Professional Documents
Culture Documents
: :
.
2016
-
__________________________
__________________________
__________________________
:____________________
3
,
,
. a -,
,
.
,
, ,
.
.
, .
,
-.
: StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 Quick Stego.
.
: , ,
, -, , , StegSpy
v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5, Quick Stego.
ABSTRACT
As it is today, cybercrime phenomenon which certainly captures the rapid rise across the
world and in our country, the main challenge that arises from members of the security services is
security of data and information that is stored on an electronic medium. Today, with the help of
different digital tools antiforensics, it is possible to perform data manipulation and that
perpetrators while not being detected, big task was charged to persons engaged in maintaining
the security and integrity of computer systems.
Cybercrime, which was recognized as a phenomenon which is negative for human
society, namely most of its forms, is legally regulated in all modern countries that have
developed legislation. Which means that an equal role in its eradication have both police and
judicial authorities. One of the main problems related to this type of crime is to provide digital
evidence. To ensure this type of evidence, authorities in charge of the fight against cyber crime
are essential specific software and a good understanding of how digital forensics and digital anti-
forensics.
In this work we steganographic analysis of website and with the help of the following
tools: StegSpy v2.1, v0.4 Stegdetect, Invisble Digital Ink Toolkit v1.5 and Quick Stego. The
results of this work will certainly help digital forensics to understand the way in which criminals
are manipulating the data that can be potentially digital evidence.Keywords: cyber crime, digital
evidence, digital forensics, digital anti-forensics, steganography, steganographic analysis
StegSpy v2.1, v0.4 Stegdetect, Invisble Digital Ink Toolkit v1.5, Quick Stego.
........................................................................................................... 3
................................................................................................................................... 4
................................................................................................................................. 7
.................................................................................................... 8
: ........................................................................................................................ 8
: ............................................................................................................. 8
: ............................................................................................................................... 9
........................................................................................................................... 9
: .............................................................................................................. 10
: ...................................................................... 10
................................................................................................................................... 10
1. ........................................................................................................................................ 10
1.1 ........................................................................................................... 12
1.2 ....................................................................................................................... 14
2. ................................................................................................ 15
2.1 .................................................................................................... 16
2.2 ......................................................................................... 17
2.3 .............................................................................................. 19
2.4 ................................................................................................. 22
3. - ................................................................................. 28
3.1 -......................................................................................... 28
3.2 - ................................................................................ 30
3.2.1 ............................................................................................................. 30
3.2.1.1 (Data hiding) ................................................................................. 32
3.2.1.1.1 ( )..................................................................... 35
3.2.1.1.2 ................................................................. 36
3.2.1.1.3 .............................................................................................................. 37
3.2.1.2 (Artifact wiping)...................................... 39
3.2.1.2.1 .................................................................. 39
3.2.1.2.2 .................................................. 47
5
3.2.1.3 . (Trail obfuscation) ....................................................... 48
3.2.1.4 / (Attacks against the CF
process/tools) .................................................................................................................................. 50
3.2.2 - ( Hiding Disk Partitions) ................... 51
3.2.3 -o ................................... 54
4. ........................................................................................................... 54
4.1 ................................................................................. 56
4.2 ....................................................................................................... 58
4.2.1 StegoMagic 1.0.................................................................................................................... 59
4.2.2 MP3Stego ............................................................................................................................ 60
4.2.3 GRL RealHidden Version 1.0.............................................................................................. 60
4.2.4 WbStego4.3 ......................................................................................................................... 60
4.3 ....................................................................................... 61
4.3.1 Gargoyle ............................................................................................................................. 62
4.3.2 EnCase ................................................................................................................................ 62
4.3.3 Stegdetect ............................................................................................................................ 62
4.3.4 Softver StegAlyzerSS ........................................................................................................... 63
5. ...................................................................................... 64
5.1 ................................................................................................................... 64
5.2 ......................................................... 64
5.2.1 StegSpy ................................................................................................................................ 65
5.2.2 Stegdetect ............................................................................................................................ 66
5.2.3 Digital Invisible InkToolkit ................................................................................................. 67
5.2.4 QuickStego .......................................................................................................................... 70
5.2.4.1 Quick Stego
72
5.3 GetLeft v1.2 ................................................................................................................................. 78
5.4 ................................. 79
( StegSpy2.1, Stegdetect v0.4, Digital invisible Ink Toolkit 1.5, QuickStego)......................................... 79
................................................................................................................................ 84
................................................................................................................................ 85
,
,
e . ,
, , ,
, .
