Table of Contents
The World of Information Technology is ever advancing and every latest development discovers a superior responsibility in day to day life. The revitalization of Evidence from Electronic Devices is currently strongly part of law enforcement. Electronic Evidence is important, and it has to be treated in the same way as Traditional Forensic Evidence, such as with care and respect (Arnold et al, 2003). The systems of recuperating Electronic Evidence whilst sustaining evidential stability and integrity may appear multifaceted and expensive, but experiences have indicated that if it is used accurately it may create evidence, which is both cost effective and compelling. The Good Guide for Computer-Based Electronic Evidence has four principles, but in my case, I will discuss one principle which states that: “An audit trail or any other record of every procedure applied to Computer-Based Electronic Evidence has to be generated and conserved. A self-determining third party has to be capable of scrutinizing those procedures and attaining similar outcomes”. Therefore, in order to comply with the guides of Computer-Based Electronic, at any time practicable, an image has to be produced for the whole target machine. Selective file copying can be deemed as a substitute in certain condition, for instance, when the sum of data to be imaged this impractical.
Two Methods in Which Data Can be hidden within Storage Media
Steganography is referred to as the art of covered writing, and its aim is to transform communiqué in order to hide information from the third party. This varies from cryptography the art of covert writing that is intended to transform the information indecipherable by the third party, but never hide the continuation of the furtive communiqué. Even if Steganography is divided and different from cryptography, also there are several analogies connecting the two, and various writers such as Bauer (2002) grouped Steganography as a kind of cryptography because hidden communiqué is a kind of secret message. Even though, the word Steganography was just coined during the ending of fifteenth century, the application of Steganography dates back a number of millennia. Microfilm and Microdots, an affix of war movies came about following the invention of cinematography. Steganography hides Johnson et al (2001), the hidden information, but the reality is that the two parties are conversing with each other. The Steganography procedure normally engages placing secret communication in a number of transport means known as the carrier. The secret message is embeddedin the carrier to form the steganagraphy medium. The use of a steganography key may be used for encryption of the hidden message and randomization in the steganography scheme.
Watermarking is defined as the process of computer-aided information hiding in a carrier signal. The hidden messages have to, but do not require having a relation to the haulier signal. Digital watermarking can be applied to confirm the authenticity of the haulier signal. It is outstandingly applied for tracing copyright encroachments and for banknotes verification (Kahn, 1996). Like conventional watermarks, the digital watermarks are just traceable under certain situations, for instance, after applying a number of imperceptible and algorithm anytime else. If a digital watermark deforms the haulier signals in a means that attains perceivable it has no use. Conventional watermarks (Wayner, 2002) can be used to discernible media such as video and images, while in the digital watermarks the signal can be audio, texts, videos, pictures and 3D models. Signals can transmit many diverse watermarks at the same time. The properties requirements for digital watermarks depending on the usage case in which, it is used. In order to mark media files with copying information, digital watermarks have to be rather forceful against adjustments, which may be used to the haulier signals. Instead, if truthfulness has to be guaranteed and delicate watermarks may be used. Both watermarking and Stegnagraphy, uses Steganography methods to entrench data secretly in noisy signal, but while Steganography focuses on imperceptibility to senses of individual watermarking attempts to manage the robustness as top priority.