{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T09:15:50Z","timestamp":1761642950083,"version":"build-2065373602"},"reference-count":11,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["M10640030004-08N4003-00410"],"award-info":[{"award-number":["M10640030004-08N4003-00410"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004084","name":"Korea Science and Engineering Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004084","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.05.001","type":"journal-article","created":{"date-parts":[[2009,6,25]],"date-time":"2009-06-25T07:30:23Z","timestamp":1245915023000},"page":"16-24","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"title":["Forensic investigation of Microsoft PowerPoint files"],"prefix":"10.1016","volume":"6","author":[{"given":"Jungheum","family":"Park","sequence":"first","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2005","series-title":"POI-HSLF Java API to access Microsoft PowerPoint format files","author":"Burch","key":"10.1016\/j.diin.2009.05.001_bib7"},{"issue":"2","key":"10.1016\/j.diin.2009.05.001_bib8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MSECP.2004.1281241","article-title":"Information leakage caused by hidden data in published documents","volume":"2","author":"Byers","year":"2004","journal-title":"IEEE Security Privacy"},{"year":"2005","series-title":"File system forensic analysis","author":"Carrier","key":"10.1016\/j.diin.2009.05.001_bib2"},{"issue":"5","key":"10.1016\/j.diin.2009.05.001_bib1","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1016\/j.jss.2006.07.006","article-title":"Taking advantage of a disadvantage: digital forensics and steganography using document metadata","volume":"80","author":"Castiglione","year":"2007","journal-title":"Journal of Systems and Software"},{"year":"2006","series-title":"WD2002: frequently asked questions about \u201callow fast saves\u201d","author":"Microsoft Corporation","key":"10.1016\/j.diin.2009.05.001_bib6"},{"year":"2008","series-title":"Windows compound binary file format specification","author":"Microsoft Corporation","key":"10.1016\/j.diin.2009.05.001_bib4"},{"year":"2008","series-title":"Microsoft Office PowerPoint 97\u20132007 binary file format (.ppt) specification","author":"Microsoft Corporation","key":"10.1016\/j.diin.2009.05.001_bib5"},{"year":"2008","series-title":"Extraction of residual information in the Microsoft PowerPoint file from the viewpoint of digital forensics considering PerCom environment","author":"Park","key":"10.1016\/j.diin.2009.05.001_bib11"},{"author":"Rentz","key":"10.1016\/j.diin.2009.05.001_bib3"},{"author":"SearchEnterpriseDesktop.com","key":"10.1016\/j.diin.2009.05.001_bib9"},{"author":"Wikipedia","key":"10.1016\/j.diin.2009.05.001_bib10"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000292?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000292?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T09:11:20Z","timestamp":1761642680000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":11,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["S1742287609000292"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.05.001","relation":{},"ISSN":["1742-2876"],"issn-type":[{"type":"print","value":"1742-2876"}],"subject":[],"published":{"date-parts":[[2009,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Forensic investigation of Microsoft PowerPoint files","name":"articletitle","label":"Article Title"},{"value":"Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.diin.2009.05.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2009 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}