-, ,
, -,
. ,
.
,
, ,
,
, . .
,
, , ,
, .
, .
, ,
.
, .
: StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 Quick
Stego.
.
,
.
, . ,
, -
, .
, ,
. ,
,
. ,
, . ,
(.
, ,
, , . ). ,
,
, -
.
,
. ,
, ,
, ,
,
.
,
.
,
. ,
, ,
.
,
,
.
, ,
. , .
8
,
StegSpy v2.1, Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 quickStego,
.
, ,
,
,
.
,
,
.
, .
,
. ,
, ,
.
, ,
, ,
.
.
. ,
, , ,
,
.
,
.
9
:
- (
, )
- ( , ,
, )
- ( ,
, )
- ( , ,
)
- ( StegSpy v2.1,
Stegdetect v0.4, Digital Invisble Ink Toolkit v1.5 quickStego)
-
-
, ,
,
, .
,
,
. ,
,
, .
,
,
.
.
, -
.
1.
10
,
.
,
XVIII XI ,
( , ,
, ). ,
.
. ,
,
. ,
,
. , ,
, ,
.
. , ,
.
,
.
,
.
, ,
. , ,
.
, , ,
. 80 ,
, .
,
,
, .
,
. ,
. ,
, .
, 1999.
.
,
,
,
11
,
.
,
. ,
,
.
1950 ,
, 9
, Wattson & Co, , -,
250 ,
.
: , ,
.
( )
, ,
, ,
.1
,
.
,
.
: , ,
, , ,
.
, ,
, ,
. , ,
, ,
,
.
1.1
1
.: , ,
1991, . 142
12
,
, . ,
,
, .
, .
, ,
.
:
, , , ,
.
.2
,
. :
(.298.)
(.299.)
(.300.)
(.301.)
,
(.302.)
(.303.)
(.304.)
,
(.304.).3
.
,
, ,
, .
,
.
.
400 .
,
, .
2
:
, 2.
3
: , 298-304
13
e-mail , spear phishing,
,
(Adobe PDF Reader, Quick Time, Adobe Flash Microsoft Office).
. ,
,
web .
download- ,
, , ,
.
,
.
,
.
, .
, ,
,
.
web 60% ,
,
, web
.
1.2
,
,
. ,
,
.
, ,
,
. ,
, , , ,
,
0 1,
.
14
(The International
Organization on Computer Evidence, IOCE),
(National institute of standards and technology, NIST),
(US Department of Justice, USJD), 1996.
, ,
,
. ,
,
. ,
:
;
,
;
,
;
, ,
, ,
,
;
, ;
.
2.
15
2.1
1999. , -
,
,
.
,
.
,
, ,
, .
, ,
.
, , .4
,
.
, .
,
, .5
,
.
, .
( ), ,
,
( ).
, ,
. .
,
.6
, ,
,
, .
,
,
,
,
0 1 .
4
http://sr.wikipedia.org/sr/___ [01.04.2014.]
5
http://sr.wikipedia.org/wiki/Nau%C4%8Dna_metoda [01.04.2014.]
6
http://sr.wikipedia.org/wiki/ [01.04.2014.]
16
,
, , , ,
, ,
,
-
.
,
.
, , ,
,
, .
:
1. .
,
.
,
, ,
.
2.2
, .
tassein, ,
17
notos, . ,
:7
1. ,
,
. : , ,
,
,
,
.
2.
.
2. ,
: / / ;
/;
/ / ,
.
3.
.
7
.; .; .: EnCase . ,1-2, , 2009,
. 287.
18
3. /,
:
, , ,
,
(, )
, .
4.
/.
: ( HD );
( , .); (
, malware .) ()
( , .).8
, ,
CERT, :
(firewall forensics), (network forensics),
(database forensics) (mobile device forensics).9
2.3
8
, .; .: , , ,
2009, . 9.
9
http://www.cert.hr/sites/default/files/NCERT-PUBDOC-2010-05-301.pdf [18.04.2014.]
19
,
, ,
.
,
,
, .
, , ,
, .
,
.
,
.
:
1)
;
2) ,
;
3)
, ;
4) , ,
,
,
;
5)
, ;
6)
. 10
,
, ,
, IOCE
(International Organization of Computer Evidence) :
1) ,
;
10
http://www.itvestak.org.rs/ziteh_04/radovi/ziteh-19.pdf [18.03.2014.]
20
2) , ,
,
;
3)
;
4) / , ,
.11
, -
, ,
.
