Filter your results
- 7
- 7
- 7
- 1
- 1
- 1
- 1
- 1
- 3
- 7
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Pit Stop for an Audio Steganography Algorithm14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.123-134, ⟨10.1007/978-3-642-40779-6_10⟩
Conference papers
hal-01492814v1
|
||
|
Stealthier Inter-packet Timing Covert Channels10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.458-470, ⟨10.1007/978-3-642-20757-0_36⟩
Conference papers
hal-01583422v1
|
||
|
New Steganographic Techniques for the OOXML File Format1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.344-358, ⟨10.1007/978-3-642-23300-5_27⟩
Conference papers
hal-01590389v1
|
||
|
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers
hal-01393766v1
|
||
|
Steganographic Techniques for Hiding Data in SWF Files7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.245-255, ⟨10.1007/978-3-642-24212-0_19⟩
Conference papers
hal-01569544v1
|
||
|
Forensic Analysis of Android Steganography Apps14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.293-312, ⟨10.1007/978-3-319-99277-8_16⟩
Conference papers
hal-01988836v1
|
||
|
Relationship between Correcting Code and Module Technique in Hiding Secret Data9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.297-307, ⟨10.1007/978-3-642-35606-3_35⟩
Conference papers
hal-01551381v1
|