Digital steganography: hiding data within data, IEEE Internet Computing, vol.5, issue.3, pp.75-80, 2001. ,
DOI : 10.1109/4236.935180
Digital Forensic Evidence Examination, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01060607
Steganography is key ingredient to anti-forensics, Infosecurity, vol.5, issue.8, 2008. ,
DOI : 10.1016/S1754-4548(08)70146-3
Methods of Information Hiding and Detection in File Systems, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp.66-69, 2010. ,
DOI : 10.1109/SADFE.2010.17
An overview of steganography for the computer forensics examiner, Forensic Science Communications, vol.6, issue.3, 2004. ,
Zaharis and C. Ilioudis, Data hiding in the SWF format and spreading through social network services, Proceedings of the Fourth International Workshop on Digital Forensics and Incident Analysis, pp.105-115, 2009. ,
Video steganography using Flash Video (FLV), 2009 IEEE Intrumentation and Measurement Technology Conference, pp.822-827, 2009. ,
DOI : 10.1109/IMTC.2009.5168563
A novel steganographic algorithm using animations as cover, Decision Support Systems, vol.45, issue.4, pp.937-948, 2008. ,
DOI : 10.1016/j.dss.2008.03.005
MAMA: Key findings (dev.opera.com/articles, 2008. ,
Information hiding algorithm based on flash animation, Computer Engineering, vol.36, issue.1, pp.181-183, 2010. ,
DOI : 10.3724/sp.j.1146.2009.01393
URL : http://doi.org/10.3724/sp.j.1146.2009.01393