1 |
Jung Heum Park, Bora Park, Sangjin Lee, Seokhite Hong, and Jong Hyuk Park, "Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment," The 2nd International Workshop on Web and Pervasive Security, IEEE, pp.584-589, March 2008
|
2 |
Singo INOUE, Kyoko, MAKINO, Ichiro MURASE, Osamu TKIZAWA, Tsutomu MATSUMOTO, Hiroshi NAKAGAWA, "A Proposal on Information Hiding Methods using XML", http://takisawa.ne.jp/nlp_xml.pdf
|
3 |
Byers, S., 2004 Information leakage caused by hidden data in published documents. IEEE Security Privacy 2(2), 23-27
DOI
ScienceOn
|
4 |
Frank Rice, Microsoft Corporation, "Introducing the Office(2007) Open XML File Formats", May 2006, http://msdn2.microsoft.com/ko-kr/library/aa338205.aspx
|
5 |
Hyukdon Kwon, Yeog Kim, Sangin Lee, Jongin Lim, "A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format", International Conference on Information Science and Security ICISS 2008 p.141-146
|
6 |
Payne Group, 2005 Metadata Assistant Available from : http://www.payneconsulting.com/products
|
7 |
A Castiglione, De Santis, C. Soriente, "Taking advantages of a disadvantage: Digital forensics and steganography using document metadata", The Journal of Systems and software, vol 80, Issue 5, pp.750-764, May 2007
DOI
ScienceOn
|
8 |
Daniel Rentz, "Microsoft Compound Document File Format", http://sc.openoffice.org
|
9 |
Workshare, 2005 Trace Available from : http://www.workshare.com
|
10 |
ECMA-376 1st Edition, "Office open XML File Formats", December 2006
|
11 |
Soft Experience, 2005 Catalogue Available from : http://peccatte.karefil.com/ software/Catalogue
|