,
. ,
,
,
.
:
1) .
,
,
, - . ;
2) .
, ,
,
, .
, ;
3) .
(algoritam hash) .
hash ,
,
;
4) .
, ,
;
5) .
,
, ,
11
, .; .: , , ,
2009, .12.
21
, ,
;
6) .
.
,
.
, , .
7) .
, ,
.
8) .
.
,
,
.12
2.4
,
,
, ,
.
, ,
, ,
.
- , .
, ,
12
, M.: , - , , 2009, .
14.
22
. ,
:
;
;
;
;
.13
- ,
. o, ,
, , :
, , . ,
, ,
: ?, ,
, .
,
,
.
- ,
. , ,
.
(SNLFS).
, .
13
, .; , .; , .: World Wide Web-u:
, Eternal mix, , 2012, . 105-106.
23
5.
,
, .
,
, .
,
,
, -
.
-
, , ,
,
,
, . ,
,
,
.
24
,
,
- .
,
,
. ,
,
.
, ,
:
,
;
, ;
( ).
- -;
, ,
.
,
. ,
;
, ,
;
-
-.14
,
- .
- .
: , ,
.
. ,
, , ,
.
.
.
14
(SNLFS):
, , 2002, . 123.
25
.
6.
, ,
,
,
, -
- -.
,
, .
, ,
, .
, , ,
.
,
,
.
, ,
26
,
, .
,
,
, ,
.
.
.
,
:
15,5 - 32,2C;
;
;
;
; (6)
;
()
;
;
;
, , ,
, ,
(
,
).15
-
, ,
,
.
,
,
15
, .; , .; , .: :
, - , -
, , 2013, . 138-141.
27
.
, ,
,
.
3. -
3.1 -
-,
. ,
, ,
,
.
, ,
, , .
,
- . ,
-,
: -
,
,
.
. ,
- ,
,
,
- ,
.
- , ,
, ,
. ,
-, .
28
, - , -
,
, ,
,
. -
. ( 7) 16
7.
-
, , ,
.
, -
, .
,
-. ,
0 1,
, ASCII ,
. . - .
, .
-,
. ,
, , ,
16
., . -: ,
, , 2010
29
.
- :
;
;
;
;
;
;
- .
,
, .
- ,
,
- . -
, -
, .
,
. 2009 . ,
27, 299 : , , , ,
,
, , ,
, .17
3.2 -
3.2.1
. Microsoft Windows,
Macintosh , Linux-.
80 % Microsoft Windows,
17
2009 , 27, 299
30
-.
, , ,
,
. ,
-,
.
.
8.
-.
, -
Microsoft Windows.
-,
. - , ,
Windowsu
: , , , ,
. ,
. -,
, .
, ,
, - .
, ,
,
, .
-.
,
.
,
. , -
.
31
,
,
, , , , ,
, -
:
- ;
- ;
- ;
- Tampering ;
- Proxy ;
- Non-storage .
-
, .
,
-,
:
1) (Data hiding);
2) (Artifact wiping);
3) . (Trail obfuscation);
4) / (engl. Attacks
against the CF process/tools).18
Data hiding -
,
,
. ,
,
.
, ,
,
18
.,
, , , 2011, . 36
32
.
,
.
-, ,
.
, .
,
, . .
.
, ,
.
:
(R / R), , , slack ,
. ,
, Slacker.
, .
, .
,
.
, ,
.
:
1) ;
2) ;
3) () ;
4) .
,
,
, . ,
,
.
33
.
, .
.
, ,
.
, .
, ( .
pg. , exe. , iso. .),
. , ,
.
. , wma..
wma. exe.,
,
. , ,
(Signature analyse),
.
, ,
, . ,
,
.
, .
. , ,
.
,
, , .
.
,
,
. , ,
, ,
.
:
1) ;
2) ;
3) .
34
3.2.1.1.1 ( )
,
,
. ,
. ,
,
. 11. 2001. ,
. - ,
. ,
, ,
,
.
-
.
,
, ,
, , ,
,
. ,
, ,
,
.
: wma., waw., mp3., jpg., gif., bmp.,
.
,
. ,
, , .
().
. :19
= + +
19
http://www.itvestak.org.rs/ziteh_10/zbornik_radova/Djurickov%20Manja%20-%20Steganografija.pdf
35
9.
, ,
, ,
,
. ,
.
3.2.1.1.2
,
. ,
.
, .
,
.
,
(, ,
.),
.
. : ,
, .
:
;
36
.
,
, .
.
.
