Book Review: Data Hiding
Syngress; Elsevier.com; 324 pages, $49.95.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. It’s often used by those in countries where the sending of encrypted messages is illegal or would raise suspicion.
In Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, authors Nihad Ahmad Hassan and Rami Hijazi offer valuable information to two different communities: First are those living in countries controlled by oppressive regimes or outsiders trying to help them use steganography in their struggle for freedom. On the other side are those trying to break steganography when it’s used. Some examples are law enforcement personnel, forensic investigators, and students.
The book opens with a brief introduction to encryption and steganography, and then dives into the deep content. This is very much a hands-on guide, and about half the book consists of screen shots and figures. Users who want to use steganographic techniques will find this to be a helpful reference, and law enforcement will want to pay close attention to the section that deals with anti-forensic techniques.
While this guide won’t explain the theory of steganography, it comprehensively covers the practical side both for those aiming to hide data and those trying to uncover it.
Reviewer: Ben Rothke, CISSP (Certified Information Systems Security Professional), PCI QSA (Qualified Security Assessor), is a principal eGRC consultant with the Nettitude Group.