This free survey is powered by QUESTIONPRO.COM
Steganography in the Forensics Profession
 
 
1. What is your role in computer forensics? (Select all that apply)
 
Law Enforcement
 
Internal Corporate Investigations
 
Corporate Consultant
 
Private Practice
 
Researcher
 
Hobby
 
Other
 

 
 
 
2. Have you ever encountered steganography in an investigation/research project?
 
Yes
 
No (Please skip to question 8)
 
 
 
3. What type of information was hidden? (Select all that apply)
 
Communication about illicit activities
 
Child pornography images
 
Child pornography videos
 
Other images
 
Other videos
 
Music / Audio files
 
Intellectual property
 
Research
 
Unknown
 
Other
 

 
 
 
4. What kind of cover was used to hide the information? (Select all that apply)
 
Image file(s)
 
Audio file(s)
 
Video file(s)
 
Text
 
Network traffic
 
Other
 

 
 
 
5. Was the steganography software or algorithm(s) used identified?
 
Yes
 
No
 
 
 
6. Was it possible to extract any of the hidden information?
 
Yes - completely
 
Yes - partially
 
No
 
 
 
g) If you were able to extract any of the information, please provide details on the method used here.
   
b) How was steganography used?
   
7. a) Please provide a brief description of the case.
   
c) What prompted you to look for it?
   
d) What methods were used to locate it?
   
e) Where was the user(s) of the steganography located (geographically)?
   
f) What steganography software (or traces) or algorithms were used and how did you discover this?
   
 
 
 
8. Do you believe that steganography will be a significant issue in the future?
 
Yes
 
No (Please skip to question 10)
 
 
 
9. What uses do you believe will be an issue? (Select all that apply)
 
Communication about illicit activities
 
Transfer of child pornography images
 
Transfer of child pornography videos
 
Transfer of other images
 
Transfer of other videos
 
Transfer of music / audio files
 
Transfer of intellectual property
 
Other
 

 
 
 
10. a) Are there any steganography algorithms and/or software that youbelieve will become commonplace.
   
b) Are there any steganalysis (discovery and extraction of steganography) algorithms and/or software that you have used (indicate such) or believe would be useful for forensics.
   
c) Are there any concerns you would like to see addressed in a forensic steganography toolkit.
   
d) If you have any other comments or concerns, please list them here as well.
   
 
Please contact [email protected] if you have any questions regarding this survey.
Survey Software Powered by QuestionPro Survey Software