Browser unable to execute script; please use the site map to navigate the site.

SWF Steganography: Techniques for Hiding Data in SWF Files

Fouche and Olivier


(Citation)Citation information

M.-A. Fouche and M. S. Olivier. “SWF Steganography: Techniques for Hiding Data in SWF Files”. In: Advances in Digital Forensics VII. Ed. by G. Peterson and S. Shenoi. Springer, 2011, pp. 245–255


Small Web Format (SWF) or Flash files are widely used on the Internet to provide Rich Internet Applications (RIAs). This makes SWF files an excellent candidate for disseminating hidden data. However, digital forensic investigators are unable to detect and extract the hidden data because limited information is available about the techniques used to hide data in SWF files. This paper investigates several data insertion techniques for hiding data in SWF files. The techniques include appending data to an SWF file, adding an extra Metadata tag, creating a custom Definition tag, and replacing fill bits with hidden data. Experimental results obtained with a simple SWF (version 10) file are used to evaluate the effectiveness of the data hiding techniques and identify the artifacts that remain.

(Authoritative version on publisher's site)Definitive version

The definitive version of the paper is available from the publisher.
DOI: 10.1007/978-3-642-24212-0_19

(BibTeX record)BibTeX reference

author={Mark-Anthony Fouche and Martin S Olivier},
title={{SWF} Steganography: Techniques for Hiding Data in {SWF} Files},
booktitle={Advances in Digital Forensics {VII}},
editor={Gilbert Peterson and Sujeet Shenoi},
pages={245--255} )