DSpace Repository

ANTI-FORENSIC TOOL FOR DATA HIDING BASED ON MULTI-LAYERED SECURITY. APPROACH

Show simple item record

dc.contributor.author Singh, Avtar
dc.date.accessioned 2014-11-29T06:22:36Z
dc.date.available 2014-11-29T06:22:36Z
dc.date.issued 2009
dc.identifier M.Tech en_US
dc.identifier.uri http://hdl.handle.net/123456789/12095
dc.guide Singh, Kuldip
dc.description.abstract Data Hiding is a broad term. But instead of attempting to destroy any evidence of a security breach, Data Hiding looks to mask it. It is evidently widely known within the hacker community that the good guys have the toolsets and capabilities to shed light on their tracks, even despite efforts to cover them up. As such, many newer and more currently popular hacking tools and techniques involve the ability to mask or hide individual files and the data within those files. The number of scholarly papers on protecting against Anti-Forensic methods is greatly outnumbered by the number of websites about how to exploit the forensic process. Therefore, it would seem that perpetrators are working harder to subvert the system than academia is working to strengthen forensics. In this Dissertation entitled "Anti-Forensic Tool for Data Hiding Based on Multi-Layered Security Approach", a solution is proposed in which the scheme is proposed in which the data is first encrypted and then it is encoded into the image selected by the user. The proposed strategy is tested with various stego attacks and the result is analyzed that prove the security of the tool. The accuracy of the predictions has been compared with existing approaches and the predictions are validated using the standard dataset. The Anti-Forensic tool can further be extended to perform other functionalities like Artifact Wiping, Trail Obfuscation, etc. to make the tool. en_US
dc.language.iso en en_US
dc.subject ELECTRONICS AND COMPUTER ENGINEERING en_US
dc.subject ANTI-FORENSIC TOOL en_US
dc.subject DATA HIDING en_US
dc.subject MULTI-LAYERED SECURITY en_US
dc.title ANTI-FORENSIC TOOL FOR DATA HIDING BASED ON MULTI-LAYERED SECURITY. APPROACH en_US
dc.type M.Tech Dessertation en_US
dc.accession.number G14636 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record