Trends in steganography

E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …

Verifying completeness of relational query results in data publishing

HH Pang, A Jain, K Ramamritham, KL Tan - Proceedings of the 2005 …, 2005 - dl.acm.org
In data publishing, the owner delegates the role of satisfying user queries to a third-party
publisher. As the publisher may be untrusted or susceptible to attacks, it could produce …

Information hiding: challenges for forensic experts

W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …

Toward robust hidden volumes using write-only oblivious RAM

EO Blass, T Mayberry, G Noubir… - Proceedings of the 2014 …, 2014 - dl.acm.org
With sensitive data being increasingly stored on mobile devices and laptops, hard disk
encryption is more important than ever. In particular, being able to plausibly deny that a hard …

Deftl: Implementing plausibly deniable encryption in flash translation layer

S Jia, L **a, B Chen, P Liu - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Mobile devices today have been increasingly used to store and process sensitive
information. To protect sensitive data, mobile operating systems usually incorporate a …

On implementing deniable storage encryption for mobile devices

A Skillen, M Mannan - 2013 - spectrum.library.concordia.ca
Data confidentiality can be effectively preserved through encryption. In certain situations, this
is inadequate, as users may be coerced into disclosing their decryption keys. In this case …

An application-layer plausibly deniable encryption system for wearable devices

N Chen, B Chen, W Shi - Discover Internet of Things, 2024 - Springer
Wearable devices especially smartwatches are widely used in our daily life. With their
increased use, a large amount of sensitive data are collected, stored, and managed in those …

A short survey on image steganography and steganalysis techniques

YJ Chanu, T Tuithung, KM Singh - 2012 3rd National …, 2012 - ieeexplore.ieee.org
The paper describes a short survey on different types of steganography techniques for
image in spatial and transform domains and steganalysis techniques for the detection of …

[HTML][HTML] Time is on my side: Steganography in filesystem metadata

S Neuner, AG Voyiatzis, M Schmiedecker… - Digital …, 2016 - Elsevier
We propose and explore the applicability of file timestamps as a steganographic channel.
We identify an information gap between storage and usage of timestamps in modern …

Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels

AM Dunn, MZ Lee, S Jana, S Kim… - … USENIX Symposium on …, 2012 - usenix.org
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …