When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...