A revised taxonomy of steganography embedding patterns

S Wendzel, L Caviglione, W Mazurczyk… - Proceedings of the 16th …, 2021 - dl.acm.org
Steganography embraces several hiding techniques which spawn across multiple domains.
However, the related terminology is not unified among the different domains, such as digital …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

[HTML][HTML] Time is on my side: Steganography in filesystem metadata

S Neuner, AG Voyiatzis, M Schmiedecker… - Digital …, 2016 - Elsevier
We propose and explore the applicability of file timestamps as a steganographic channel.
We identify an information gap between storage and usage of timestamps in modern …

Pos: An operator scheduling framework for multi-model inference on edge intelligent computing

Z Zhang, H Li, Y Zhao, C Lin, J Liu - Proceedings of the 22nd …, 2023 - dl.acm.org
Edge intelligent applications, such as autonomous driving usually deploy multiple inference
models on resource-constrained edge devices to execute a diverse range of concurrent …

A survey on digital forensics trends

M Damshenas, A Dehghantanha… - International Journal of …, 2014 - go.gale.com
Digital forensic has evolved from addressing minor computer crimes to investigation of
complex international cases with massive effect on the world. This paper studies the …

LoPhy: A Resilient and Fast Covert Channel over LoRa PHY

B Liu, C Gu, S He, J Chen - … of the 22nd International Conference on …, 2023 - dl.acm.org
Covert channel, which can break the logical protections of the computer system and leak
confidential or sensitive information, has long been considered a security issue in the …

Hiding information in flash memory

Y Wang, W Yu, SQ Xu, E Kan… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
This paper introduces a novel information hiding technique for Flash memory. The method
hides data within an analog characteristic of Flash, the program time of individual bits …

Covert channel for cluster-based file systems using multiple cover files

A Venčkauskas, N Morkevičius, G Petraitis… - … technology and control, 2013 - itc.ktu.lt
Problems of sensitive information hiding in disk drives using cluster-based file systems are
analyzed in this study. A new covert channel method for information hiding in disk drives is …

Information hiding using 3D-printing technology

A Kuznetsov, O Stefanovych… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
In this work, information hiding using 3D-printing technology was investigated. It is a new
direction of technical steganography. Information data is converted into a digital 3D model of …

Hiding data in the structure of the FAT family file system

A Kuznetsov, K Shekhanin, A Kolhatin… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
The paper researched the methods of technical steganography, namely, based on the
hiding of information messages in the structure of the FAT family file system. The basic …