Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The future of digital forensics: Challenges and the road ahead
Today's huge volumes of data, heterogeneous information and communication
technologies, and borderless cyberinfrastructures create new challenges for security experts …
technologies, and borderless cyberinfrastructures create new challenges for security experts …
Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …
systems and digital forensics, respectively, but one that has matured greatly over the past …
A survey on information hiding using video steganography
In the last few decades, information security has gained huge importance owing to the
massive growth in digital communication; hence, driving steganography to the forefront for …
massive growth in digital communication; hence, driving steganography to the forefront for …
Information hiding: challenges for forensic experts
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …
[HTML][HTML] Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding
T Göbel, H Baier - Digital Investigation, 2018 - Elsevier
Ext4 is a popular file system used by Android and many Linux distributions. With its rising
pervasiveness, anti-forensic techniques like data hiding may be used to conceal data. This …
pervasiveness, anti-forensic techniques like data hiding may be used to conceal data. This …
Time for truth: Forensic analysis of ntfs timestamps
M Galhuber, R Luh - Proceedings of the 16th International Conference …, 2021 - dl.acm.org
Timeline forgery a widely employed technique in computer anti-forensics. Numerous freely
available and easy-to-use tampering tools make it difficult for forensic scientists to collect …
available and easy-to-use tampering tools make it difficult for forensic scientists to collect …
A generic taxonomy for steganography methods
A unified understanding of terms and their applicability is essential for every scientific
discipline: steganography is no exception. Being divided into several domains (for instance …
discipline: steganography is no exception. Being divided into several domains (for instance …
Revisiting data hiding techniques for apple file system
T Göbel, J Türr, H Baier - … of the 14th International Conference on …, 2019 - dl.acm.org
Data hiding is an important part of anti-forensic research since the continuous development
of operating systems, file systems and other software may close some previously known …
of operating systems, file systems and other software may close some previously known …
Optimized data hiding in complemented or non-complemented form in video steganography
Optimal match in the cover media was found to be effective for accurate data hiding and
improving the visual quality of steganography algorithms. Lately, several optimized …
improving the visual quality of steganography algorithms. Lately, several optimized …
Information hiding using minification
Information hiding techniques have been recently getting increased attention from the
security community. This is because attackers often apply a variety of data hiding methods to …
security community. This is because attackers often apply a variety of data hiding methods to …