https://www.forensicmag.com/article/2012/08/anti-digital-forensics-next-challenge 1/5
10/19/2017 Anti-Digital Forensics, The Next Challenge
https://www.forensicmag.com/article/2012/08/anti-digital-forensics-next-challenge 2/5
10/19/2017 Anti-Digital Forensics, The Next Challenge
https://www.forensicmag.com/article/2012/08/anti-digital-forensics-next-challenge 3/5
10/19/2017 Anti-Digital Forensics, The Next Challenge
been changed. The only way to know if the .jpg was altered is
to check its size in bytes or its hash value against its pre-
unaltered values. Obviously, those pre-unaltered values would
have to be known and documented somewhere. Examiners
need to look for the presence of steganography tools on the
suspects computer. If no tools are discovered, possibly their
artifacts can be found in the registery. To aid in this process,
there are some commercially available tools that can detect
the presence of steganography applications and their artifacts.
RELATED READS
Houston CSU:
Citys Forensic
Science Center
and Police at Odds
Over Scene Response
https://www.forensicmag.com/article/2012/08/anti-digital-forensics-next-challenge 4/5
10/19/2017 Anti-Digital Forensics, The Next Challenge
Crime Scene
Diagramming:
Changing Ways to
Capture, Present
Your Scenes
Sort by Best
Recommend Share
LOG IN WITH
OR SIGN UP WITH DISQUS ?
Name
https://www.forensicmag.com/article/2012/08/anti-digital-forensics-next-challenge 5/5