Using extended file information (EXIF) file headers in digital evidence analysis, International Journal of Digital Evidence, vol.2, issue.3, 2004. ,
, , 2018.
, Android Open Source Project, Dalvik Bytecode (source.android. com/devices/tech/dalvik/dalvik-bytecode), 2018.
, StegoDB: An Image Dataset for Benchmarking Steganalysis Algorithms, 2017.
Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010. ,
, Comparative study of digital audio steganography techniques, vol.2012, 2012.
, F5-Steganography Project, F5 Steganography in Java, p.5, 2017.
Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
Smali Home (github, 2017. ,
, Pixelknot: Hidden Messages, 2017.
The Histories, A. Burn (Ed.) and A. de Selincourt (Translator), Penguin Books, 1954. ,
New channel selection rule for JPEG steganography, IEEE Transactions on Information Forensics and Security, vol.7, issue.4, pp.1181-1191, 2012. ,
, Yet Anther Fast Java Decompiler (jd.benow.ca), 2015.
Exploring steganography: Seeing the unseen, IEEE Computer, vol.31, issue.2, pp.26-34, 1998. ,
, A new approach to covert communications via PDF files, vol.90, pp.557-565, 2010.
Steganalysis using higher-order image statistics, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, pp.111-119, 2006. ,
Using transcoding for hidden communications in IP telephony, Multimedia Tools and Applications, vol.70, issue.3, pp.2139-2165, 2014. ,
, /pxb1988/dex2jar), p.2, 2018.
, Outguess (www.outguess.org, p.2017
StegDetect (github.com/abeluck/stegdetect, 2017. ,
Vinci Secret Image (play.google.com/store/apps/ details?id=jubatus.android.davinci), 2012. ,
, Video steganography: A comprehensive review, Multimedia Tools and Applications, vol.74, pp.7063-7094, 2015.
, Data Stash, p.2017
Apktool: A Tool for Reverse Engineering Android APK Files, 2016. ,
, Twisted Pear Productions, Camouflage (camouflage.unfiction. com), 2018.
, Steganographic Algorithm Jsteg, 1993.
F5-A steganographic algorithm, Information Hiding, pp.289-302, 2001. ,
, WetStone Technologies, 2018.
, , p.2017