ch 10 for
are also called steg tools
Steganalysis tools
____ has also been used to protect copyrighted material by inserting digital watermarks into a file.
Steganography
____ steganography replaces bits of the host file with other bits of data.
Substitution
EXIF Data is metadata about an image file and can be very valuable to a forensic examiner.
True
Steganalysis is a process by which data can be hidden within an image file.
True
image format derived from the TIFF file format
XIF
Recovering pieces of a file is called ____.
carving
When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.
copyright
____________________ is the process of coding of data from a larger form to a smaller form.
data compression
You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.
graphics editors
If you can't open an image file in an image viewer, the next step is to examine the file's ____.
header data
The simplest way to access a file header is to use a(n) ____ editor
hexadecimal
The two major forms of steganography are ____________________ and substitution.
insertion
Under copyright laws, computer programs may be registered as ____.
literary works
short for "picture elements"
Pixels
drawing program that creates vector files
Adobe Illustrator
Some standard image file formats include:
BMP GIF JPG
What do forensics tools use to identify an image format?
File Table
tool used to rebuild image file headers
Hex Workshop
graphics file format that uses lossy compression
JPEG
____ compression compresses data by permanently discarding bits of information in the file.
Lossy
combinations of bitmap and vector images
Metafile graphics
Microsoft image viewer
Microsoft Office Picture Manager
