Data Hiding Techniques for Database Environments
Saved in:
| Title: | Data Hiding Techniques for Database Environments |
|---|---|
| Authors: | Pieterse, Heloise, Olivier, Martin |
| Contributors: | University of Pretoria South Africa, Gilbert Peterson, Sujeet Shenoi, TC 11, WG 11.9 |
| Source: | IFIP Advances in Information and Communication Technology ; 8th International Conference on Digital Forensics (DF) ; https://inria.hal.science/hal-01523715 ; 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.289-301, ⟨10.1007/978-3-642-33962-2_20⟩ |
| Publisher Information: | CCSD Springer |
| Publication Year: | 2012 |
| Subject Terms: | Database forensics, data hiding, [INFO]Computer Science [cs] |
| Subject Geographic: | Pretoria, South Africa |
| Time: | Pretoria, South Africa |
| Description: | Part 6: ADVANCED FORENSIC TECHNIQUES ; International audience ; Databases are widely used today, but the study of forensic analysis in database environments has not been extensive. The lack of research is due mostly to the complex structure of databases and the scarcity of database forensic tools. This has created a wide range of possibilities for data hiding as a means to hinder data discovery during forensic investigations. This paper describes several techniques that can be used to hide data in a database. Although the techniques are evaluated with respect to object-relational databases, they can be applied to any type of database. |
| Document Type: | conference object |
| Language: | English |
| DOI: | 10.1007/978-3-642-33962-2_20 |
| Availability: | https://inria.hal.science/hal-01523715 https://inria.hal.science/hal-01523715v1/document https://inria.hal.science/hal-01523715v1/file/978-3-642-33962-2_20_Chapter.pdf https://doi.org/10.1007/978-3-642-33962-2_20 |
| Rights: | http://creativecommons.org/licenses/by/ ; info:eu-repo/semantics/OpenAccess |
| Accession Number: | edsbas.F08A32F5 |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science