Author:
Neuner Sebastian,Voyiatzis Artemios G.,Schmiedecker Martin,Brunthaler Stefan,Katzenbeisser Stefan,Weippl Edgar R.
Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference48 articles.
1. M. Akgül, M. Kırlıdoğ, Internet censorship in Turkey, Internet Policy Rev 4(2).
2. Random image steganography and steganalysis: present status and future directions;Amirtharajan;Inf Technol J,2012
3. Splinternet behind the great firewall of China;Anderson;Queue,2012
4. On the limits of steganography;Anderson;IEEE J Sel Areas Commun,1998
5. The steganographic file system;Anderson,1998
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On Reviewing the NTFS Time Information Forgery and Detection;Springer Proceedings in Complexity;2024
2. Forensics for Android and Linux-based file system on IoT platform;Journal of Digital Contents Society;2023-02-28
3. Digital Video Steganography: An Overview;Computational Methods and Data Engineering;2022-09-09
4. Ambiguous file system partitions;Forensic Science International: Digital Investigation;2022-07
5. Steganography Method in Error-Correcting Codes;2022 24th International Conference on Digital Signal Processing and its Applications (DSPA);2022-03-30