Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations

Author:

Michaylov Kristian D.1,Sarmah Dipti K.1ORCID

Affiliation:

1. Department of Semantics, Services and Cybersecurity, University of Twente, Enschede, The Netherlands

Publisher

Informa UK Limited

Subject

Computer Science Applications,History,Education

Reference67 articles.

1. Kahn D. The history of steganography. In: Anderson R, editor. Information hiding. Lecture notes in computer science. Berlin, Heidelberg: Springer, 1996. p. 1–5. https://link.springer.com/content/pdf/10.1007/10719724.pdf.

2. Digital image steganography: Survey and analysis of current methods

3. Poisel R, Tjoa S. 2011. Forensics Investigations of Multimedia Data: a review of the state-of-the-art. In: 2011 Sixth International Conference on IT Security Incident Management And IT Forensics, p. 48–61. 10.1109/IMF.2011.14.

4. A review of image steganalysis techniques for digital forensics

5. Cameron L. With cryptography easier to detect cybercriminals Now hide malware in plain sight. Call it steganography. Here’s How It Works. [cited 2023 Oct 10]. https://www.computer.org/publications/tech-news/research/how-steganography-works.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3