U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

What You See is Not Always What You Get

NCJ Number
213208
Journal
Law Enforcement Technology Volume: 33 Issue: 1 Dated: January 2006 Pages: 88,90,92
Author(s)
Douglas Page
Date Published
January 2006
Length
4 pages
Annotation
This article describes the use of steganography by criminal groups and reviews forensic steganographic detection.
Abstract
In a paper previously published in July 2004, recommendations were made for forensic steganographic detection. These recommendations advised computer forensic examiners to look for telltale clues of steganography at the scene of an investigation. Books and magazines found in a suspects’ home, for example, can provide clues as to their technological sophistication. Other recommendations included the advice to search for steganography programs on suspect’s computers and to purchase proper steganographic detection software, which differs from the software used to engage in steganography. Steganography is the process of hiding information by embedding messages within other messages. In the digital age, steganography may be used to hide messages on computer images or files and it is widely believed that terrorist organizations may be communicating through the use of steganography. By developing the proper steganography detection techniques and tools, investigators can proactively monitor the use of steganography on the Internet by criminal groups. Exhibits