D. Artz, Digital steganography: hiding data within data, IEEE Internet Computing, vol.5, issue.3, pp.75-80, 2001.
DOI : 10.1109/4236.935180

F. Cohen, Digital Forensic Evidence Examination, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01060607

E. Dallaway, Steganography is key ingredient to anti-forensics, Infosecurity, vol.5, issue.8, 2008.
DOI : 10.1016/S1754-4548(08)70146-3

J. Davis, J. Maclean, and D. Dampier, Methods of Information Hiding and Detection in File Systems, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp.66-69, 2010.
DOI : 10.1109/SADFE.2010.17

G. Kessler, An overview of steganography for the computer forensics examiner, Forensic Science Communications, vol.6, issue.3, 2004.

A. Martini and A. , Zaharis and C. Ilioudis, Data hiding in the SWF format and spreading through social network services, Proceedings of the Fourth International Workshop on Digital Forensics and Incident Analysis, pp.105-115, 2009.

A. Mozo, M. Obien, C. Rigor, D. Rayel, K. Chua et al., Video steganography using Flash Video (FLV), 2009 IEEE Intrumentation and Measurement Technology Conference, pp.822-827, 2009.
DOI : 10.1109/IMTC.2009.5168563

G. Tadiparthi and T. Sueyoshi, A novel steganographic algorithm using animations as cover, Decision Support Systems, vol.45, issue.4, pp.937-948, 2008.
DOI : 10.1016/j.dss.2008.03.005

B. Wilson, MAMA: Key findings (dev.opera.com/articles, 2008.

X. Zhang and X. Zhang, Information hiding algorithm based on flash animation, Computer Engineering, vol.36, issue.1, pp.181-183, 2010.
DOI : 10.3724/sp.j.1146.2009.01393

URL : http://doi.org/10.3724/sp.j.1146.2009.01393