.
, ,
. , .
10 ,
.
10.
, ,
.
,
.
, .
3.2.1.1.3
,
.
.
,
37
. .
: (), hash , ,
.
, ,
, .
-.
, .
-.
, , ,
, , ,
,
svap .
, .
.
, ,
.
:
.
. ,
,
, ,
.
, ,
.
,
.
:
FreeOTFE, TrueCrypt, EFS, Criptainer LE,
: TrueCrypt, BitLocker FVE, FreeOTFE.
,
,
,
.
.
.
,
. :
38
- SSL (Secure Sockets Layer);
.
- TSL (Transaction Layer Security);
-.
- VPN , (Virtual Private Network); VPN
.
a
,
.
:
1) ;
2) .
3.2.1.2.1
,
.
.
, . ,
.
,
:
- 5 (Windows);
-
;
-
.
39
,
,
,
.
,
, .
,
. ,
,
, ,
.
,
.
. ,
, .
. : Evidence
Eliminator, R-Wipe & Clean, Eraser, Aevita Wipe & Delete Cyber Scrubs Privacy Suite.
.
.
:
(Data destruction).
,
, .
, ,
, .
.
,
, .
(File deletion). ,
,
,
. ,
, .
.
,
, Windows xplorer .
40
(Formatting).
,
,
.
.
, ,
.
,
.
. ,
.
Recovery . -
. ,
.
(Evidence eliminators).
.
, Evidence Eliminator Robbin Hood
Software Ltd, ,
.
41
- (engl. File Slack);
- /;
- ;
- , Plug-In ;
- Slack Windows Registry-;
- ;
- Windows Registry ;
- Common Dialog / ;
- Windows Registry (NT4/2000/XP) 20
(Defragmentation).
.
,
,
,
.
,
, .
20
., . ,
, , 2009, . 268
42
11.
.
.
. ,
, ,
.
,
.
,
, ,
.
(File Shredding). , ,
.
,
, , ,
.
.
File Shredder, .
.
43
,
,
.
,
, .
,
,
,
,
.
(Disk Wiping).
. ,
,
.
, .
.
, .
.
, ,
( ).
.
0 0 0 0 0 0 0 0 0 0
0 1 1 0 1 0 0 1 1 0
0 0 1 0 1 1 0 1 0 1
44
1 1 1 1 1 1 1 1 1 1
0 0 0 0 0 0 0 0 0 0
1 0 0 1 1 0 1 0 1 0
14. DoD
Guttman .
. , 1996 .
. 35
,
. 35
, ,
.
21
:
1
DoD 3 3 DoD 5220
21
Encachare An Anti-Forensics tool to Encryp, Camuflag, Change File Properties and Rename Files,
Faculty of The Department of Computing Sciences, Texas, USA, 2011
45
PRGN - 8
Guttman 35
15.
,
. ,
,
. , ,
,
,
. ,
, ,
. ,
. ,
, ,
. ,
.
,
Eraser. :
46
16. Eraser
,
.
3.2.1.2.2
,
, .
, ,
,
.
:
- ( );
- ( );
- ( );
- ( ).22
22
http://www.datasolutions.rs/srp/kompjuterska-forenzika/kompjuterska-forenzika-unistavanje.html
47
( 1) ( 2).
(1) (2)
17.
,
. ,
, 0 1,
.
, ,
. ,
, .
.
( ),
, (IP
, MAC )
,
.
( , .),
, ,
, :
48
- IP Spoofing ( IP );
- MAC Spoffing ( MAC );
- VPN ( );
- Proxy ( , Portable
browser);
- Non-storage (Live CD/DVD OS, )
- .
.
. ,
, , -mail
SMTP (Simple Mail Transfer Protocol) SSH Tunneling (
Secure Shell), ,
.
Timestomp ,
, , .
, ,
, ,
.
Transmogrify,
,
. , *.wav
*.jpg, .
,
:
(Log Cleaners) .
,
.
. ,
;
(Spoofing) . . IP
, ,
;
49
(Zombie Accounts) .
.
(Trojan Commands).
.
3.2.1.4
/ (Attacks against the CF process/tools)
-
,
.23
,
.
, -
.
,
.
, ,
.
. , hash
, .
,
. :
. .
.
- ,
.
.
. ,
.
23
http://igneous.scis.ecu.edu.au/proceedings/2007/forensics/01_Kessler_Anti-Forensics.pdf
50
.
. , .
,
.
. ,
.
,
,
,
.
.
. , ,
, -
,
.
