as a Countermeasure | p. 233 |
| Current and Futuristic Combined Threats | p. 235 |
| Summary | p. 236 |
| Index | p. 237 |
| Table of Contents provided by Ingram. All Rights Reserved. |