Sciweavers

15 search results - page 2 / 3
» Hiding data, forensics, and anti-forensics
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 21 days ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 6 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
MEDIAFORENSICS
2010
13 years 4 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado