The future of digital forensics: Challenges and the road ahead

L Caviglione, S Wendzel… - IEEE Security & …, 2017 - ieeexplore.ieee.org
Today's huge volumes of data, heterogeneous information and communication
technologies, and borderless cyberinfrastructures create new challenges for security experts …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

A survey on information hiding using video steganography

M Dalal, M Juneja - Artificial Intelligence Review, 2021 - Springer
In the last few decades, information security has gained huge importance owing to the
massive growth in digital communication; hence, driving steganography to the forefront for …

Information hiding: challenges for forensic experts

W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …

[HTML][HTML] Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding

T Göbel, H Baier - Digital Investigation, 2018 - Elsevier
Ext4 is a popular file system used by Android and many Linux distributions. With its rising
pervasiveness, anti-forensic techniques like data hiding may be used to conceal data. This …

Time for truth: Forensic analysis of ntfs timestamps

M Galhuber, R Luh - Proceedings of the 16th International Conference …, 2021 - dl.acm.org
Timeline forgery a widely employed technique in computer anti-forensics. Numerous freely
available and easy-to-use tampering tools make it difficult for forensic scientists to collect …

A generic taxonomy for steganography methods

S Wendzel, L Caviglione, W Mazurczyk, A Mileva… - Authorea …, 2022 - techrxiv.org
A unified understanding of terms and their applicability is essential for every scientific
discipline: steganography is no exception. Being divided into several domains (for instance …

Revisiting data hiding techniques for apple file system

T Göbel, J Türr, H Baier - … of the 14th International Conference on …, 2019 - dl.acm.org
Data hiding is an important part of anti-forensic research since the continuous development
of operating systems, file systems and other software may close some previously known …

Optimized data hiding in complemented or non-complemented form in video steganography

S Kamil, M Ayob, SNHS Abdullah… - 2018 Cyber Resilience …, 2018 - ieeexplore.ieee.org
Optimal match in the cover media was found to be effective for accurate data hiding and
improving the visual quality of steganography algorithms. Lately, several optimized …

Information hiding using minification

P Rajba, W Mazurczyk - IEEE Access, 2021 - ieeexplore.ieee.org
Information hiding techniques have been recently getting increased attention from the
security community. This is because attackers often apply a variety of data hiding methods to …