A secure subliminal channel (?)
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
Multiple image watermarking using the SILE approach
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Insider threats in corporate environments: a case study for data leakage prevention
Proceedings of the Fifth Balkan Conference in Informatics
Hi-index | 0.00 |
Steganography is the art and science of hiding information. This paper introduces e-Forensics as a novel technique for extracting secret information electronically creatively. We propose an e-Forensics system capable of detecting or extracting secret information using generic steganalytic algorithms. The system is based on an agent computing approach where the autonomic agent would traverse several websites and detect steganographic communication. If steganographic activity was detected it would report back to the concerned authority. A conceptual overview of the system, as well as its design layout is presented. An illustrative example clarifies system's functionality and performance. performance.