, .
, ,
, .
, ,
(Search),
.
,
. ,
.
. ( 18)
51
18.
, Windows
(Command Prompt) , DISKPART, list
volume,
. ( 19)
19.
52
, select
volume 1, remove letter , .
( 20).
20.
, ,
This PC, Windows 10, . ( 21).
53
,
, , ,
. ,
, .
, select volume 1,
assign letter .
3.2.3 -o
-
, ,
.
,
,
, ,
. . ,
( ),
. -,
.
,
,
,
,
.
. , (
) ,
,
, .
4.
-,
.
steganas graphein
. ,
. ,
54
, ,
,
. , -,
,
2001. - , . ,
,
.
, ,
, , .
.
.
, , .
, TCP/IP
., ,
,
,
-. ,
,
,
.
, .wav, .mp3,
.img , .bmp .
. ,
,
, .
,
.
, -
.
-, , -,
,
, . ,
,
. ,
,
,
-. -,
30 .
.
.
,
, .
-.
55
4.1
. ,
,
,
.
.
,
.
.
. ,
,
, .
, . ,
, . ,
.
,
, .
,
. ,
.
,
.
, .
, , .
,
,
.
, . DCT . DCT
,
.
,
, , ,
. .
.
. ,
LSB,
. , ,
, .
, . ,
56
.
,
, . ,
, . ,
,
.
.
.
.
.
, , ,
.
, .
. ,
. ,
.
LSB (Least Significant Byte LSB),
, . ,
, , .
24- BMP
. ,
. ,
, ,
. 24- BMP,
, .
. 8 , 24 ,
, , 3 ,
24 , .
, ,
8- BMP-,
, . GIF- .
.
,
, , ,
. ,
, .
.
. , ,
, , .
,
,
57
. , ,
.
.
. ,
, .
. ,
. .
.
. ,
,
, .
. ,
,
. ,
,
.
,
.
,
,
, .
,
, ,
, .
, ,
,
,
.
, , 3 :
1) ;
2) ;
3) .
4.2
58
4.2.1 StegoMagic 1.0
,
wav aj, 24-i BMP i BMP sliku sa 256 boja.
,
. ,
, ,
. DES .
, 1/8 ,
.
( Enter Password I Verify Password).
59
4.2.2 MP3Stego
mp3 ,
MPEG Audio Layer III .
, , mp3 .
, mp3
.
, ,
mp3 . ,
mp3 , . Oaj o mp3 dist10 ISO
MPEG a , ISO/IEC 11172-3:199 3
3DES .
,
, .
, . JPG, BMP, GIF, MP3, WAV, EXE ,
,
, EXE,
.
,
, .
4.2.4 WbStego4.3
,
bmp, HTML PDF. ,
, .
, ,
. wbStego4,
, ,
: Blowfish, Twofish, CAST128, Rijndael (AES).
, 2
, 256 .
,
60
SHA-1. ,
, , .
4.3
61
4.3.1 Gargoyle
4.3.2 EnCase
,
.
,
, ,
, .
4.3.3 Stegdetect
.
Niela Provos-a, OutGuess.
JPEG
.
62
24. StegDetect
StegAlyzerSS. ,
, ,
.
, ,
.
, .
.
63
5.
( )
5.1
http://www.pegaz-nekretnine.com/.
2007. .
.
PDF .
, .jpg .
, 2.5
mb, 64 , .jpg ,
54. 4 .gif 8 .png .
9 PDF 13 HTML .
,
freeware,
. :
StegSpy v2.1, Stegdetect v0.4, Digital Invisible Ink v1.5 i Quick Stego,
GetLeft v1.2.
,
. .
, PDF ,
. ,
,
, ,
.
5.2
64
5.2.1 StegSpy
je Michael T. Raggo. :
Hiderman, JPHideandSeek, Masker, JPegX i Invisible Secrets.
http://www.spy-hunter.com/stegspydownload.html.
MS Visual Basic- .
. ,
Run,
( 25). ,
.
, .
http://www.pegaz-nekretnine.com/
( 26).
65
26.
5.2.2 Stegdetect
Stegdetect
. Niela
Provos-a OutGuess, .
(v0.2,v0.3, v0.4, v0.5 v0.6),
0.4, xsteg,
.
JPEG . : Jsteg, jphide, Invisible Secrets,
Outguess 0.13b, F5, appendX and Camouflage.
C . Stegdetect v0.6
,
stego . ,
66
,
.
. File,
.
http://www.pegaz-nekretnine.com/
Stegdetect v0.4 . ( 27)
27.
Stegdetect v0.4
,
,
.
,
, . ,
stego .
67
24 .
Windows Linux,
, . Digital Invisible InkToolkit
,
,
. http://www.pegaz-
nekretnine.com
.
,
Analysis,
. Pick image
, K .
.( 29
30)
68
29. Digital
Invisible InkToolkit
69
30. Digital
Invisible InkToolkit
5.2.4 QuickStego
QuickStego Windows
.
.
, BMP, JPG,
JPEG GIF
BMP.
.
.
, . ,
, upload TXT .
1.2 www.quickcrypto.com.
QuickStego v1.2,
o .
.
,
.
70
31. QuickStego
Pegaz
,
.
Open Image.
.
,
.
.
, Hide Text,
,
Get Text.
71
5.2.4.1
Quick Stego
QuickStego.
, ,
. ,
.
32.
72
33.
34.
73
35.
36.
74
37.
38.
75
39.
40.
76
41.
,
THE IMAGE DOES NOT HAVE A QUICK STEGO SECRET MESSAGE,
.
77
5.3 GetLeft v1.2
GetLeft v1.2 ,
http://www.pegaz-nekretnine.com.
,
. ,
GetLeft. .
File,
.
, Start,
.
, .
78
5.4
agencija1,
Quickstego. agencija1 agencija,
http://www.pegaz-nekretnine.com/ .
. ( 43)
43.
Milos Markovic 2g1/0044/14. Hide Text,
Save image .
, QuickStego
BMP, JPG, JPEG GIF-.
.
.
79
Passworda ,
.
,
. QuickStego ,
StegSpy 2.1.
: Hiderman, JPHideandSeek, Masker, JPegX i Invisible Secrets.
agencija1, ( 44):
44. agencija1.
,
.
, .
,
.
stegdetect v0.4,
, (
45):
80
45. Stegdetect v0.4
81
46.
47.
82
.
. Decode,
,
. ,
Benchmark :
( 48 49).
48. Benchmark
49. Benchmark
83
,
, ,
.
.
. ,
. ,
.
,
.
.
, .
,
, .
.
,
, , ,
. ,
,
.
. ,
.
.
. ,
,
.
, ,
.
.
,
. ,
,
.
, ,
84
.
,
.
,
.
.
,
.
,
,
, ,
,
.
85
.: ,
, 1991, . 142.
:
, 2.
: , 298-304.
.; .; .: EnCase . ,1-2,
, 2009, . 287.
, .; .: ,
, , 2009, . 9.
, .; .: ,
, , 2009, .12.
, M.: , -
, , 2009, . 14.
, .; , .; , .: World Wide Web-u:
, Eternal mix, , 2012, . 105-106.
(SNLFS):
, , 2002, .
123.
, .; , .; , .:
: , -
, - , , 2013, . 138-141.
., . -:
, , , 2010.
.,
, , , 2011, . 36.
., . ,
, , 2009, . 268.
Encachare An Anti-Forensics tool to Encryp, Camuflag, Change File Properties and
Rename Files, Faculty of The Department of Computing Sciences, Texas, USA, 2011.
Kaur G., Kaur K. Digital Watermarking and Other Data Hiding Tehniques, IJITEE,
April 2013.
Lian S. Multimedia Content Encryption Techniques and Applications, Auerbach
Publication, New York, USA, September 2008, . 21.
Marcella A, Menedez D. Cyber Forensics, Auerbach Publication, New York, USA,
2008, . 96.
Kessler G.C. Anti- Forensics and the Digital Investigator, Champlain College
Burlington, USA, 2007
86
http://sr.wikipedia.org/sr/___ [01.04.2014.]
http://sr.wikipedia.org/wiki/Nau%C4%8Dna_metoda [01.04.2014.]
http://sr.wikipedia.org/wiki/ [01.04.2014.]
http://www.cert.hr/sites/default/files/NCERT-PUBDOC-2010-05-301.pdf [18.04.2014.]
http://www.itvestak.org.rs/ziteh_04/radovi/ziteh-19.pdf [18.03.2014.]
http://www.datasolutions.rs/srp/kompjuterska-forenzika/kompjuterska-forenzika-
unistavanje.html
http://igneous.scis.ecu.edu.au/proceedings/2007/forensics/01_Kessler_Anti-Forensics.pdf
http://www.pegaz-nekretnine.com/
http://www.spy-hunter.com/stegspydownload.html
http://www.quickcrypto.com
87